id
int64
text
string
metadata
dict
line_start_n_end_idx
dict
quality_signals
dict
eai_taxonomy
dict
pid
string
-7,708,582,504,097,499,000
Setting up Jupyter notebook with Tensorflow, Keras and Pytorch for Deep Learning I was trying to set up my Jupyter notebook to work on some deep learning problem (some image classification on MNIST and imagenet dataset) on my laptop (Ubuntu 16.04 LTS). Previously I have used a little bit of Keras (which runs on top of Tensorflow) on a small dataset, but I did not use that with Jupyter. For that purpose I installed Tensorflow and Keras independently and used them in a Python script. However, it was not working from my Jupyter notebook. I googled for the solution, but found nothing concrete. I tried to activate the tensorflow environment and run jupyter notebook from their but in vein. I guess the reason is, I have downloaded different packages in different times and that might make some compatibility issues. Therefore, I decided to create a BRAND NEW conda environment for my deep learning endeavor. This is how it goes: Continue reading “Setting up Jupyter notebook with Tensorflow, Keras and Pytorch for Deep Learning” Using baseplot for Ploting Geographical Coordinates Basemap is a great tool for creating maps using python in a simple way. It’s a matplotlib extension, so it has got all its features to create data visualizations, and adds the geographical projections and some datasets to be able to plot coast lines, countries, and so on directly from the library [1]. Continue reading “Using baseplot for Ploting Geographical Coordinates” Copy File from Cloud HDFS to Local Computer While I work with big data technologies like Spark and a large dataset I like to work on the university cloud, where everything is faster. However, for different reasons sometimes I have to move to local computer (my laptop). This time the reason is, I need to use a package of Python matplotlib, named baseplot, which is not installed on the cloud. However, the data I need to work on is on the cloud HDFS. Therefore, I need to copy the data from HDFS to my local laptop. This can be done in two simple steps: Step 1: copy data from HDFS to remote local (not HDFS) Step 2: copy data from remote local to local (my laptop) Continue reading “Copy File from Cloud HDFS to Local Computer” Data Science Interview Questions In this post I am going to make a compilation of interview questions for data science role. A big part of them are questions that I faced during my interviews. I have also gathered questions from different websites and which I found interesting. So, lets get started. What do you know about bias-variance/bias-variance tradeoff? In statistics and machine learning, the bias–variance tradeoff (or dilemma) is the problem of simultaneously minimizing two sources of error that prevent supervised learning algorithms from generalizing beyond their training set [Wikipedia]: • The bias is an error from erroneous assumptions in the learning algorithm. High bias can cause an algorithm to miss the relevant relations between features and target outputs (underfitting). Bias are the simplifying assumptions made by a model to make the target function easier to learn. Examples of low-bias machine learning algorithms include: Decision Trees, k-Nearest Neighbors and Support Vector Machines. Examples of high-bias machine learning algorithms include: Linear Regression, Linear Discriminant Analysis and Logistic Regression [2]. • The variance is an error from sensitivity to small fluctuations in the training set. High variance can cause an algorithm to model the random noise in the training data, rather than the intended outputs (overfitting). Variance is the amount that the estimate of the target function will change if different training data was used. Low variance suggests small changes to the estimate of the target function with changes to the training dataset. High variance suggests large changes to the estimate of the target function with changes to the training dataset. Generally, nonparametric machine learning algorithms that have a lot of flexibility have a high variance. For example, decision trees have a high variance, that is even higher if the trees are not pruned before use. Examples of low-variance machine learning algorithms include: Linear Regression, Linear Discriminant Analysis and Logistic Regression. Examples of high-variance machine learning algorithms include: Decision Trees, k-Nearest Neighbors and Support Vector Machines [2]. Continue reading “Data Science Interview Questions” Printing Jupyter Notebook to other File Format As a data scientist, I frequently use Jupyter notebook. For writing some report one might need to print out (on paper) the full notebook. There is a print preview option in the current version of Jupyter notebook, but no print option. I tried to use CTRL + P command on the print preview page, but the output was horrible (like when we try to print an webpage). I googled and found a better way of doing that. I am running Jupyter notebook on Ubuntu 16.04. The steps are very simple: (1) Open terminal (2) Change directory (where the notebook is located) (3) Use command: ipython nbconvert –to pdf A1.ipynb (A1.ipynb is my notebook) shanto@shanto:~$ cd ~/Desktop/BigData/706/Assignments/ shanto@shanto:~/Desktop/BigData/706/Assignments$ ls A1.ipynb shanto@shanto:~/Desktop/BigData/706/Assignments$ jupyter nbconvert --to pdf A1.ipynb [NbConvertApp] Converting notebook A1.ipynb to pdf [NbConvertApp] Writing 25564 bytes to notebook.tex [NbConvertApp] Building PDF [NbConvertApp] Running xelatex 3 times: ['xelatex', 'notebook.tex'] [NbConvertApp] Running bibtex 1 time: ['bibtex', 'notebook'] [NbConvertApp] WARNING | bibtex had problems, most likely because there were no citations [NbConvertApp] PDF successfully created [NbConvertApp] Writing 23494 bytes to A1.pdf shanto@shanto:~/Desktop/BigData/706/Assignments$ The figure shows a snap of the generated *.pdf file. The file is reasonably neat with a good formating. If we change the –to pdf part to –to whateverFormat then the same command can be used to convert the notebook to other formats. Conversion to a few other format is shown below. shanto@shanto:~/Desktop/BigData/706/Assignments$ jupyter nbconvert --to script A1.ipynb [NbConvertApp] Converting notebook A1.ipynb to script [NbConvertApp] Writing 2077 bytes to A1.py shanto@shanto:~/Desktop/BigData/706/Assignments$ # convert to latex shanto@shanto:~/Desktop/BigData/706/Assignments$ jupyter nbconvert --to latex A1.ipynb [NbConvertApp] Converting notebook A1.ipynb to latex [NbConvertApp] Writing 25564 bytes to A1.tex shanto@shanto:~/Desktop/BigData/706/Assignments$ Running Spark on Local Machine Apache Spark is a fast and general-purpose cluster computing system. To get maximum potential out of it, Spark should be running on a distributed computing system. However, one might not have access to any distributed system all the time. Specially, for learning purpose one might want tor run spark on his/her own computer. This is actually a very easy task to do. There is a handful of way to do this. I would show, what I have done to run Spark on my laptop. Continue reading “Running Spark on Local Machine” Find Similarity Using Jaccard Similarity We read the file using Pandas. import pandas as pd import numpy as np rawData = pd.read_csv('data-Assignment2.txt', sep=",", header=None) We need to find the signature matrix. For that we need to make a permutation of the rows of the whole matrix. We can do that using pandas like this. permuteData = rawData.sample(frac=1) Just as a note we can use frac less than one if we want to do a random subsample. We can also shuffle in-place and use this. df = df.sample(frac=1).reset_index(drop=True) # in place shuffle, drop index column We can test if it works by using a random matrix created by Pandas. # create a random matrix with 0 and 1, like our example matrix df = pd.DataFrame(np.random.randint(0,2,size=(100, 4)), columns=list('ABCD')) # now we can do a shuffle like this df = df.sample(frac=1) The before and after is shown by the following figure: a = [] b = [] for k in range(3): for j in range(4): a.append(j) b.append(a) a = [] print(b) # OUTPUT: [[0, 1, 2, 3], [0, 1, 2, 3], [0, 1, 2, 3]] *.csv File Preprocessing Using Pandas For any machine learning or data mining purpose, the first job is to pre-process the data so that we can us the data for the original purpose. In lots of cases we have the raw data in *csv format, which we need to import and preprocess using the language we are using for the particular job. Python is one of the most popular language for this purpose. For this article I will use Python and one very popular library named pandas to show how we can use pandas for read, import and preprocess a *.csv file. We have a *csv file which we want to pre-process. This is a file with a large number of columns, so it is not a good idea to display it here. I am showing a part of it. Continue reading “*.csv File Preprocessing Using Pandas” Understanding MapReduce in My Way : Starting with Word Count Word Count problem is known as the ‘Hello World’ for MapReduce. In this article I will explain, how I understand different bits of MapReduce in my way. The code provided in this article is trivial and is available in lots of places including the official MapReduce website. My concern would be to focus on how it really works. Continue reading “Understanding MapReduce in My Way : Starting with Word Count”
{ "url": "https://sharifuli.com/", "source_domain": "sharifuli.com", "snapshot_id": "crawl=CC-MAIN-2018-30", "warc_metadata": { "Content-Length": "82458", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:4K6NBTZL3NFF3WPID3UPHPGTRC5XYLKY", "WARC-Concurrent-To": "<urn:uuid:52167567-478f-4645-8c5f-85cfbeabeca8>", "WARC-Date": "2018-07-19T09:28:20Z", "WARC-IP-Address": "192.0.78.24", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:LS3KTFQ4UY67MERASR2K5TAGAXTAP2KM", "WARC-Record-ID": "<urn:uuid:e6b09d72-9c27-4cea-ad86-700be3afc5cb>", "WARC-Target-URI": "https://sharifuli.com/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:84e3afa0-8f62-4e34-a5ea-1ce61a5bf180>" }, "warc_info": "robots: classic\r\nhostname: ip-10-155-37-223.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 81, 82, 933, 1033, 1034, 1086, 1087, 1390, 1461, 1462, 1506, 1507, 2018, 2019, 2074, 2131, 2194, 2195, 2228, 2229, 2497, 2498, 2559, 2560, 2802, 2803, 3355, 4400, 4401, 4453, 4454, 4501, 4502, 4737, 4738, 4739, 4914, 4915, 4989, 4990, 5008, 5061, 5139, 5140, 5195, 5247, 5256, 5341, 5392, 5443, 5471, 5539, 5600, 5690, 5730, 5775, 5825, 5826, 5930, 5931, 6108, 6109, 6197, 6251, 6294, 6362, 6449, 6502, 6547, 6597, 6598, 6629, 6630, 7092, 7142, 7143, 7184, 7185, 7216, 7217, 7237, 7256, 7324, 7325, 7474, 7475, 7512, 7513, 7638, 7639, 7724, 7725, 7793, 7794, 7857, 7935, 7971, 7994, 7995, 8050, 8051, 8058, 8065, 8084, 8107, 8127, 8143, 8154, 8163, 8216, 8217, 8255, 8256, 8762, 8763, 8932, 8933, 8990, 8991, 9052, 9053, 9380 ], "line_end_idx": [ 81, 82, 933, 1033, 1034, 1086, 1087, 1390, 1461, 1462, 1506, 1507, 2018, 2019, 2074, 2131, 2194, 2195, 2228, 2229, 2497, 2498, 2559, 2560, 2802, 2803, 3355, 4400, 4401, 4453, 4454, 4501, 4502, 4737, 4738, 4739, 4914, 4915, 4989, 4990, 5008, 5061, 5139, 5140, 5195, 5247, 5256, 5341, 5392, 5443, 5471, 5539, 5600, 5690, 5730, 5775, 5825, 5826, 5930, 5931, 6108, 6109, 6197, 6251, 6294, 6362, 6449, 6502, 6547, 6597, 6598, 6629, 6630, 7092, 7142, 7143, 7184, 7185, 7216, 7217, 7237, 7256, 7324, 7325, 7474, 7475, 7512, 7513, 7638, 7639, 7724, 7725, 7793, 7794, 7857, 7935, 7971, 7994, 7995, 8050, 8051, 8058, 8065, 8084, 8107, 8127, 8143, 8154, 8163, 8216, 8217, 8255, 8256, 8762, 8763, 8932, 8933, 8990, 8991, 9052, 9053, 9380, 9459 ] }
{ "red_pajama_v2": { "ccnet_original_length": 9459, "ccnet_original_nlines": 122, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3251533806324005, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.030163599178195, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.22085890173912048, "rps_doc_frac_unique_words": 0.33197277784347534, "rps_doc_mean_word_length": 5.0870747566223145, "rps_doc_num_sentences": 101, "rps_doc_symbol_to_word_ratio": 0.002556239953264594, "rps_doc_unigram_entropy": 5.504562854766846, "rps_doc_word_count": 1470, "rps_doc_frac_chars_dupe_10grams": 0.08130516111850739, "rps_doc_frac_chars_dupe_5grams": 0.13426050543785095, "rps_doc_frac_chars_dupe_6grams": 0.12035304307937622, "rps_doc_frac_chars_dupe_7grams": 0.09146831184625626, "rps_doc_frac_chars_dupe_8grams": 0.08290986716747284, "rps_doc_frac_chars_dupe_9grams": 0.08130516111850739, "rps_doc_frac_chars_top_2gram": 0.0180529598146677, "rps_doc_frac_chars_top_3gram": 0.016715699806809425, "rps_doc_frac_chars_top_4gram": 0.017116880044341087, "rps_doc_books_importance": -684.4188842773438, "rps_doc_books_importance_length_correction": -684.4188842773438, "rps_doc_openwebtext_importance": -390.8954772949219, "rps_doc_openwebtext_importance_length_correction": -390.8954772949219, "rps_doc_wikipedia_importance": -324.426025390625, "rps_doc_wikipedia_importance_length_correction": -324.426025390625 }, "fasttext": { "dclm": 0.19793814420700073, "english": 0.8855457305908203, "fineweb_edu_approx": 2.4193124771118164, "eai_general_math": 0.9852695465087891, "eai_open_web_math": 0.22435849905014038, "eai_web_code": 0.9279418587684631 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "006.3", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Cognitive science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "16", "label": "Personal Blog" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
2,248,486,728,444,444,000
KidsMD Health Topics Our Health Topics Unicameral Bone Cyst • Overview What is a unicameral bone cyst? A unicameral bone cyst, otherwise known as a simple bone cyst, is a fluid-filled cavity in the bone, lined by compressed fibrous tissue. It usually occurs in the long bones of a growing child, especially the upper part of the humerus (50 - 60% of the time) or the upper part of the femur (25-30 % of the time). Other bones, however, can be affected. These cysts usually affect children primarily between the ages of 5 to 15, but can affect older children or adults. In older children and adults, they tend to occur in flat bones (such as the pelvis, jaw, skull or rib cage) or in the large heel bone (calcaneus) Unicameral bone cysts are considered benign. They do not metastasize (spread) beyond the bone. Some heal spontaneously, while others enlarge. More invasive cysts can grow to fill most of the bone's metaphysis (the transitional zone where the shaft of the bone joins the end of the bone) and cause what is known as a pathological fracture. A more invasive cyst could also destroy the bone's growth plate, leading to shortening of the bone. Shortening in the upper arm (humerus) usually does not cause a functional problem, but it may produce a cosmetic problem if it occurs in early childhood. These cysts are sometimes classified as either "active" or "latent". An active cyst is adjacent to the growth plate and tends to enlarge, causing the problems mentioned above. A latent cyst is one that is more apt to heal with treatment because the growth plate has migrated away from the cyst. What causes a unicameral bone cyst? The cause of a unicameral bone cyst remains unknown. Theories have been proposed but none have been definitively proven. One of these theories is that the cysts result from a disorder of the growth plate. Another is that the cysts result from problems with circulation that are caused by a developmental anomaly in the veins of the affected bone. The role trauma plays in the development of these cysts is unknown. Some speculate that repeated trauma puts the bone at risk for developing a bone cyst. This, however, has not been proven. What are the symptoms of a unicameral bone cyst? Unless there has been a fracture, bone cysts are without symptoms. They may occasionally be discovered by chance on x-rays obtained for other reasons. There is no mass or tenderness unless there is a fracture. There may be an abnormal angulation of the limb secondary to the fracture or shortening of the limb if the adjacent growth plate is involved. Keep in mind that each child experiences symptoms differently. The symptoms of a unicameral bone cyst may resemble other conditions or medical problems. Always consult your child's physician for a diagnosis. How is a unicameral bone cyst diagnosed? In addition to a performing a complete physical examination and taking your child's medical history, the doctor will likely take a simple x-ray of the affected area, which can be used alone to diagnose a unicameral bone cyst. The following diagnostic tests are usually not required, except if the cyst is found in an unusual location, such as the pelvis: • magnetic resonance imaging (MRI) - a diagnostic procedure that uses a combination of large magnets, radiofrequencies, and a computer to produce detailed images of organs and structures within the body. This test is done to help document the extent of the cyst, how aggressive it is, and distinguish it from other types of bone cysts. • computerized tomography scan (also called a CT or CAT scan) - a diagnostic imaging procedure that uses a combination of x-rays and computer technology to produce cross-sectional images (often called slices), both horizontally and vertically, of the body. A CT scan shows detailed images of any part of the body, including the bones, muscles, fat, and organs. CT scans are more detailed than general x-rays. This test can also help document the extent of the cyst, and distinguish it from other bone cysts. • bone scans - a nuclear imaging method to evaluate any degenerative and/or arthritic changes in the joints; to detect bone diseases and tumors; to determine the cause of bone pain or inflammation. This test is to rule out other cysts (which are quite unusual) Treatment for a unicameral bone cyst Specific treatment for a unicameral bone cyst will be determined by your child's physician based on: • your child's age, overall health, and medical history • extent of the disease • your child's tolerance for specific medications, procedures, or therapies • how your child's physician expects the disease may progress • your opinion or preference Treatment is aimed primarily at preventing recurrent fractures. If it is decided that the bone is relatively strong, observation may be recommended. If the child's activities are such that fracture is unlikely (especially in the humerus) observation may be recommended. The decision to treat is sometimes difficult and the risks of the surgery must be compared to the likelihood of fracture without treatment. There is no right answer for everyone. If treatment is opted for, it will likely involve one or a combination of the following surgical procedures performed by a pediatric orthopaedic surgeon: • Curettage/Bone Grafting: Curettage describes a surgical scraping of the cyst with a special instrument called a curette that has a scoop, loop or ring at its tip. For this procedure, surgeons make an incision in the bone to create a window. The fluid in the cyst is aspirated and the lining tissue is completely curetted. The remaining cavity is then packed with donor bone tissue (allograft), bone chips taken from another bone (autograft), or other materials depending on the preference of the surgeon. • Steroid Injection: Injection of the steroid methylprednisone acetate into these cysts can help heal the cyst, sometimes without any other therapy. The steroid's healing ability is not fully understood, although it is believed that steroids can reduce the levels of prostaglandin, a type of fatty acid found in the cyst fluid. Prostaglandin is believed to reduce the cyst's ability to reabsorb into the bone. For this procedure, spinal or bone marrow biopsy needles are placed into the cyst and the fluid is aspirated. The cyst is injected with radiographic contrast, which helps doctors determine whether the cyst can be filled. Then, the steroid is injected and the needles are removed. The cyst will likely be reinjected at regular intervals every several months, until there is adequate healing, which may take 6-12 months. Overall, the results of steroid injection are similar to curettage and the procedure is much easier on the child, so it is usually preferred to curettage as the first treatment. The risks of this treatment are minimal and generally restricted to the risk of general anesthesia, infection, fracture, and recurrence or persistence of the cyst. There is one case report of air getting into the blood stream. This is a potentially dangerous complication, but it is very unlikely to occur. • Bone marrow injection: Some evidence suggests that bone marrow aspirated from the pelvis above the hip through a small needle and injected in the cyst will help the healing. This is sometimes used in conjunction with demineralized bone gel to stimulate bone formation. The demineralized bone is from donor (allograft) bones. The calcium is removed in these preparations, but the bone proteins that stimulate bone formation remain, and it is believed that this may stimulate healing. The preparation is tested for transmissible diseases such as AIDS (HIV), hepatitis and bacteria and is believed to be very safe. Whether or not this approach is better or inferior to simple steroid injection is unknown. What is the long-term outlook for a child with a unicameral bone cyst? Prognosis for a unicameral bone cyst is generally good. Most of these cysts do heal with proper treatment and if left alone, most heal spontaneously by the time the skeleton ceases to grow. Recurrence can, however, occur. Continuous follow-up care is essential for the successful treatment of this kind of bone cyst. A schedule of follow-up care should be determined by your child's physician and other members of your care team to monitor ongoing response to treatment and possible late effects of treatment. » Boston Children's Hospital 300 Longwood Avenue Fegan 2 Boston MA 02115  617-355-6021 ADDITIONAL SERVICES THAT TREAT THIS CONDITION + [ visit the site ] Boston Children's Hospital 300 Longwood Ave Fegan 2 Boston MA 02115  617-355-6021  fax: 617-730-0456 Request an Appointment If this is a medical emergency, please dial 9-1-1. This form should not be used in an emergency. Patient Information Date of Birth: Contact Information Appointment Details Send RequestIf you do not see the specialty you are looking for, please call us at: 617-355-6000.International visitors should call International Health Services at +1-617-355-5209. Please complete all required fieldsThis department is currently not accepting appointment requests onlineThis department is currently not accepting appointment requests online Thank you. Your request has been successfully submitted You will be contacted within 1 business day. If you have questions or would like more information, please call: 617-355-6000 +1-617-355-6000 close Find a Doctor Search by Clinician's Last Name or Specialty: Select by Location: Search by First Letter of Clinician's Last Name: *ABCDEFGHIJKLMNOPQRSTUVWXYZ More optionsSearch Condition & Treatments Search for a Condition or Treatment: Show Items Starting With: *ABCDEFGHIJKLMNOPQRSTUVWXYZ View allSearch Visitor Information The future of pediatrics will be forged by thinking differently, breaking paradigms and joining together in a shared vision of tackling the toughest challenges before us.” - Sandra L. Fenwick, President and CEO Close
{ "url": "http://www.childrenshospital.org/health-topics/conditions/u/unicameral-bone-cyst", "source_domain": "www.childrenshospital.org", "snapshot_id": "crawl=CC-MAIN-2014-10", "warc_metadata": { "Content-Length": "100485", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:USLGTL4IQACSBIYMOFKLGXXHHRVDDBOE", "WARC-Concurrent-To": "<urn:uuid:6bcd81ce-26df-4fb6-967a-e8c1fe1b0949>", "WARC-Date": "2014-03-12T03:05:41Z", "WARC-IP-Address": "134.174.13.5", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:DZVRBHDJFLVGP3RTXYGBYLVX5S4LE6ZN", "WARC-Record-ID": "<urn:uuid:6217763d-94f1-43b9-b086-48e67e7fa75a>", "WARC-Target-URI": "http://www.childrenshospital.org/health-topics/conditions/u/unicameral-bone-cyst", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0dd8cedc-9d76-4722-a79f-1e35641446a0>" }, "warc_info": "robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 21, 22, 40, 41, 62, 63, 76, 77, 113, 114, 468, 469, 735, 736, 1333, 1334, 1407, 1408, 1519, 1520, 1643, 1644, 1684, 1685, 2226, 2227, 2280, 2281, 2637, 2638, 2850, 2851, 2896, 2897, 3256, 3257, 3597, 4109, 4374, 4375, 4416, 4417, 4522, 4523, 4583, 4611, 4691, 4757, 4790, 4791, 5065, 5066, 5403, 5404, 5915, 6329, 6330, 7240, 7949, 7950, 8025, 8026, 8540, 8541, 8542, 8548, 8579, 8603, 8615, 8635, 8636, 8654, 8655, 8705, 8711, 8734, 8765, 8786, 8798, 8818, 8819, 8837, 8860, 8883, 8884, 8981, 8982, 9002, 9017, 9037, 9057, 9239, 9415, 9416, 9427, 9428, 9473, 9474, 9519, 9520, 9587, 9588, 9617, 9623, 9637, 9683, 9703, 9780, 9799, 9822, 9859, 9913, 9928, 9948, 10120, 10159 ], "line_end_idx": [ 21, 22, 40, 41, 62, 63, 76, 77, 113, 114, 468, 469, 735, 736, 1333, 1334, 1407, 1408, 1519, 1520, 1643, 1644, 1684, 1685, 2226, 2227, 2280, 2281, 2637, 2638, 2850, 2851, 2896, 2897, 3256, 3257, 3597, 4109, 4374, 4375, 4416, 4417, 4522, 4523, 4583, 4611, 4691, 4757, 4790, 4791, 5065, 5066, 5403, 5404, 5915, 6329, 6330, 7240, 7949, 7950, 8025, 8026, 8540, 8541, 8542, 8548, 8579, 8603, 8615, 8635, 8636, 8654, 8655, 8705, 8711, 8734, 8765, 8786, 8798, 8818, 8819, 8837, 8860, 8883, 8884, 8981, 8982, 9002, 9017, 9037, 9057, 9239, 9415, 9416, 9427, 9428, 9473, 9474, 9519, 9520, 9587, 9588, 9617, 9623, 9637, 9683, 9703, 9780, 9799, 9822, 9859, 9913, 9928, 9948, 10120, 10159, 10164 ] }
{ "red_pajama_v2": { "ccnet_original_length": 10164, "ccnet_original_nlines": 116, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.38687664270401, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.012598429806530476, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.16220471262931824, "rps_doc_frac_unique_words": 0.3676654100418091, "rps_doc_mean_word_length": 5.029962539672852, "rps_doc_num_sentences": 80, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.514199256896973, "rps_doc_word_count": 1602, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.09990072250366211, "rps_doc_frac_chars_dupe_6grams": 0.06502854079008102, "rps_doc_frac_chars_dupe_7grams": 0.02829485945403576, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.014892029576003551, "rps_doc_frac_chars_top_3gram": 0.02903945930302143, "rps_doc_frac_chars_top_4gram": 0.02829485945403576, "rps_doc_books_importance": -716.053955078125, "rps_doc_books_importance_length_correction": -716.053955078125, "rps_doc_openwebtext_importance": -331.38641357421875, "rps_doc_openwebtext_importance_length_correction": -331.38641357421875, "rps_doc_wikipedia_importance": -196.6400604248047, "rps_doc_wikipedia_importance_length_correction": -196.6400604248047 }, "fasttext": { "dclm": 0.08848459273576736, "english": 0.9307015538215637, "fineweb_edu_approx": 3.1227152347564697, "eai_general_math": 0.047213438898324966, "eai_open_web_math": 0.26367372274398804, "eai_web_code": 0.005084159784018993 } }
{ "free_decimal_correspondence": { "primary": { "code": "614.2", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Public health" } }, "secondary": { "code": "617.5", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Surgery and Dentistry" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
1,328,634,549,153,329,000
How HGH Declines With Age And How To Fix It With Injections? HGH is the hormone that makes humans grow taller and stronger. It is produced by the pituitary gland, with an average annual production of three to five billion micrograms per day during adulthood. However, levels of this hormone are generally much lower or zero at all in people beyond their early 30’s.  By age 60, HGH levels have dropped considerably and may remain low for many years after that point. Researchers do not yet know what causes this hormonal change. Still, they speculate that it might be related to increased body fat and lower activity levels due to the natural ageing process. Whatever the cause, it is fixed when you buy HGH for sale here and use them effectively in your treatment. Science Behind Declining Level of HGH with Age Ageing is a natural process that happens to all living beings and represents a general decline in capabilities and a dramatic change in the body’s structure and function. Ageing also includes the physical changes associated with it. Human growth hormone (HGH) is an important part of successful ageing.  Normally, physical activities and exercising become minimal with increasing age. This increases fat levels in our bodies. With no hormonal output, the body will rely on fat, sometimes referred to as ‘insulin resistance. This can lead to many health problems, including diabetes, heart disease, and cardiovascular health.   HGH’s ability to influence human ageing is crucially important because the hormone is the only known physiologic process that has ever been shown capable of naturally increasing life expectancy. Successful ageing should be defined as how well a person ages without being hampered by the critically low level of HGH. Injections to Boost HGH Levels The feeling of boundless enthusiasm and vitality is missed badly while growing old. That’s because the hormone levels start declining with age, affecting your health, happiness, wellbeing and more. This feeling of loss of energy and fitness is rather a horrible one. Although HGH levels are commonly low in humans with passing age, this level can be increased now with HGH injections. This is because these injections directly contact our body’s biological system and account for the low HGH levels in our body.   HGH aids in the production of our body’s protein. You can buy HGH injections that cause your body to produce more proteins for growth hormones used in the different areas of your body. Many think that HGH is a drug that can help them lose weight, but this is not the case. This hormone is only used by your body when you need it. HGH is short for human growth hormone, a substance produced in the pituitary gland. This tiny endocrine organ is located at the base of your brain and releases hormones that regulate growth in children and adolescents. Unfortunately, as we age, our HGH levels start to decline. That’s why many people experience less energy, loss of muscle mass and increased body fat as they get older. Similar Posts Leave a Reply Your email address will not be published. Required fields are marked *
{ "url": "https://www.shane-carwin.com/how-hgh-declines-with-age-and-how-to-fix-it-with-injections/", "source_domain": "www.shane-carwin.com", "snapshot_id": "CC-MAIN-2024-18", "warc_metadata": { "Content-Length": "79034", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:SQLOHYCQ4C6D2XSJWWK4YVW6WWSUTGVW", "WARC-Concurrent-To": "<urn:uuid:5167aa3c-d755-4531-a1be-ec7255be3804>", "WARC-Date": "2024-04-17T19:40:58Z", "WARC-IP-Address": "172.67.178.28", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:QEJ74JCB2G7QMXJ4GFPBAG5MEKDRJCFF", "WARC-Record-ID": "<urn:uuid:fc7cdb69-0048-4e21-b6c5-7566295824f3>", "WARC-Target-URI": "https://www.shane-carwin.com/how-hgh-declines-with-age-and-how-to-fix-it-with-injections/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:693752f0-c1b4-41ce-902d-b40e6a75587b>" }, "warc_info": "isPartOf: CC-MAIN-2024-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-188\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 61, 62, 368, 369, 768, 769, 816, 817, 1121, 1122, 1445, 1446, 1762, 1763, 1794, 1795, 2062, 2063, 2310, 2311, 2641, 2642, 3029, 3030, 3044, 3045, 3059, 3060 ], "line_end_idx": [ 61, 62, 368, 369, 768, 769, 816, 817, 1121, 1122, 1445, 1446, 1762, 1763, 1794, 1795, 2062, 2063, 2310, 2311, 2641, 2642, 3029, 3030, 3044, 3045, 3059, 3060, 3130 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3130, "ccnet_original_nlines": 28, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.4074702858924866, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.02886248007416725, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.10865873843431473, "rps_doc_frac_unique_words": 0.4980769157409668, "rps_doc_mean_word_length": 4.876923084259033, "rps_doc_num_sentences": 32, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.097316265106201, "rps_doc_word_count": 520, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.017744479700922966, "rps_doc_frac_chars_top_3gram": 0.013406939804553986, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -184.9310302734375, "rps_doc_books_importance_length_correction": -184.9310302734375, "rps_doc_openwebtext_importance": -110.84722900390625, "rps_doc_openwebtext_importance_length_correction": -110.84722900390625, "rps_doc_wikipedia_importance": -98.6287612915039, "rps_doc_wikipedia_importance_length_correction": -98.6287612915039 }, "fasttext": { "dclm": 0.12949341535568237, "english": 0.9562336802482605, "fineweb_edu_approx": 2.9116783142089844, "eai_general_math": 0.0013590500457212329, "eai_open_web_math": 0.10420609265565872, "eai_web_code": 0.00007701000140514225 } }
{ "free_decimal_correspondence": { "primary": { "code": "612.6", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Physiology" } }, "secondary": { "code": "615.5", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Materia medica, Drugs, and Pharmacy" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "6", "label": "Promotional/Advertisement" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "2", "label": "Partially Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
-632,016,389,820,798,000
Is it OK to lose weight during pregnancy if you are overweight? Is it safe to lose weight while pregnant if overweight? If you are obese (usually defined as having a BMI of 30 or above) and pregnant, do not try to lose weight during your pregnancy. It will not reduce the chance of complications and may not be safe. The best way to protect you and your baby’s health is to go to all your antenatal appointments. Can you lose a baby from being overweight? Having a high BMI during pregnancy increases the risk of various pregnancy complications, including: The risk of miscarriage, stillbirth and recurrent miscarriage. Gestational diabetes. Is it weird to lose weight while pregnant? “It’s not uncommon for women in their first trimester to lose a little bit of weight due to bad nausea and vomiting that precludes them from eating in a normal way,” says Henderson. A loss of appetite because of the morning sickness is a common cause of pregnancy weight loss too. How can I avoid getting fat during pregnancy? How to avoid gaining too much weight during pregnancy 1. Start pregnancy at a healthy weight if possible. 2. Eat balanced meals and refuel often. 3. Drink up (water, that is) 4. Make your cravings constructive. 5. Choose complex carbs. 6. Start a simple walking routine. 7. If you’re already moving, don’t stop. 8. Make weight a regular discussion. IT IS INTERESTING:  Your question: Can having an Orgasim cause miscarriage in first trimester? What is considered a plus size pregnancy? And what exactly is a “plus-size pregnancy”? There’s no official definition of “plus size.” However, according to the Centers for Disease Control and Prevention (CDC) , women with a body mass index (BMI) of 25.0 to 29.9 are considered to be overweight, and those with a BMI of 30.0 or above have obesity. When should I worry about weight loss during pregnancy? Sometimes, it is nothing to worry about, especially if the weight loss is short-lived and followed by the recommended weight gain. However, losing weight during pregnancy is cause for concern if the weight loss is substantial, long-lasting, or occurs after the first trimester. Does being obese affect pregnancy? How can obesity affect a pregnancy? Obesity increases the risk of the following problems during pregnancy: Birth defects—Babies born to women who are obese have an increased risk of having birth defects, such as heart defects and neural tube defects (NTDs) Does being overweight make it harder to get pregnant? In most cases, being overweight does not affect your ability to get pregnant. However, being obese (rather than overweight) can decrease your chances of getting pregnant. That’s because weight can have an effect on your hormones and can prevent your ovaries from releasing an egg (ovulation). Do you burn more calories when pregnant? Yes, you burn more calories when you are pregnant because of the increase in weight and body surface area. At baseline, your body has to burn calories just to keep your heart pumping, brain functioning, blood flowing, and muscles working. IT IS INTERESTING:  Is it OK to gain 40 pounds when pregnant? Can you lose 50lbs while pregnant? The authors of a 2015 meta-analysis reviewed six studies and concluded that, in general, doctors should not recommend weight loss for women with obesity during pregnancy. They suggest that losing weight at this time can increase the risk of complications to the baby. Can you lose weight while pregnant if you exercise? You’ll gain less fat weight during your pregnancy if you continue to exercise (assuming you exercised before becoming pregnant). But don’t expect or try to lose weight by exercising while you’re pregnant. For most women, the goal is to maintain their fitness level throughout pregnancy. What causes weight gain during pregnancy? Women gain more weight in the final months of pregnancy than they do in the first few months. This isn’t only due to the weight of the growing baby. Much of the weight gained is extra fluid (water) in the body. This is needed for things like the baby’s circulation, the placenta and the amniotic fluid. What month of pregnancy do you gain weight? In general, you should gain about 2 to 4 pounds during the first 3 months you‘re pregnant and 1 pound a week during the rest of your pregnancy.
{ "url": "https://livlaughlove.com/motherhood/is-it-ok-to-lose-weight-during-pregnancy-if-you-are-overweight.html", "source_domain": "livlaughlove.com", "snapshot_id": "crawl=CC-MAIN-2022-40", "warc_metadata": { "Content-Length": "73926", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:TJVJ6EFP5B7XJHW5EFJJFWFC7IQR54ML", "WARC-Concurrent-To": "<urn:uuid:83c8bdb8-f397-4ff1-adcb-1e956c1846c8>", "WARC-Date": "2022-09-30T09:36:03Z", "WARC-IP-Address": "144.126.138.138", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:N6JT7QT2AGX45PE7TIYCYDMPV6HUBFCZ", "WARC-Record-ID": "<urn:uuid:a3fbcb5b-8550-496e-9340-004f9a3fbd00>", "WARC-Target-URI": "https://livlaughlove.com/motherhood/is-it-ok-to-lose-weight-during-pregnancy-if-you-are-overweight.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ff7faba1-0319-464d-8864-85f7a5388dbe>" }, "warc_info": "isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-142\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 64, 65, 121, 122, 415, 416, 459, 460, 646, 647, 690, 691, 972, 973, 1019, 1020, 1074, 1075, 1129, 1171, 1202, 1240, 1267, 1304, 1347, 1386, 1481, 1482, 1524, 1525, 1830, 1831, 1887, 1888, 2166, 2167, 2202, 2203, 2460, 2461, 2515, 2516, 2809, 2810, 2851, 2852, 3091, 3092, 3154, 3155, 3190, 3191, 3459, 3460, 3512, 3513, 3800, 3801, 3843, 3844, 4147, 4148, 4192, 4193 ], "line_end_idx": [ 64, 65, 121, 122, 415, 416, 459, 460, 646, 647, 690, 691, 972, 973, 1019, 1020, 1074, 1075, 1129, 1171, 1202, 1240, 1267, 1304, 1347, 1386, 1481, 1482, 1524, 1525, 1830, 1831, 1887, 1888, 2166, 2167, 2202, 2203, 2460, 2461, 2515, 2516, 2809, 2810, 2851, 2852, 3091, 3092, 3154, 3155, 3190, 3191, 3459, 3460, 3512, 3513, 3800, 3801, 3843, 3844, 4147, 4148, 4192, 4193, 4336 ] }
{ "red_pajama_v2": { "ccnet_original_length": 4336, "ccnet_original_nlines": 64, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.39678898453712463, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.01834861934185028, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.17316514253616333, "rps_doc_frac_unique_words": 0.40443211793899536, "rps_doc_mean_word_length": 4.781163215637207, "rps_doc_num_sentences": 62, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.069962024688721, "rps_doc_word_count": 722, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.0454808808863163, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.039107758551836014, "rps_doc_frac_chars_top_3gram": 0.017381230369210243, "rps_doc_frac_chars_top_4gram": 0.01998841017484665, "rps_doc_books_importance": -374.9653015136719, "rps_doc_books_importance_length_correction": -374.9653015136719, "rps_doc_openwebtext_importance": -205.67431640625, "rps_doc_openwebtext_importance_length_correction": -205.67431640625, "rps_doc_wikipedia_importance": -167.48715209960938, "rps_doc_wikipedia_importance_length_correction": -167.48715209960938 }, "fasttext": { "dclm": 0.954094648361206, "english": 0.9527391791343689, "fineweb_edu_approx": 2.574899196624756, "eai_general_math": 0.07874906063079834, "eai_open_web_math": 0.26585566997528076, "eai_web_code": 0.001593410037457943 } }
{ "free_decimal_correspondence": { "primary": { "code": "618.12", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Women — Health and hygiene, Children — Health and hygiene, Gynecology, and Pediatrics" } }, "secondary": { "code": "613.2", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Health and Hygiene" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "9", "label": "FAQ" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
506,798,349,143,886,400
Please use this identifier to cite or link to this item: https://repositorio.ufrn.br/handle/123456789/29210 Title: Relation between bond order and delocalization index of QTAIM Authors: Firme, Caio Lima Antunes, Octávio Augusto Ceva Esteves, Pierre Mothé Keywords: Bond order;Delocalization index;QTAIM Issue Date: 22-Jan-2009 Publisher: Elsevier Citation: FIRME, Caio Lima; ANTUNES, Octávio Augusto Ceva; ESTEVES, Pierre Mothé. Relation between bond order and delocalization index of QTAIM. Chemical Physics Letters, [s. l.], v. 468, n. 4-6, p. 129-133, 22 jan. 2009. ISSN 0009-2614. DOI https://doi.org/10.1016/j.cplett.2008.12.004. Disponível em: https://www.sciencedirect.com/science/article/abs/pii/S0009261408016291#!. Acesso em: 09 jun. 2020. Portuguese Abstract: The formal bond order is half the difference between the number of bonding and anti-bonding electrons. The relation between delocalization index (DI) from QTAIM and formal bond order is linear for CC, NN, GeGe, C–Si, C–Ge and CN bonds. The electronegativity is closely related with the correspondence between the DI and the formal bond order for the CC, NN and GeGe bonds. By using the electronegativity of C, N and Ge atoms, it was obtained a general relation between the formal bond order and the DI for CC, NN and GeGe atomic pairs. URI: https://repositorio.ufrn.br/jspui/handle/123456789/29210 ISSN: 0009-2614 Appears in Collections:IQ - Artigos publicados em periódicos Files in This Item: File Description SizeFormat  RelationBondOrderDelocalizationQTAIM_Firme_2009.pdf285,3 kBAdobe PDFThumbnail View/Open This item is licensed under a Creative Commons License Creative Commons
{ "url": "https://repositorio.ufrn.br/handle/123456789/29210", "source_domain": "repositorio.ufrn.br", "snapshot_id": "crawl=CC-MAIN-2021-43", "warc_metadata": { "Content-Length": "24324", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:7SD4LCHEMPDX2K7BSZB4HART5ZXOHAMC", "WARC-Concurrent-To": "<urn:uuid:fdefbc7f-b483-4029-ade0-017c30fd21f6>", "WARC-Date": "2021-10-18T07:01:37Z", "WARC-IP-Address": "177.20.146.4", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:HA47N56SC2OIO5UEHWVL75FNKSWYZ3PC", "WARC-Record-ID": "<urn:uuid:8996f149-9447-442a-a851-efbaa02a2817>", "WARC-Target-URI": "https://repositorio.ufrn.br/handle/123456789/29210", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:84432b47-8cfb-4b4e-bb7b-83982c096a47>" }, "warc_info": "isPartOf: CC-MAIN-2021-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 108, 177, 203, 233, 255, 303, 327, 347, 750, 1307, 1369, 1385, 1446, 1447, 1467, 1496, 1574, 1584, 1585, 1586 ], "line_end_idx": [ 108, 177, 203, 233, 255, 303, 327, 347, 750, 1307, 1369, 1385, 1446, 1447, 1467, 1496, 1574, 1584, 1585, 1586, 1657 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1657, "ccnet_original_nlines": 20, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.16343489289283752, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.07479224354028702, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3462603986263275, "rps_doc_frac_unique_words": 0.5787037014961243, "rps_doc_mean_word_length": 6.162036895751953, "rps_doc_num_sentences": 32, "rps_doc_symbol_to_word_ratio": 0.0027700799982994795, "rps_doc_unigram_entropy": 4.558716773986816, "rps_doc_word_count": 216, "rps_doc_frac_chars_dupe_10grams": 0.08715251833200455, "rps_doc_frac_chars_dupe_5grams": 0.1667918860912323, "rps_doc_frac_chars_dupe_6grams": 0.1667918860912323, "rps_doc_frac_chars_dupe_7grams": 0.1667918860912323, "rps_doc_frac_chars_dupe_8grams": 0.1667918860912323, "rps_doc_frac_chars_dupe_9grams": 0.1667918860912323, "rps_doc_frac_chars_top_2gram": 0.040571000427007675, "rps_doc_frac_chars_top_3gram": 0.04507888853549957, "rps_doc_frac_chars_top_4gram": 0.040571000427007675, "rps_doc_books_importance": -181.14659118652344, "rps_doc_books_importance_length_correction": -167.67221069335938, "rps_doc_openwebtext_importance": -101.89058685302734, "rps_doc_openwebtext_importance_length_correction": -101.89058685302734, "rps_doc_wikipedia_importance": -82.35449981689453, "rps_doc_wikipedia_importance_length_correction": -70.48146057128906 }, "fasttext": { "dclm": 0.08088797330856323, "english": 0.6418494582176208, "fineweb_edu_approx": 2.33685040473938, "eai_general_math": 0.6160563230514526, "eai_open_web_math": 0.3781130313873291, "eai_web_code": 0.002464710036292672 } }
{ "free_decimal_correspondence": { "primary": { "code": "547.0", "labels": { "level_1": "Science and Natural history", "level_2": "Chemistry", "level_3": "Chemistry, Organic" } }, "secondary": { "code": "541.0", "labels": { "level_1": "Science and Natural history", "level_2": "Chemistry", "level_3": "Chemistry, Physical and theoretical" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
7,638,762,032,832,535,000
March 8, 2014 Advanced MySQL Query Tuning: Webinar followup Q&A Thanks to all who attended my “MySQL Query Tuning” webinar on July 24.  If you missed it, you can you can download the slides and also watch the recorded video. Thank you for the excellent questions after the webinar as well. Query tuning is a big topic and, due to the limited time, I had to skip some material, especially some of the monitoring. I would like, however, to answer all the questions I did not get into during the webinar session. Q: Did you reset the query cache before doing your benchmark on your query? 0.00 seconds sounds too good  A: (This is in response to a couple of slides where the time showed as 0.00). Yes, MySQL was running with query cache disabled. The 0.00 just means that the query was executed in less than 0.004 sec. MySQL does not show the higher precision if you run the query from mysql monitor. There are a couple of ways to get the exact query times: • MySQL 5.0 +: Use “profiling” feature: http://dev.mysql.com/doc/refman/5.5/en/show-profile.html • MySQL 5.1 +: Enable the slow query log with microsecond presision and log the query. To log all queries in the slow query log you can temporary set:  long_query_time = 0 • MySQL 5.6: Use the new performance_schema counters Here is the profile for an example query, the query shows 0.00 seconds: As we can see, sending data is actually 0.002 seconds. Q: Do you ever see doing a seminar that shows how to leverage parallelization (openCL or CUDA) with databases and the performance differences? A:  MySQL does not support it right now. Usually openCL / CUDA does not help with the disk-bounded applications like databases. However, some projects in OLAP space can actually utilize openCL/CUDA, for example, Alenka, is a column store that is massively parallel. Scanning, aggregation, sorting, etc are done in a data flow manner via the CUDA processing.  Q: Is this possible to use this /covered index for order by – A.R/ with join? For example if we want to use where on table A and sort it by column from table B A: Unfortunately, MySQL does not support that with the covered index.  MySQL will only use the filter on the where condition (to limit the number of rows) + filesort. However, if we have a limit clause, MySQL may be able to use the index for order by and stop after finding N rows, matching the condition. It may not be faster thou (as I showed during the webinar) and you may have to use index hints to tell mysql to use the exact index (may not be the best approach as in some cases the use of this index may not be the best for this case). Example: As we can see, MySQL will use index and avoid “order by”. Q: Why are Hash Indexes not available for InnoDB engine ? Any plans to bring Hash indexes. A: InnoDB use Hash Indexes for so called “Adaptive Hash Index” feature.  InnoDB does not  support hash indexes as a normal table index. We are not aware of the Oracle’s InnoDB team plans to bring this feature in. Please note: MySQL will allow you to use “using hash” keyword when creating an index on InnoDB table. However, it will create a b-tree index instead. Q: Will foreign key constraints slow down my queries? A: It may slow down the queries, as InnoDB will have to 1. Check the foreign key constraint table 2. Place a shared lock on the row it will read:  If a FOREIGN KEY constraint is defined on a table, any insert, update, or delete that requires the constraint condition to be checked sets shared record-level locks on the records that it looks at to check the constraint.InnoDB also sets these locks in the case where the constraint fails. (http://dev.mysql.com/doc/refman/5.5/en/innodb-locks-set.html) Q: How does use of index vary with the number of columns selected in a select query? If we are talking about the covered index: if we select a column which is not a part of covered index, mysql will not be able to satisfy the query with index only (“using index” in the explain plan). It may be slower, especially if MySQL will have to select large columns and the data is not cached. In addition, if we select a text or blob column and MySQL will need to create a temporary table, this temporary table will be created ondisk. I’ve described this scenario during the webinar. About Alexander Rubin Alexander joined Percona in 2013. Alexander worked with MySQL since 2000 as DBA and Application Developer. Before joining Percona he was doing MySQL consulting as a principal consultant for over 7 years (started with MySQL AB in 2006, then Sun Microsystems and then Oracle). He helped many customers design large, scalable and highly available MySQL systems and optimize MySQL performance. Alexander also helped customers design Big Data stores with Apache Hadoop and related technologies. Comments 1. Karuthappandyan.M says: Hi sir, I am new for mysql, I am started to studying the mysql query tuning to improve my application runs faster. I have one dough regarding Mysql performance Tuning, I need to know left join is better than inner join to produce a quick report for a query? Speak Your Mind *  
{ "url": "http://www.mysqlperformanceblog.com/2013/08/02/advanced-mysql-query-tuning-webinar-followup-qa/", "source_domain": "www.mysqlperformanceblog.com", "snapshot_id": "crawl=CC-MAIN-2014-10", "warc_metadata": { "Content-Length": "78050", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:MTHKEDRYKY2U23OYM6HIM5HZWQ45ZGOI", "WARC-Concurrent-To": "<urn:uuid:a8e41a32-8d5d-4431-8623-77c833303aae>", "WARC-Date": "2014-03-08T21:47:39Z", "WARC-IP-Address": "74.121.199.234", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:KGKWH3LWVDZB3ICSZTG73BCM46DVXFMB", "WARC-Record-ID": "<urn:uuid:676641b6-6a63-4054-b57f-74e1651ab391>", "WARC-Target-URI": "http://www.mysqlperformanceblog.com/2013/08/02/advanced-mysql-query-tuning-webinar-followup-qa/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:b8cc3880-63f1-4f4f-9b49-6f5090dd73fa>" }, "warc_info": "robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 14, 15, 65, 66, 512, 513, 619, 620, 959, 960, 1059, 1233, 1288, 1289, 1361, 1362, 1417, 1418, 1561, 1562, 1920, 1921, 2082, 2083, 2635, 2636, 2694, 2695, 2786, 2787, 3000, 3001, 3151, 3152, 3206, 3207, 3263, 3264, 3308, 3359, 3360, 3713, 3714, 3799, 3800, 4100, 4101, 4292, 4293, 4315, 4316, 4806, 4807, 4816, 4817, 4846, 4847, 4859, 4860, 5114, 5115, 5131, 5132, 5134, 5135 ], "line_end_idx": [ 14, 15, 65, 66, 512, 513, 619, 620, 959, 960, 1059, 1233, 1288, 1289, 1361, 1362, 1417, 1418, 1561, 1562, 1920, 1921, 2082, 2083, 2635, 2636, 2694, 2695, 2786, 2787, 3000, 3001, 3151, 3152, 3206, 3207, 3263, 3264, 3308, 3359, 3360, 3713, 3714, 3799, 3800, 4100, 4101, 4292, 4293, 4315, 4316, 4806, 4807, 4816, 4817, 4846, 4847, 4859, 4860, 5114, 5115, 5131, 5132, 5134, 5135, 5136 ] }
{ "red_pajama_v2": { "ccnet_original_length": 5136, "ccnet_original_nlines": 65, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.37884268164634705, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.033453889191150665, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.19349004328250885, "rps_doc_frac_unique_words": 0.4058624505996704, "rps_doc_mean_word_length": 4.512965202331543, "rps_doc_num_sentences": 68, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.2717976570129395, "rps_doc_word_count": 887, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.009992510080337524, "rps_doc_frac_chars_dupe_6grams": 0.009992510080337524, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.011991010047495365, "rps_doc_frac_chars_top_3gram": 0.011991010047495365, "rps_doc_frac_chars_top_4gram": 0.007494380231946707, "rps_doc_books_importance": -594.6669311523438, "rps_doc_books_importance_length_correction": -594.6669311523438, "rps_doc_openwebtext_importance": -332.9347839355469, "rps_doc_openwebtext_importance_length_correction": -332.9347839355469, "rps_doc_wikipedia_importance": -255.0280303955078, "rps_doc_wikipedia_importance_length_correction": -255.0280303955078 }, "fasttext": { "dclm": 0.03860050067305565, "english": 0.9051023125648499, "fineweb_edu_approx": 1.5446981191635132, "eai_general_math": 0.46753400564193726, "eai_open_web_math": 0.15291845798492432, "eai_web_code": 0.7066453099250793 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.746", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
224,480,958,407,088,500
IP Address Geolocation 51.133.208.45 - IP Address Geolocation 51.133.208.45 is an IPv4 address owned by Department Work and Pensions and located in Manchester, United Kingdom If you believe something above is incorrect, please let us know and report wrong data Try our free IP geolocation API ~$ curl http://api.db-ip.com/v2/free/51.133.208.45 { "ipAddress": "51.133.208.45", "continentCode": "EU", "continentName": "Europe", "countryCode": "GB", "countryName": "United Kingdom", "stateProv": "England", "city": "Manchester", } ~$ curl http://api.db-ip.com/v2/free/51.133.208.45/countryName United Kingdom   Learn more The free API is limited to 1,000 daily requests and returns city level location data only, if you require larger query volumes or more information such as latitude/longitude, ISP details or threat level assessment, please see our commercial offers.
{ "url": "https://db-ip.com/51.133.208.45", "source_domain": "db-ip.com", "snapshot_id": "crawl=CC-MAIN-2021-10", "warc_metadata": { "Content-Length": "16969", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:OJF3YHEMM66RQJ5AVSTCF5USYOTPI7XQ", "WARC-Concurrent-To": "<urn:uuid:4dce12a8-ab7f-46bc-96ca-b44a827f9874>", "WARC-Date": "2021-03-04T09:13:52Z", "WARC-IP-Address": "172.67.75.166", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:CZJP3KCVYNQRQUK4LRJEAFZU2ZZ652VI", "WARC-Record-ID": "<urn:uuid:f063846e-2bac-423f-b90c-f9538f8c25ee>", "WARC-Target-URI": "https://db-ip.com/51.133.208.45", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:4de893d2-32b2-410c-a99e-f14f721d4987>" }, "warc_info": "isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-59.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 23, 24, 63, 64, 177, 178, 264, 265, 297, 298, 349, 351, 385, 409, 437, 459, 493, 518, 541, 543, 606, 621, 622, 635, 636 ], "line_end_idx": [ 23, 24, 63, 64, 177, 178, 264, 265, 297, 298, 349, 351, 385, 409, 437, 459, 493, 518, 541, 543, 606, 621, 622, 635, 636, 884 ] }
{ "red_pajama_v2": { "ccnet_original_length": 884, "ccnet_original_nlines": 25, "rps_doc_curly_bracket": 0.0022624400444328785, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.16190476715564728, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03809523954987526, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.44285714626312256, "rps_doc_frac_unique_words": 0.7196261882781982, "rps_doc_mean_word_length": 6.196261882781982, "rps_doc_num_sentences": 20, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.2369608879089355, "rps_doc_word_count": 107, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.05882352963089943, "rps_doc_frac_chars_top_3gram": 0.06033182889223099, "rps_doc_frac_chars_top_4gram": 0.09049773961305618, "rps_doc_books_importance": -67.03703308105469, "rps_doc_books_importance_length_correction": -67.03703308105469, "rps_doc_openwebtext_importance": -44.8359489440918, "rps_doc_openwebtext_importance_length_correction": -37.35634994506836, "rps_doc_wikipedia_importance": -40.540374755859375, "rps_doc_wikipedia_importance_length_correction": -40.540374755859375 }, "fasttext": { "dclm": 0.024944959208369255, "english": 0.8221070170402527, "fineweb_edu_approx": 1.2638633251190186, "eai_general_math": 0.00003409000055398792, "eai_open_web_math": 0.011313079856336117, "eai_web_code": 0.003276109928265214 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.677", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "1", "label": "Factual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "1", "label": "No Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "6", "label": "Not Applicable/Indeterminate" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
2,362,636,604,517,814,300
font size Polycystic Kidney Disease (cont.) What is autosomal recessive PKD? Autosomal recessive PKD is caused by a mutation in the autosomal recessive PKD gene, called PKHD1. Other genes for the disease might exist but have not yet been discovered by scientists. We all carry two copies of every gene. Parents who do not have PKD can have a child with the disease if both parents carry one copy of the abnormal gene and both pass that gene copy to their baby. The chance of the child having autosomal recessive PKD when both parents carry the abnormal gene is 25 percent. If only one parent carries the abnormal gene, the baby cannot get autosomal recessive PKD but could ultimately pass the abnormal gene to his or her children. The signs of autosomal recessive PKD frequently begin before birth, so it is often called "infantile PKD." Children born with autosomal recessive PKD often, but not always, develop kidney failure before reaching adulthood. Severity of the disease varies. Babies with the worst cases die hours or days after birth due to respiratory difficulties or respiratory failure. Some people with autosomal recessive PKD do not develop symptoms until later in childhood or even adulthood. Liver scarring occurs in all patients with autosomal recessive PKD and tends to become more of a medical concern with increasing age. What are the symptoms of autosomal recessive PKD? Children with autosomal recessive PKD experience high blood pressure, urinary tract infections, and frequent urination. The disease usually affects the liver and spleen, resulting in low blood cell counts, varicose veins, and hemorrhoids. Because kidney function is crucial for early physical development, children with autosomal recessive PKD and decreased kidney function are usually smaller than average size. Recent studies suggest that growth problems may be a primary feature of autosomal recessive PKD. Medically Reviewed by a Doctor on 3/19/2014 Patient Comments Viewers share their comments PKD - Experience Question: Please describe your experience with PKD. PKD - Autosomal Dominant Symptoms Question: What symptoms did you experience with autosomal dominant PKD? PKD - Autosomal Dominant Treatment Question: What was the treatment for autosomal dominant PKD? PKD - Autosomal Recessive Symptoms Question: What symptoms did you or someone you know experience with autosomal recessive PKD? PKD - Autosomal Recessive Treatment Question: What treatments were effective with your case, or someone you knows case of autosomal recessive PKD? Source: MedicineNet.com http://www.medicinenet.com/polycystic_kidney_disease/article.htm Women's Health Find out what women really need. advertisement advertisement Use Pill Finder Find it Now See Interactions Pill Identifier on RxList • quick, easy, pill identification Find a Local Pharmacy • including 24 hour, pharmacies Interaction Checker • Check potential drug interactions Search the Medical Dictionary for Health Definitions & Medical Abbreviations
{ "url": "http://www.rxlist.com/polycystic_kidney_disease/page5.htm", "source_domain": "www.rxlist.com", "snapshot_id": "crawl=CC-MAIN-2014-15", "warc_metadata": { "Content-Length": "61889", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:NYN4FLHOFI6K6XHG7XSYICFPYZGTNMZN", "WARC-Concurrent-To": "<urn:uuid:9663d6e3-ebc9-4688-8af1-253d34dca440>", "WARC-Date": "2014-04-25T09:44:12Z", "WARC-IP-Address": "23.3.75.72", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:NN5WQUT7AXHWWW46BTER4CMMGYUZDUIK", "WARC-Record-ID": "<urn:uuid:5398d26e-9e76-4d48-9ff8-2cdbc5c52e6c>", "WARC-Target-URI": "http://www.rxlist.com/polycystic_kidney_disease/page5.htm", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:df7dae3d-b771-4256-ab2b-f3179bfb3386>" }, "warc_info": "robots: classic\r\nhostname: ip-10-147-4-33.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-15\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for April 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 10, 11, 45, 46, 79, 80, 734, 735, 1104, 1105, 1348, 1349, 1399, 1400, 1910, 1911, 1955, 1956, 1973, 1974, 2003, 2004, 2073, 2179, 2275, 2403, 2550, 2574, 2639, 2640, 2655, 2656, 2689, 2690, 2704, 2718, 2763, 2764, 2790, 2791, 2808, 2832, 2833, 2855, 2856, 2890, 2891, 2911, 2912, 2950 ], "line_end_idx": [ 10, 11, 45, 46, 79, 80, 734, 735, 1104, 1105, 1348, 1349, 1399, 1400, 1910, 1911, 1955, 1956, 1973, 1974, 2003, 2004, 2073, 2179, 2275, 2403, 2550, 2574, 2639, 2640, 2655, 2656, 2689, 2690, 2704, 2718, 2763, 2764, 2790, 2791, 2808, 2832, 2833, 2855, 2856, 2890, 2891, 2911, 2912, 2950, 3026 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3026, "ccnet_original_nlines": 50, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.303846150636673, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.05000000074505806, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.13846154510974884, "rps_doc_frac_unique_words": 0.49103137850761414, "rps_doc_mean_word_length": 5.549327373504639, "rps_doc_num_sentences": 30, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.912156105041504, "rps_doc_word_count": 446, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.09252525120973587, "rps_doc_frac_chars_dupe_6grams": 0.027474749833345413, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.12363635748624802, "rps_doc_frac_chars_top_3gram": 0.12727272510528564, "rps_doc_frac_chars_top_4gram": 0.060606058686971664, "rps_doc_books_importance": -182.0763702392578, "rps_doc_books_importance_length_correction": -182.0763702392578, "rps_doc_openwebtext_importance": -121.67413330078125, "rps_doc_openwebtext_importance_length_correction": -121.67413330078125, "rps_doc_wikipedia_importance": -106.873291015625, "rps_doc_wikipedia_importance_length_correction": -106.873291015625 }, "fasttext": { "dclm": 0.38813143968582153, "english": 0.9191527366638184, "fineweb_edu_approx": 3.2292096614837646, "eai_general_math": 0.007352590095251799, "eai_open_web_math": 0.17590802907943726, "eai_web_code": 0.00041360000614076853 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.222", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.22", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "1", "label": "Factual" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "5", "label": "Comment Section" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
-6,252,926,145,780,085,000
EPP 地球与行星物理 ISSN  2096-3955 CN  10-1502/P In situ evidence of resonant interactions between energetic electrons and whistler waves in magnetopause reconnection Zhi Li, QuanMing Lu, RongSheng Wang, XinLiang Gao, HuaYue Chen 2019, 3(6): 467-473. doi: 10.26464/epp2019048 Keywords: magnetic reconnection, whistler waves, magnetosphere, energetic electrons Study on electron stochastic motions in the magnetosonic wave field: Test particle simulations Kai Fan, XinLiang Gao, QuanMing Lu, and Shui Wang doi: 10.26464/epp2021052 Keywords: magnetosonic waves, electron stochastic motions, bounce resonances, test particle simulations Supported by Beijing Renhe Information Technology Co. LtdE-mail: [email protected]
{ "url": "http://eppcgs.xml-journal.net/search/author?author=%20%20XinLiang%20Gao&pageType=en", "source_domain": "eppcgs.xml-journal.net", "snapshot_id": "crawl=CC-MAIN-2021-39", "warc_metadata": { "Content-Length": "27602", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:UUE6I7QGU6FLKCKOFKPNK2O2DU4BI5UH", "WARC-Concurrent-To": "<urn:uuid:a04b1a39-e78b-4a50-9194-4e0d324dea3b>", "WARC-Date": "2021-09-22T17:58:01Z", "WARC-IP-Address": "47.254.66.91", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:ZAEAEBGTVLPQ6FJR4W5H4JWV4QX7CNRZ", "WARC-Record-ID": "<urn:uuid:2beb84c5-74d0-45b0-8903-82483ba7204b>", "WARC-Target-URI": "http://eppcgs.xml-journal.net/search/author?author=%20%20XinLiang%20Gao&pageType=en", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:05da9377-110e-48fb-842c-f5dc9c47dc89>" }, "warc_info": "isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-232\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 4, 5, 13, 14, 30, 31, 45, 46, 164, 227, 273, 357, 452, 502, 527, 631, 632 ], "line_end_idx": [ 4, 5, 13, 14, 30, 31, 45, 46, 164, 227, 273, 357, 452, 502, 527, 631, 632, 710 ] }
{ "red_pajama_v2": { "ccnet_original_length": 710, "ccnet_original_nlines": 17, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.06666667014360428, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.029629629105329514, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3629629611968994, "rps_doc_frac_unique_words": 0.7386363744735718, "rps_doc_mean_word_length": 6.590909004211426, "rps_doc_num_sentences": 6, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.103117942810059, "rps_doc_word_count": 88, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.06206896901130676, "rps_doc_frac_chars_top_3gram": 0.08620689809322357, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -42.00834655761719, "rps_doc_books_importance_length_correction": -42.46647644042969, "rps_doc_openwebtext_importance": -28.524572372436523, "rps_doc_openwebtext_importance_length_correction": -28.982704162597656, "rps_doc_wikipedia_importance": -14.99046516418457, "rps_doc_wikipedia_importance_length_correction": -15.448596000671387 }, "fasttext": { "dclm": 0.08645200729370117, "english": 0.5583457350730896, "fineweb_edu_approx": 2.8394269943237305, "eai_general_math": 0.8089606165885925, "eai_open_web_math": 0.3557687997817993, "eai_web_code": 0.00048613999388180673 } }
{ "free_decimal_correspondence": { "primary": { "code": "523.1", "labels": { "level_1": "Science and Natural history", "level_2": "Astronomy", "level_3": "" } }, "secondary": { "code": "530.12", "labels": { "level_1": "Science and Natural history", "level_2": "Physics", "level_3": "" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "6", "label": "Content Listing" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "6", "label": "Not Applicable/Indeterminate" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "5", "label": "Indeterminate" } } }
71f077df794da2774531b20248bb19b0
-6,887,322,966,870,225,000
Search Results You are looking at 1 - 10 of 16 items for • Author: Alejandro Pérez-Castilla x • Refine by Access: All Content x Clear All Modify Search Restricted access Changes in the Load–Velocity Profile Following Power- and Strength-Oriented Resistance-Training Programs Alejandro Pérez-Castilla and Amador García-Ramos Objective: To compare the short-term effect of power- and strength-oriented resistance-training programs on the individualized load–velocity profiles obtained during the squat (SQ) and bench-press (BP) exercises. Methods: Thirty physically active men (age = 23.4 [3.5] y; SQ 1-repetition maximum [1RM] = 126.5 [26.7] kg; BP 1RM = 81.6 [16.7] kg) were randomly assigned to a power- (exercises: countermovement jump and BP throw; sets per exercise: 4–6; repetitions per set: 5–6; load: 40% 1RM) or strength-training group (exercises: SQ and BP; sets per exercise: 4–6; repetitions per set: 2–8; load: 70%–90% 1RM). The training program lasted 4 wk (2 sessions/wk). The individualized load–velocity profiles (ie, velocity associated with the 30%–60%–90% 1RM) were assessed before and after training through an incremental loading test during the SQ and BP exercises. Results: The power-training group moderately increased the velocity associated with the full spectrum of % 1RM for the SQ (effect size [ES] range: 0.70 to 0.93) and with the 30% 1RM for the BP (ES: 0.67), while the strength-training group reported trivial/small changes across the load–velocity spectrum for both the SQ (ES range: 0.00 to 0.35) and BP (ES range: −0.06 to −0.33). The power-training group showed a higher increase in the mean velocity associated with all % 1RM compared with the strength-training group for both the SQ (ES range: 0.54 to 0.63) and BP (ES range: 0.25 to 0.53). Conclusions: The individualized load–velocity profile (ie, velocity associated with different % 1RM) of lower-body and upper-body exercises can be modified after a 4-wk resistance-training program. Restricted access Sensitivity of the iLOAD® Application for Monitoring Changes in Barbell Velocity Following Power- and Strength-Oriented Resistance Training Programs Alejandro Pérez-Castilla, Daniel Boullosa, and Amador García-Ramos Objective: To evaluate the sensitivity of the iLOAD® application to detect the changes in mean barbell velocity of complete sets following power- and strength-oriented resistance training (RT) programs. Methods: Twenty men were randomly assigned to a power training group (countermovement jump and bench press throw at 40% of the 1-repetition maximum [1RM]) or strength training group (back squat and bench press at 70% to 90% of 1RM). Single sets of 10 repetitions at 25% and 70% of 1RM during the back squat and bench press exercises were assessed before and after the 4-week RT programs simultaneously with the iLOAD® application and a linear velocity transducer. Results: The power training group showed a greater increment in velocity performance at the 25% of 1RM (effect size range = 0.66–1.53) and the 70% of 1RM (effect size range = 0.11–0.30). The percent change in mean velocity after the RT programs highly correlated between the iLOAD® application and the linear velocity transducer for the back squat (r range = .85–.88) and bench press (r range = .87–.93). However, the iLOAD® application revealed a 2% greater increase in mean velocity after training compared to the linear velocity transducer. Conclusions: The iLOAD® application is a cost-effective, portable, and easy-to-use tool which can be used to detect changes in mean barbell velocity after power- and strength-oriented RT programs. Restricted access Lifting Velocity as a Predictor of the Maximum Number of Repetitions That Can Be Performed to Failure During the Prone Bench Pull Exercise Sergio Miras-Moreno, Alejandro Pérez-Castilla, and Amador García-Ramos Objective: To explore (1) the goodness of fit of generalized and individualized relationships between the maximum number of repetitions performed to failure (RTF) and the fastest mean velocity and peak velocity of the sets (RTF–velocity relationships), (2) the between-sessions reliability of mean velocity and peak velocity values associated with different RTFs, and (3) whether the errors in the prediction of the RTF under fatigued and nonfatigued conditions differ between generalized and individualized RTF–velocity relationships. Methods: Twenty-three sport-science students performed 4 testing sessions with the prone bench pull exercise in a Smith machine: a 1-repetition-maximum [1RM] session, 2 identical sessions consisting of singles sets of RTF against 4 randomized loads (60%–70%–80%–90%1RM), and 1 session consisting of 4 sets of RTF against the 75%1RM. Results: Individualized RTF–velocity relationships presented a higher goodness of fit (r 2 = .96–.97 vs .67–.70) and accuracy (absolute errors = 2.1–2.9 repetitions vs 2.8–4.3 repetitions) in the prediction of the RTF than generalized RTF–velocity relationships. The reliability of the velocity values associated with different RTFs was generally high (average within-subject coefficient of variation = 4.01% for mean velocity and 3.98% for peak velocity). The error in the prediction of the RTF increased by ~1 repetition under fatigue (ie, set 1 vs sets 2–4). Conclusions: Individualized RTF–velocity relationships can be used with acceptable precision and reliability to prescribe the loads associated with a given RTF during the match a specific XRM during the prone bench pull exercise, but a lower accuracy is expected in a fatigued state. Restricted access Selective Changes in the Mechanical Capacities of Lower-Body Muscles After Cycle-Ergometer Sprint Training Against Heavy and Light Resistances Amador García-Ramos, Alejandro Torrejón, Alejandro Pérez-Castilla, Antonio J. Morales-Artacho, and Slobodan Jaric Purpose: To explore the feasibility of the linear force–velocity (F–V) modeling approach to detect selective changes of F–V parameters (ie, maximum force [F 0], maximum velocity [V 0], F–V slope [a], and maximum power [P 0]) after a sprint-training program. Methods: Twenty-seven men were randomly assigned to a heavy-load group (HLG), light-load group (LLG), or control group (CG). The training sessions (6 wk × 2 sessions/wk) comprised performing 8 maximal-effort sprints against either heavy (HLG) or light (LLG) resistances in leg cycle-ergometer exercise. Pre- and posttest consisted of the same task performed against 4 different resistances that enabled the determination of the F–V parameters through the application of the multiple-point method (4 resistances used for the F–V modeling) and the recently proposed 2-point method (only the 2 most distinctive resistances used). Results: Both the multiple-point and the 2-point methods revealed high reliability (all coefficients of variation <5% and intraclass correlation coefficients >.80) while also being able to detect the group-specific training-related changes. Large increments of F 0, a, and P 0 were observed in HLG compared with LLG and CG (effect size [ES] = 1.29–2.02). Moderate increments of V 0 were observed in LLG compared with HLG and CG (ES = 0.87–1.15). Conclusions: Short-term sprint training on a leg cycle ergometer induces specific changes in F–V parameters that can be accurately monitored by applying just 2 distinctive resistances during routine testing. Restricted access Optimal Resistive Forces for Maximizing the Reliability of Leg Muscles’ Capacities Tested on a Cycle Ergometer Amador García-Ramos, Alejandro Torrejón, Antonio J. Morales-Artacho, Alejandro Pérez-Castilla, and Slobodan Jaric This study determined the optimal resistive forces for testing muscle capacities through the standard cycle ergometer test (1 resistive force applied) and a recently developed 2-point method (2 resistive forces used for force-velocity modelling). Twenty-six men were tested twice on maximal sprints performed on a leg cycle ergometer against 5 flywheel resistive forces (R1–R5). The reliability of the cadence and maximum power measured against the 5 individual resistive forces, as well as the reliability of the force-velocity relationship parameters obtained from the selected 2-point methods (R1–R2, R1–R3, R1–R4, and R1–R5), were compared. The reliability of outcomes obtained from individual resistive forces was high except for R5. As a consequence, the combination of R1 (≈175 rpm) and R4 (≈110 rpm) provided the most reliable 2-point method (CV: 1.46%–4.04%; ICC: 0.89–0.96). Although the reliability of power capacity was similar for the R1–R4 2-point method (CV: 3.18%; ICC: 0.96) and the standard test (CV: 3.31%; ICC: 0.95), the 2-point method should be recommended because it also reveals maximum force and velocity capacities. Finally, we conclude that the 2-point method in cycling should be based on 2 distant resistive forces, but avoiding cadences below 110 rpm. Restricted access Influence of Coaching Condition on the Magnitude and Reliability of Drop Jump Height in Men and Women Alejandro Pérez-Castilla, F. Javier Rojas, John F.T. Fernandes, Federico Gómez-Martínez, and Amador García-Ramos This study examined the effect of different coaching conditions on the magnitude and reliability of drop jump height in men and women. Nineteen collegiate sport sciences students (10 men) performed two sets of 10 drop jumps under four different coaching conditions: neutral, augmented feedback, external focus of attention, and a combination of augmented feedback and external focus of attention. The augmented feedback condition revealed a significantly higher jump height than the neutral condition (p = .002), while no significant differences were observed for the remaining conditions (p ≥ .38). The external focus of attention condition was more reliable than the neutral and augmented feedback conditions (coefficient of variationratio ≥ 1.15), while no differences were observed between the remaining conditions. These results suggest that both the magnitude and reliability of the drop jump height performance are influenced by the coaching condition. Restricted access Precision of 7 Commercially Available Devices for Predicting Bench-Press 1-Repetition Maximum From the Individual Load–Velocity Relationship Alejandro Pérez-Castilla, Antonio Piepoli, Gabriel Garrido-Blanca, Gabriel Delgado-García, Carlos Balsalobre-Fernández, and Amador García-Ramos Objective: To compare the accuracy of different devices to predict the bench-press 1-repetition maximum (1RM) from the individual load–velocity relationship modeled through the multiple- and 2-point methods. Methods: Eleven men performed an incremental test on a Smith machine against 5 loads (45–55–65–75–85%1RM), followed by 1RM attempts. The mean velocity was simultaneously measured by 1 linear velocity transducer (T-Force), 2 linear position transducers (Chronojump and Speed4Lift), 1 camera-based optoelectronic system (Velowin), 2 inertial measurement units (PUSH Band and Beast Sensor), and 1 smartphone application (My Lift). The velocity recorded at the 5 loads (45–55–65–75–85%1RM), or only at the 2 most distant loads (45–85%1RM), was considered for the multiple- and 2-point methods, respectively. Results: An acceptable and comparable accuracy in the estimation of the 1RM was observed for the T-Force, Chronojump, Speed4Lift, Velowin, and My Lift when using both the multiple- and 2-point methods (effect size ≤ 0.40; Pearson correlation coefficient [r] ≥ .94; standard error of the estimate [SEE] ≤ 4.46 kg), whereas the accuracy of the PUSH (effect size = 0.70–0.83; r = .93–.94; SEE = 4.45–4.80 kg), and especially the Beast Sensor (effect size = 0.36–0.84; r = .50–.68; SEE = 9.44–11.2 kg), was lower. Conclusions: These results highlight that the accuracy of 1RM prediction methods based on movement velocity is device dependent, with the inertial measurement units providing the least accurate estimate of the 1RM. Restricted access Reliability of the Load–Velocity Relationship Obtained Through Linear and Polynomial Regression Models to Predict the 1-Repetition Maximum Load Francisco Luis Pestaña-Melero, G. Gregory Haff, Francisco Javier Rojas, Alejandro Pérez-Castilla, and Amador García-Ramos This study aimed to compare the between-session reliability of the load–velocity relationship between (1) linear versus polynomial regression models, (2) concentric-only versus eccentric–concentric bench press variants, as well as (3) the within-participants versus the between-participants variability of the velocity attained at each percentage of the 1-repetition maximum. The load–velocity relationship of 30 men (age: 21.2 [3.8] y; height: 1.78 [0.07] m, body mass: 72.3 [7.3] kg; bench press 1-repetition maximum: 78.8 [13.2] kg) were evaluated by means of linear and polynomial regression models in the concentric-only and eccentric–concentric bench press variants in a Smith machine. Two sessions were performed with each bench press variant. The main findings were: (1) first-order polynomials (coefficient of variation: 4.39%–4.70%) provided the load–velocity relationship with higher reliability than the second-order polynomials (coefficient of variation: 4.68%–5.04%); (2) the reliability of the load–velocity relationship did not differ between the concentric-only and eccentric–concentric bench press variants; and (3) the within-participants variability of the velocity attained at each percentage of the 1-repetition maximum was markedly lower than the between-participants variability. Taken together, these results highlight that, regardless of the bench press variant considered, the individual determination of the load–velocity relationship by a linear regression model could be recommended to monitor and prescribe the relative load in the Smith machine bench press exercise. Restricted access Differences in the Load–Velocity Profile Between 4 Bench-Press Variants Amador García-Ramos, Francisco Luis Pestaña-Melero, Alejandro Pérez-Castilla, Francisco Javier Rojas, and Guy Gregory Haff Purpose: To compare the load–velocity relationship between 4 variants of the bench-press (BP) exercise. Methods: The full load–velocity relationship of 30 men was evaluated by means of an incremental loading test starting at 17 kg and progressing to the individual 1-repetition maximum (1RM) in 4 BP variants: concentric-only BP, concentric-only BP throw (BPT), eccentric-concentric BP, and eccentric-concentric BPT. Results: A strong and fairly linear relationship between mean velocity (MV) and %1RM was observed for the 4 BP variants (r 2 > .96 for pooled data and r 2 > .98 for individual data). The MV associated with each %1RM was significantly higher in the eccentric-concentric technique than in the concentric-only technique. The only significant difference between the BP and BPT variants was the higher MV with the light to moderate loads (20–70%1RM) in the BPT using the concentric-only technique. MV was significantly and positively correlated between the 4 BP variants (r = .44–.76), which suggests that the subjects with higher velocities for each %1RM in 1 BP variant also tend to have higher velocities for each %1RM in the 3 other BP variants. Conclusions: These results highlight the need for obtaining specific equations for each BP variant and the existence of individual load–velocity profiles. Restricted access Validity of a Linear Velocity Transducer for Testing Maximum Vertical Jumps Alejandro Pérez-Castilla, Belén Feriche, Slobodan Jaric, Paulino Padial, and Amador García-Ramos This study aimed to examine the validity of mechanical variables obtained by a linear velocity transducer from the unconstrained and constrained squat jump (SJ). Twenty-three men were tested on the unconstrained SJ and the SJ constrained by a Smith machine. Maximum values of force, velocity, and power were simultaneously recorded both by a linear velocity transducer attached to a bar of mass of 17, 30, 45, 60, and 75 kg and by a force plate. Linear velocity transducer generally overestimated the outcomes measured as compared to the force plate, particularly in unconstrained SJ. Bland-Altman plots revealed that heteroscedasticity of errors was mainly observed for velocity variables (r 2 = .26–.58) where the differences were negatively associated with the load magnitude. However, exceptionally high correlations were observed between the same outcomes recorded with the 2 methods in both unconstrained (median r = .89 [.71–.95]) and constrained SJ (r = .90 [.65–.95]). Although the systematic and proportional bias needs to be acknowledged, the high correlations between the variables obtained by 2 methods suggest that the linear velocity transducer could provide valid values of the force, velocity, and power outputs from both unconstrained and constrained SJ.
{ "url": "https://journals.humankinetics.com/search?access=all&f_0=author&q_0=Alejandro+P%C3%A9rez-Castilla", "source_domain": "journals.humankinetics.com", "snapshot_id": "CC-MAIN-2024-10", "warc_metadata": { "Content-Length": "170913", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:Y3BORAC47NPWI7QXVR4OBT2LQI4PFF3R", "WARC-Concurrent-To": "<urn:uuid:df06c136-d76d-408c-ad5c-380b742df5dd>", "WARC-Date": "2024-02-28T00:04:08Z", "WARC-IP-Address": "63.34.154.161", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:7UH3SX6HTE6I2YML7QMU3MT2ZRCW7LZG", "WARC-Record-ID": "<urn:uuid:bece7da7-0035-4cc7-98fb-735920bbe5ac>", "WARC-Target-URI": "https://journals.humankinetics.com/search?access=all&f_0=author&q_0=Alejandro+P%C3%A9rez-Castilla", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:68343326-46de-44fc-af10-2116763af309>" }, "warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-31\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 15, 16, 58, 59, 98, 134, 158, 176, 177, 282, 283, 332, 333, 1988, 1989, 2007, 2008, 2157, 2158, 2225, 2226, 3634, 3635, 3653, 3654, 3793, 3794, 3865, 3866, 5581, 5582, 5600, 5601, 5744, 5745, 5859, 5860, 7399, 7400, 7418, 7419, 7530, 7531, 7645, 7646, 8928, 8929, 8947, 8948, 9050, 9051, 9164, 9165, 10125, 10126, 10144, 10145, 10286, 10287, 10431, 10432, 11969, 11970, 11988, 11989, 12133, 12134, 12256, 12257, 13856, 13857, 13875, 13876, 13948, 13949, 14072, 14073, 15390, 15391, 15409, 15410, 15486, 15487, 15584, 15585 ], "line_end_idx": [ 15, 16, 58, 59, 98, 134, 158, 176, 177, 282, 283, 332, 333, 1988, 1989, 2007, 2008, 2157, 2158, 2225, 2226, 3634, 3635, 3653, 3654, 3793, 3794, 3865, 3866, 5581, 5582, 5600, 5601, 5744, 5745, 5859, 5860, 7399, 7400, 7418, 7419, 7530, 7531, 7645, 7646, 8928, 8929, 8947, 8948, 9050, 9051, 9164, 9165, 10125, 10126, 10144, 10145, 10286, 10287, 10431, 10432, 11969, 11970, 11988, 11989, 12133, 12134, 12256, 12257, 13856, 13857, 13875, 13876, 13948, 13949, 14072, 14073, 15390, 15391, 15409, 15410, 15486, 15487, 15584, 15585, 16857 ] }
{ "red_pajama_v2": { "ccnet_original_length": 16857, "ccnet_original_nlines": 85, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.24039295315742493, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.04622941091656685, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3126264214515686, "rps_doc_frac_unique_words": 0.2737847864627838, "rps_doc_mean_word_length": 5.668051719665527, "rps_doc_num_sentences": 161, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.626917362213135, "rps_doc_word_count": 2407, "rps_doc_frac_chars_dupe_10grams": 0.018764199689030647, "rps_doc_frac_chars_dupe_5grams": 0.17261599004268646, "rps_doc_frac_chars_dupe_6grams": 0.08590485900640488, "rps_doc_frac_chars_dupe_7grams": 0.049695808440446854, "rps_doc_frac_chars_dupe_8grams": 0.018764199689030647, "rps_doc_frac_chars_dupe_9grams": 0.018764199689030647, "rps_doc_frac_chars_top_2gram": 0.011361139826476574, "rps_doc_frac_chars_top_3gram": 0.015832290053367615, "rps_doc_frac_chars_top_4gram": 0.008795719593763351, "rps_doc_books_importance": -1597.38525390625, "rps_doc_books_importance_length_correction": -1597.38525390625, "rps_doc_openwebtext_importance": -1052.1922607421875, "rps_doc_openwebtext_importance_length_correction": -1052.1922607421875, "rps_doc_wikipedia_importance": -864.7196044921875, "rps_doc_wikipedia_importance_length_correction": -864.7196044921875 }, "fasttext": { "dclm": 0.048184219747781754, "english": 0.8973150849342346, "fineweb_edu_approx": 1.903207540512085, "eai_general_math": 0.854267418384552, "eai_open_web_math": 0.4116635322570801, "eai_web_code": 0.1257493495941162 } }
{ "free_decimal_correspondence": { "primary": { "code": "613.71", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Health and Hygiene" } }, "secondary": { "code": "613.7", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Health and Hygiene" } } }, "bloom_cognitive_process": { "primary": { "code": "5", "label": "Evaluate" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "6", "label": "Content Listing" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
3,630,608,810,886,406,700
Posted on Write a Python program WSDpy that implements the Naive Bayes algorithm for word Write a Python program WSD.py that implements the Naive Bayes algorithm for word sensedisambiguation, as discussed in class. Specifically, your program will have to assign a giventarget word with its correct sense in a number of test examples. You are not to use externallibraries such as pandas, scikit-learn, or NLTK.Please implement the Naive Bayes algorithm and cross-validation yourself, do notuse scikit-learn (or other machine learning library).You will train and test your program on a datase Read More
{ "url": "https://gotit-pro.com/tag/all-the-words-found-in-the-context-of-the-target-word-will-represent-the-features-tobe-considered2/", "source_domain": "gotit-pro.com", "snapshot_id": "CC-MAIN-2024-22", "warc_metadata": { "Content-Length": "91338", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:BI6IOOFV3JH5HTP7EOCUVENDJT7VNJ5G", "WARC-Concurrent-To": "<urn:uuid:166edf4c-acde-4d4b-ba9c-16f4770758ce>", "WARC-Date": "2024-05-20T16:04:46Z", "WARC-IP-Address": "162.0.229.247", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:PG6JEFUEEC64OX42SJ42C3P7UDPBW43L", "WARC-Record-ID": "<urn:uuid:eecf3747-5742-4062-9d4b-4b4abe8b5b09>", "WARC-Target-URI": "https://gotit-pro.com/tag/all-the-words-found-in-the-context-of-the-target-word-will-represent-the-features-tobe-considered2/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:386f4125-167f-4e7c-833c-02d77aa9b31c>" }, "warc_info": "isPartOf: CC-MAIN-2024-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-159\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 10, 11, 91, 92, 593, 594 ], "line_end_idx": [ 10, 11, 91, 92, 593, 594, 603 ] }
{ "red_pajama_v2": { "ccnet_original_length": 603, "ccnet_original_nlines": 6, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3482142984867096, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.01785713993012905, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.125, "rps_doc_frac_unique_words": 0.6413043737411499, "rps_doc_mean_word_length": 5.369565010070801, "rps_doc_num_sentences": 6, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 3.953829288482666, "rps_doc_word_count": 92, "rps_doc_frac_chars_dupe_10grams": 0.2712550461292267, "rps_doc_frac_chars_dupe_5grams": 0.2712550461292267, "rps_doc_frac_chars_dupe_6grams": 0.2712550461292267, "rps_doc_frac_chars_dupe_7grams": 0.2712550461292267, "rps_doc_frac_chars_dupe_8grams": 0.2712550461292267, "rps_doc_frac_chars_dupe_9grams": 0.2712550461292267, "rps_doc_frac_chars_top_2gram": 0.048583000898361206, "rps_doc_frac_chars_top_3gram": 0.07894737273454666, "rps_doc_frac_chars_top_4gram": 0.13360324501991272, "rps_doc_books_importance": -66.67481994628906, "rps_doc_books_importance_length_correction": -80.29904174804688, "rps_doc_openwebtext_importance": -42.535648345947266, "rps_doc_openwebtext_importance_length_correction": -56.15987777709961, "rps_doc_wikipedia_importance": -42.092594146728516, "rps_doc_wikipedia_importance_length_correction": -55.71682357788086 }, "fasttext": { "dclm": 0.9998323321342468, "english": 0.895527184009552, "fineweb_edu_approx": 2.8325440883636475, "eai_general_math": 0.6663657426834106, "eai_open_web_math": 0.0681992769241333, "eai_web_code": 0.487817645072937 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "006.3", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Cognitive science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "1", "label": "Truncated Snippets" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "3", "label": "Academic Writing" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "6", "label": "Not Applicable/Indeterminate" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
-1,094,325,931,869,452,300
Search Images Maps Play YouTube News Gmail Drive More » Sign in Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader. Patents 1. Advanced Patent Search Publication numberUS3507376 A Publication typeGrant Publication dateApr 21, 1970 Filing dateNov 16, 1967 Priority dateNov 16, 1967 Also published asDE1809195A1 Publication numberUS 3507376 A, US 3507376A, US-A-3507376, US3507376 A, US3507376A InventorsHaig Kafafian Original AssigneeHaig Kafafian Export CitationBiBTeX, EndNote, RefMan External Links: USPTO, USPTO Assignment, Espacenet Communication system for the handicapped US 3507376 A Abstract  available in Images(4) Previous page Next page Claims  available in Description  (OCR text may contain errors) H. KAFAFIAN A ril 21, 1970 COMMUNICATION SYSTEM FOR THE HANDICAPPED Filed Nov. 16. 1967 4 Sheets-Sheet'l INVENTOR fin/e KnFAF/AN ATTORNEYS April 21, 1970 H. KAFAFIAN COMMUNICATION SYSTEM FOR THE HANIHCAPPED 4 Sheets-Sheet 5 Filed NOV. 16, 1967 A ril 21, 1970 H. KAFAFIAN 5 COMMUNICATION SYSTEM FOR THE HANDICAPPED Filed Nov. 16, 1967 4 Sheets-Sheet 4 5' INVENTOR. j I A I Hfl/G KAFHFMN A T TOR NF) Y5 United States Patent Office 3,507,376 Patented Apr. 21, 1970 Int. Cl. B41j 5/10 US. Cl. 19719 Claims ABSTRACT OF THE DISCLOSURE The present invention relates to an improved method and apparatus for operating typewriting, Braille or other program-controlled machines, which are particularly suited for use by handicapped persons since the manual operation of a conventional keyboard is not required. According to one embodiment of the invention the op erator is provided with an arrangement of contacts'or other means fixed upon his finger tips and electrically connected to a master character selector. The contacts may be activated by moving the appropriate fingers adjacent to a flat conductive plate located in a console on or remote from the machine in order to complete the electrical circuits necessary for the selection of a predetermined key and operation of the machine. In a second embodiment, the electrical contacts are fixed in the fingers of gloves worn by the operator. In that embodiment the thumb of each glove acts as a conductive plate and the operator need only place the respective finger contacts against the thumb in order to complete the desired electrical circuits. In either of these embodiments the finger contacts may be replaced by pressure actuated switches mounted on the fingers or installed in the glove fingers. Such switches need not be touched to a conductive plate but may be operated by merely pressing the finger against any hard surface. In all of the above embodiments a dual input matrix circuit is used as a master character selector; with the x input circuits being controlled by the right hand contacts and the y inputs being controlled by the left hand contacts, for example. A dual input code or machine language is used whereby each individual character is selected by closing a unique combination of one contact of the x input circuits and one contact of the y input circuits. In another embodiment of the invention, the same dual input code is used but the finger contacts are replaced by two small groupings of keys. For example, a left grouping of seven keys controls the y input circuits and a right grouping of seven keys controls the x input circuits of the character selector. The two key groupings are mounted near each other so that they may beeasily spanned and depressed by one hand of an operator or by an individual wearing prosthetic and/or orthotic/ prosthetic devices. Alternatively, the two groups of keys may be mounted, respectively, on the right and left sides of a wheelchair. BACKGROUND OF THE INVENTION anism or keyboard which accepts the program; a memory in the form of key bars or other mechanisms which store functions in the machine; and an output or visual readout which may take the form of a picture, typed words and characters, Braille characters, three dimensiona1 impressions, punched tape, magnetic tape or palpable vibrations. Many of the common program-controlled machines such as typewriters, business machines, and computers for example include keyboards as the man-machine interface or input mechanism. These keyboards, conventionally include a large plurality of keys, each of which represents one function, character, or symbol in the upper case position and other functions, characters, or symbols in the lower case position and require that the operator strike the key and depress it in order to print the character or carry out the desired function. Thus, the ordinary programming of a key-board mechanism is accomplished by the operators selection of one finger at a time and direction of that finger to a specific letter or function key. Then the preselected key is struck and depressed in order to accomplish the desired function. In order to achieve continuous operation of a keyboard at a satisfactory speed, the location of each of the keys must be mentally realized by the operator, and the operators hands must be coordinately moved to new 10- cations in order to reach the appropriate keys. Certain limitations are present in such a conventional keyboard even with respect to a physically able operator. For Braille machine operation use of as many as six fingers at a time are necessary to obtain the desired character or symbol. Thus, extensive training and practice is necessary for an operator to attain superior typewriter or Braille keyboard operating proficiency and even then the ability of an experienced keyboard operator to adjust to or transfer between modified arrangements of keys or functions is usually nil. Also, the fact that a typewriter operator continually performs a sequential, single, digitto-key procedure withoutarm or hand-support eventually leads to fatigue. A language-structure problem also presents obstacles for keyboard operators. Thus, some linguists and others knowledgeable of language structure are aware of inherent inadequacies in the conventional typewriter keyboard layout. For example, although ED, ING, THE and AND, appear frequently in the English language as sequential groups of letters, the locations of these letters are widely spaced on the. keyboard. In the French language the most frequently used digraphs are ES, EN, LE and DE. Again the. keys for these letters are not in an ideal location for rapid vtyping. In either of these languages typing speed is affected when fingers must be manipulated to widely spaced positions. In addition, the probability of introducing errors is increased when the series of characters to be sequentially programmed are at remote locations on the keyboard. These unnatural finger stretches .deserve special attention when standard keyboards are considered. However, with Braille machines, where simultaneous finger manipulations of up to six fingers at one time are used, the difficulty in attaining rapid programming by blind persons, who might therefore also have poorer manual dexterity, is even more serious. In addition most of the other factors mentioned above cause vastly more severe constraintsfor disabled machine operators than for physically able operators. For example, a significant restriction for the blind in typing is the difficulty in merely learning and teaching the positions of the keys and the-use of the conventional keyboard. In fact the difficulties of the blind in this respect are compounded since they are compelled to learn one programming method for typewriters and another, completely different keyboard and programming method, for Braille machines. Another problem is the obvious futility of even a sighted person, handicapped by a debilitating condition such as cerebral palsy or multiple sclerosis, in trying to exercise the manual dexterity demanded by a typewriter keyboard comprised of about fifty haphazardly-positioned keys. Thus, the involuntary muscular contractions associated with these disabling conditions usually preclude the satisfactory manipulation of an intricate keyboard. Likewise, an amputee with the aid of his prosthesis may be entirely unable to sequentially strike and depress the keys of a conventional keyboard one at a time. A further inherent constricting factor to the teaching and learning of conventional keyboard use by all handicapped persons is the adverse psychological effect and frustration associated with their usually slow progress in learning to perform movements in accordance with the complex machine language and key placement; A number of systems employing other than conventional keyboards have been devised in the prior art in attempts to overcome some of the above factors and enable high speed typing or permit disabled persons to satisfactorily operate programmed machines. For example some typing systems, such as that described in US. Patent No. 2,613,797 to Hogg utilize an expanded lever and key system which overlays the ordinary keyboard and permits the operator to use a closed fist or other portion of the hand in the writing operation. Another system designed for use by invalids, described in US. Patent No. 2,924,321, includes a light beam and photocell arrangement which may be controlled by the operator to select a particular letter to be printed by the remotely located machine. Yet another approach to typing is described in US. Patent No. 3,022,878 to Seibel et al. which discloses a machine control system designed especially for aerospace applications wherein the operator is equipped with a three-position transducer for each finger and is required to perform only small movements of his fingers in order to actuate the controls of the machine. It should be apparent that each of the systems mentioned above is nevertheless subject'to certain of the objections mentioned above with respect to conventional keyboard systems. In particular it is apparent that the Seibel et a1. system demands high manual dexterity and would not be suitable for use by those with debilitating conditions and/or people who do not have fingers. SUMMARY OF THE INVENTION The present invention provides a simplified apparatus for controlling typewriters, Braille or other programcontrolled machines which overcomes the above-mentioned disadvantages in the use of conventional keyboard machines. It is one object of this invention to provide a machine input apparatus which may be located remote from the machine itself, if necessary, and which may be operated by a person wearing prosthetic and/ or orthotic/ prosthetic devices or by an amputee. It is a further object of the invention to provide a control system which utilizes a unique machine language compatible with the operation of a dual input master character selector; which language is easily and rapidly learned and may be implemented by handicapped persons on the interface apparatus provided. In one embodiment of the invention for persons with fingers but who may be blind, for example, electrical contacts are fixed on the finger tips of both hands of the operator by means of plastic clasps and a pair ofcorresponding fiat conductive plates are provided to which the operator may touch the contacts. An electrical conductor is provided from each finger contact to a master character selector circuit and the conductive plates are energized by a suitable low voltage direct current source whereby input signals to the master character selector may be generated by the operator merely by touching one of the contacts to the corresponding conductiye plate. The contacts of the left hand are utilized as the y inputs and the contacts of the right hand as the x inputs to a dual input master character selector. A unique dual input code or machine language is used with the system whereby any desired control operation such as the actuation of an appropriate key operating solenoid on an electric typewriter may be initiated by touching one predetermined contact of a y input and one predetermined contact of an x input to the corresponding left and right conductive plates. More than one electrical contact may be provided on each finger, for example one contact may be located at the point of each finger tip and a second contact on the ball of each finger tip whereby they may be easily manipulated even by a handicapped person. This arrangement permits a satisfactory number of unique character combinations in the dual input machine language to handle the operation of all the keys on a conventional typewriter keyboard, as well as Braille and other program-controlled machines. In a second embodiment of the invention, the electrical contacts are fixed in the fingers of gloves worn by the operator. In that embodiment, the conductive plates are eliminated and the thumb contacts of the gloves are connected to a suitable source of voltage so that the operator need only place the respective finger contacts against the thumb contacts of the gloves in order to complete the desired electrical circuits. In a third embodiment of the invention the finger or glove contacts are replaced by pressure actuated switches. Such switches need not be touched to a conductive plate, but may instead be operated merely by pressing the finger carrying any particular switch against a hard surface so as to apply the necessary light operating pressure upon that switch. In a fourth embodiment of the invention, the same dual input code is also used but the finger contacts are replaced by two small groupings of keys. For example, a left grouping of seven keys controls the y input circuits and a right grouping of seven keys controls the x input circuits. The two key groupings are mounted near each other. so that they may be easily spanned and operated by one hand of an operator or an individual wearing prosthetic and/or orthotic/prosthetic devices. Alternatively the two groups of keys described above may be separated and mounted, respectively, near the right and left arm rests of a wheelchair so that an invalid sitting therein may easily operate said keys. It should be noted that other types of responsive devices can be employed in place of the contacts, pressure switches or key groupings in order to adapt the present invention for use by an invalid capable of limited response. Such arrangements might include the use of photo responsive cells or electrical circuits actuated by muscular contractions and/or electrical outputs from the central nervous system. Likewise it is not necessary for an operator to use all ten fingers in order to provide a sufficient number of dual input combinations to control all the keys on a typewriter, for example. Thus, combinations of dual inputs controlled by fingers on one hand may be used, with or without combinations of inputs controlled by other body members such as arms and legs, for example, in order to achieve the necessary number of input combinations. In addition, the y and x inputs to the selection circuit need not be exclusively controlled by the left and right hands, respectively. On the contrary, the arrangements of keys or contacts may be designed so that certain x or y inputs are located in the same grouping or under controlof one hand. BRIEF DESCRIPTION OF THE DRAWINGS The novel features of the invention are set forth in the appended claims. The invention itself, both as to its construction and manner of o eration together with additional objects and advantages thereof, will be best understood from the following description of a preferred embodiment when read in conjunction with the accompanying drawing in which: FIG. 1 is a diagrammatic view showing the present invention adapted for use as a control system for a typewriter; FIG. 2 is a sectional view of the bottom of the type writer showing electrically responsive control mechanisms for operating the typewriter keys; FIG. 3 is a partial top section of FIG. 2 showing the horizontal orientation of the key operating solenoids; FIG. 4 is a diagram showing one preferred embodiment of the invention including a schematic diagram of the master character selector circuit and the electrical contacts fastened to plastic clasps worn by the operator; FIG. 5 is a schematic diagram of an alternative embodiment of the invention shown in FIG. 4, wherein a separate conductive plate is provided for each hand of the operator; FIG. 6 is a diagrammatic view of a glove having electrical contacts mounted in the fingers which may be used in another embodiment of the invention; FIG. 7 is a schematic diagram of yet another alternative embodiment of the invention wherein the finger contacts are replaced by keys; FIG. 8 is a chart showing a dual input machine language designed to operate the keys on a typewriter; and FIG. 9 is a detailed view of a plastic clasp, including two electrical contacts, which may be worn on the finger of the machine operator. DESCRIPTION OF THE PREFERRED "EMBODIMENTS Referring now to FIG. 1, a typewriting machine 1 is shown supported on one end of a console 2. The console also acts as a support for large flat metallic plate 4 mounted within a suitable frame 5 which can be fastened to the console by screws or bolts 7 if desired. An electrically responsive mechanism and apparatus for operating the keys of the typewriter is contained within a housing 8 attached to the underside of the typewriter; while a master character selection circuit electrically connected therewith is confined within housing 9 shown conveniently attached to the bottom of the console beneath the conductive plate. The operator of the machine may be seated in front of the console in any position where his hands comfortably reach the conductive plate. In order to operate the machine the operators hands are equipped with electrical contacts mounted on plastic finger clasps in a manner generally indicated in FIGS. 4 and 5. To cause any character on the typewriter to be printed, the operator need only touch one predetermined contact of the left hand and one predetermined contact of the right hand to any portion of the conductive plate in a manner which will be explained hereinafter. FIG. 2 shows an end section of the details of the key operating mechanism mounted beneath the typewriter keyboard. As shown, each typewriter key 20 is connected by means of a rod 21 to an end 24 of an L-shaped link 23. The plurality of links are pivotably mounted on an axle 26 supported beneath the typewriter by braces 28. Thus, any typewriter key will be depressed to print a character when its corresponding link is caused to pivot or rotate in a clockwise direction. The other end 25 of each pivotable link is connected by means of one of the rods 30 to one of a plurality of corresponding solenoids 32, which may be called motor devices, fixedly arranged in four spaced banks angularly offset with respect to each other as shown. Each solenoid includes an outer housing 35, a cylindrical armature 33 and a coil 34 surrounding the armature and wound so that the armature will be moved a small distance away from axle 26 when the solenoid coil is energized and returned to its original position when the coil is deenergized. The coil of each solenoid is connected, by conductors not shown, in circuit with the master character selector whereby the coils and therefore the typewriter keys may be selectively actuated by the operator. FIG. 3 shows a partial section of a top view of one upper and one lower bank of the key operating solenoids 32. As shown the solenoids of the upper bank are horizontally offset with respect to the solenoids of the lower bank in order to provide operating clearance for the rods 30. It should be understood that, while only a single row of typewriter keys are shown in FIG. 2, the mechanism described may be easily adapted to handle multiple rows of keys merely by adding the necessary number of additional solenoids and key linkages. It should also be understood that while a particular mechanism has been described herein for operating typewriter keys the present invention is not limited to the embodiment shown. Rather, any electrically responsive mechanism for operating typewriter keys or corresponding input elements of any other program-controlled mechanism would be suitable for use in the system of the present invention. FIG. 4 shows a diagrammatic view of one preferred embodiment of the invention which includes a schematic of the dual input master character selection circuit utilized in the invention. In the upper part of the figure a large conductive plate 40 is shown which corresponds to the plate 4 shown mounted on the console in FIG. 1. The operators hands are shown in dotted outline over the plate and plastic clasps are fixed upon the fingers of each hand. Referring briefly to FIG. 9, each plastic clasp 10 includes a split expansible ring portion 11 designed to hold the clasp firmly, but comfortably, about the tip of one of the operators fingers; as well as a nose portion 13 upon the exterior of which two electrical contacts 15, 16 are attached. A separate electrical conductor is connected to each of the electrical contacts, which are oriented on the clasp so that one contact 15 may be addressed to the conductive plate by laying the finger on the plate in a flat position and the second contact 16 may be addressed to the plate by touching the tip of the finger to the plate. The inner portion of the clasp may be lined with a suitable material to act as padding and insulate the wearer from the electrical contacts'although this is not essential. Referring back to FIG. 4 it should be apparent that four fingers of each hand of the operator are provided with plastic clasps. Of these the thumb clasp includes but a single electrical contact while each of the other fingers has two electrical contacts; making a total of seven contacts on each hand, all of which may be easily manipulated even by a handicapped person to touch the board conductive plate. The seven conductors from each hand may be gathered and bound into a separate flexible cable which is connected into the master character selector in a manner which does not unduly interfere with the movement of the operators hands. As shown, the conductors from the left hand contacts are connected as the y input circuits 4147 and the seven conductors of the right hand are connected as the x input circuits 51-57 of the master character selection circuit 60. For convenience the master character selector circuit is shown as including 49 coils which in actuality are the coils of the key operating solenoids shown in FIG. 3. Although these coils are schematically shown in electrical circuit with the diodes of the character selector circuit, it should be realized that they are physically confined in a housing beneath the typewirter. By the same token, a number of dual input circuits other than seven may be used in which case the number of elements in the master selector would vary. For example, eight y and eight x inputs have been used in one embodiment of the invention designed to operate a Braille machine. In the preferred embodiment of the invention shown in FIG. 4 the coils correspond to the 49 keys or operators necessary to control the keys on a conventional typewriter in accordance with the machine language chart shown in FIG. 8 For convenience these coils are shown in FIG. 4 as being arranged in seven horizontal rows and seven vertical columns. Connected to the upper terminal of each coil is a solid state diode poled to permit current flow in one direction through the coil and block current flow in the opposite direction. The lower ends of the coils in each row are connected in common through a conductor to one of the x inputs 5157. The x inputs are connected, respectively, to the positive terminals of batteries 51a57a used to energize the solenoid coils. It should be apparent that any other suitable source of power could be used in place of the batteries shown. The negative terminals of the batteries are connected, respectively, through conductors 71-77 to the seven electrical contacts 71a77a controlled by the operators right hand. The upper or cathode terminals of all of the diodes in any respective column are connected through a common conductor to a corresponding one of the y input terminals 41-47. The y input terminals are connected, respectively, through conductors 61-67 to the seven electrical contacts 61a67a controlled by the operators left hand. It should be apparent that any predetermined solenoid may be energized by simultaneously touching one appropriate contact controlled by the left hand and one appropriate contact controlled by the right hand to the conductive plate. For example should the thumb contact of the left hand and the tip contact of the middle finger of the right hand both be touched to the conductive plate a circuit would be completed from the positive terminal of battery 53a to x input 53 and then through coil 70, diode 69 to y input 47. The circuit may then be traced on through conductor 67 to contact 67a on the thumb of the operators left hand, through plate 40 to contact 73a on the tip of the middle finger of the operators right hand and on to completion along line 73 to the negative terminal of battery 53a. Note that all the possible circuits through the other coils of the same row which are connected to the battery 53a are open circuited at this time. Consequently only the solenoid associated with coil 70 will be operated by the operation described above. In the preferred embodiment disclosed herein a battery voltage of 28 volts is used to energize the solenoids and thereby cause the selected key to be operated. However, through the choice of other equally suitable solenoids a lower battery voltage or any other suitable source of power may be employed. It should be noted that, although the finger clasps may be padded for comfortable wear and insulated from the electrical contacts, the current fiow in the circuits of the system is so slight as to present no problems should the conductive plate be touched by the operator. In the event the operator, in trying to print a selected character, accidentally touches two contacts on one hand to the plate it should be apparent that two solenoid coils may be simultaneously energized in which case an error may occur in the desired output of the machine. However, this has not been found to be a serious drawback in the operation of the disclosed embodiment in view of the ease with which the contacts may be maniplated. Moreover, though the details are not disclosed herein, well known logic or voting circuits exist which may be easily embodied in the circuitry of the character selector in order to minimize output errors due to these mistakes on the part of the operator. In addition, time delay circuits may be easily added to the character selector to eliminate the need for the preselected contact on each hand to be simultaneously touched to the plate. In addition it is not necessary that the x inputs be controlled exclusively by the right hand and the y inputs be controlled exclusively by the left hand. On the contrary, various combinations of x and 1 inputs may be placed under the control of either the right or the left hand merely by making appropriate connections. It is believed to be a highly significant aspect of the invention that the dual input character selection circuit makes possible the use of the vastly simplified machine language shown in the chart of FIG. 8. In the chart, the various characters (letters and numbers) and operators (back space, tab, etc.) are set forth in the 49 center squares, while the various possible finger positions of the left and right hand of the operator are shown on either side of the bottom of the chart. It should now be apparent that to type the letter H, the flat contact of the index finger of the left hand and the flat contact of the middle finger of the right hand are used. Likewise the letter K may be printed by use of the flat contact of the ring finger of the left hand and the fiat contact of the middle finger of the right hand. As with a conventional typewriter keyboard all the keys are operable in a natural and shift position in order to print both upper and lower case letters. In order to print upper case letters with the present apparatus, the shift lock lever is first operated, then the desired upper case letter is printed, after which the shift unlock lever is operated. Alternatively the function of the shift lock and shift unlock circuits may be delegated to a separate circuit controlled by a shift bar mounted for convenient actuation by the operator. Thus, FIG. 1 shows a bar 6 which the operator may easily depress with his wrist or the base of his hand, without pausing appreciably in typing operations, in order to selectively print upper case letters or symbols. An alternative embodiment of the invention is shown in FIG. 5 to include separate conductive plates 40a and 40b for each of the operators hands. In practice the two conductive plates may be mounted side by side on the console or, as is also the case where a single plate is used, in any other convenient location remote from the machine to be operated. The dual plate arrangement shown in FIG. 5 includes the same general arrangement of finger contacts and basically the same selector circuit as were used in the previously described embodiment. However, by dividing the plate, a single battery or power source may be used to service all the solenoids in conjunction with the selector circuit. Thus, by connecting the battery 58 between the two conductive plates, as shown, an energized circuit will be completed through any desired solenoid as the operator touches the appropriate two finger contacts to the respective conductive plates. In this manner the batteries 51a-57a are replaced by a single battery. In FIG. 5 spark suppression diodes 59 are connected in parallel with each coil to reduce sparks at the contacts in the circuits. These spark suppression diodes may be employed, as well, with any of the other embodiments of the invention. In another alternative embodiment of the invention, the operator wears a glove-like apparatus, as is shown in FIG. 6, on each hand. The use of this type of glove eliminates the need for a conductive plate, since the thumb of the glove acts as a conductive plate and the operator need only touch an appropriate finger contact on each hand to the thurnb of the glove on that hand in order to control the machine. Thus, FIG. 6 shows a right-hand glove which includes two electrical contacts on each of the index, middle and ring fingers and a single contact mounted at the base of the index finger to comprise a total of seven finger contacts. As before, each of the contacts is connected via one of the separate electrical conductors 71b-77b to an input of a selector circuit, not shown, of the same type used in the embodiment of FIG. 5. A similar glove is used on the left hand of the operator to control the y inputs to the selector circuit. The thumb of each glove includes a larger contact which is also insulated from the wearer and attached to a separate electrical conductor. Each of the contacts shown is located so as to be easily touched to one of the thumb contacts. It should be apparent that the thumb contact of the right hand will be connected to the positive terminal of a battery, not shown, and the thumb contact of the left hand connected to the negative terminal of the battery in which case the gloved hand embodiment will function as a machine control system using the same machine language as the other embodiments. Yet another alternative embodiment of the invention is shown in FIG. 7 where 14 key controlled switches are used to control the machine instead of an arrangement of finger contacts. The switches are of a conventional type having two terminals which are bridged by a conductive bar when the key is depressed in order to complete an electrical circuit through the switch. The keys are shown arranged into two groups of seven each, conveniently mounted upstanding from a keyboard where they may be operated by both hands of an operator. However, it should be noted that the arrangement of the keys is sutficiently compact to be spanned by a single hand of the operator whereby one-handed operation is quite possible. It should also be apparent that the offset orientation of the keys enables their convenient operation by a person wearing prosthetic and/or orthotic/ prosthetic devices. In this regard it should be noted that the wearer of artificial arms may have difficulty in maintaining control through a wide angle of movement. Consequently the rather compact dual input arrangement of fourteen keys described above is significantly easier for an armless person to operate with his prosthesis than a conventional typewriter keyboard where approximately 49 keys are spaced over a large area. As in the other embodiments the y inputs of the master selector are controlled by the seven left keys 8187- and the x inputs by the seven right keys 91-97 whereby the same character selector and machine language may be used. For example, the three upper keys 81, 83, 85 of the left hand group of FIG. 7 may be seen to correspond respectively to the tip positions of the ring, middle and index fingers of the left hand as shown in FIG. 8. Likewise the lower three small keys 82, 84, 86 correspond respectively to the fiat positions of the ring, middle and index fingers of the same hand. The remaining large key 87 is equivalent to the thumb contact of the left hand. As shown, the upper terminals of the left hand keys are commonly connected to one terminal of a battery 88 and the upper terminals of the right hand keys are commonly connected to the other battery terminal. Therefore, it should be apparent that the simultaneous depression of one key of the left hand group and one key from the right hand group can again energize a unique solenoid. Although any of the above embodiments may be efficiently used by non-handicapped individuals, it 1s with respect to the handicapped that the present invention takes on the most significance. Thus it should be apparent that the embodiments of FIGS. 4 and 5 are particularly adapted for use by the blind and those affiicted with debilitating diseases which impair the free and coordinate movement of their fingers. In the case of the blind the ease with which the machine language of the present invention may be learned and the ease with which a blind operator may carry out the necessary physical movements of the present invention where he is relieved of the necessity of continuously reorienting his hands to a keyboard result in a mode of machine control vastly improved over any other available system for operating a conventional typewriter keyboard or Braille machine. For example, it requires considerably less time to achieve satisfactory typing skill using the present system, than is usually required to operate a conventional Braille machine. At the same time, the absence of any necessity for timed coordinated movements to an exact location by the fingers of the operator obviously results in a machine control system which is more desirable for the victims of cerebral palsy than a conventional keyboard. Alternatively the key groupings shown in conjunction with FIG. 7 might be separated and mounted, respectively, near the right and left arm rests on a wheelchair so that a disabled person confined therein might easily operate said keys without arm and/or wrist movements. Likewise a suitable arrangement of keys could be designed for use by a person con fined in some other special environment such as an oxygen tent. The embodiment described in conjunction with FIG. 6 also has special significance when used by a blind person since it eliminates even the necessity for locating a conductive plate. It should also be clear that the embodiment of FIG. 7 will enable the wearers of prosthetic and/ or orthotic/ prosthetic devices to operate program-controlled machines whereas they are completely helpless to operate a conventional keyboard. In addition to the embodiments described herein, it should be further apparent that the apparatus of the present invention might be easily adapted for operation by other body parts whereby amputees or other severely disabled persons may also have access to the communication media of program-controlled machines. What is claimed is: 1. Apparatus for man-machine communication comprising: a dual input interface for the direct input of signals by an operator, said interface including two spaced input sections, each comprising a plurality of individual input means, the input means of one section being positioned and adapted to be selectively actuated by a movement of one portion of the operators body, and the input means of the second section being positioned and adapted to be selectively actuated by a second portion of the operators body; a signal output means assembly disposed at a point remote from said input means, said output means comprising a plurality of individual output elements each adapted to signal a different letter of an entire alphabet, each of said input means incorporating a single switch; a source of electric power, and circuit means establishing an electrical connection between said dual input interface and said signal output means remote therefrom, each of said switches controlling a single circuit only of said circuit means, said circuit means being arranged to connect each of said output elements to one and only one of the input means of each input section, through the respective switches thereof, said circuit means being further arranged to require that the actuation of each output means requires the actuation of one input means of each input section, said circuit means being still further arranged so that the actuation of any two or more input means of a single input section without the actuation of any input means of the other input section will not operate any of the output means, whereby the simultaneous bilateral movement of two portions of the operators body efl ects selective operation of a single output element to signal a single desired letter of the alphabet. 2. The apparatus of claim 1 wherein said circuit means comprises a detachable interconnection whereby different interfaces may be selectively coupled to a single signal output means assembly. 3. A control apparatus comprising: a multiplicity of electrically operable motor devices, each arranged to actuate a corresponding movable device; said motor devices being arranged to define a matrix of rows and columns of motor devices; a first plurality of contacts respectively connected to each of said rows and a second plurality of contacts respectively connected to each of said columns; a source of electric power; further contact means arranged to be engaged with a selected contact of each of said first and second plurality of contacts to complete a circuit, including said source of electric power and that motor device common to the row and column connected to said selected contacts; and means for mounting said first and second plurality of contacts on the fingers of an operators hands, said further contact means being positioned so as to be readily engageable by said first and second plurality of contacts on the fingers of the operators hands. 4. Control apparatus as defined in claim 3 wherein said further contact means comprises at least one conductive metal plate adapted to be engaged by said contacts on the operators fingers. 5. Control apparatus as defined in claim 3 wherein said motor devices are solenoids and wherein each movable device is a typewriter key. 6. Control apparatus as defined in claim 3 wherein said further contact means comprises a single conductive plate adapted to be engaged by at least one contact of each of said first and second pluralities, said source of electric power being connected in series with contacts of one of said plurality of contacts and their corresponding motor devices. 7. Control apparatus as defined in claim 3 wherein said further contact means comprises two conductive plates each positioned to be engaged by a corresponding one of said first or second plurality of contacts, said source of electric power being connected between and in series with said plates. 8. Control apparatus as defined in claim 3 wherein said first and second pluralities of contacts are mounted on the fingers of gloves adapted to be worn by an operator. 9. Control apparatus as defined in claim 3 wherein said contacts of said first and second pluralities of contacts are mounted on resilient clips each adapted to gri and be held on a finger tip. 10. Control apparatus as defined in claim 3 wherein said further contact means comprises a conductive plate and means for mounting the same on the thumb of an operators hand in position to be easily engaged by any contact on a finger of that hand. References Cited UNITED STATES PATENTS 2,031,017 2/1936 Tenis. 2,912,090 11/1959 Holmes. 1,904,784 4/1933 Garrity et al. 19719 XR 2,566,971 9/1951 Watson 197--19 2,613,797 10/1952 Hogg 19719 2,981,395 4/1961 Gibson 197-19 3,022,878 2/1962 Seibel et al. 19719 3,158,318 11/1964 Beason et al. 235146 3,166,856 1/1965 Uttal 35-6 3,234,664 2/1966 Yaeger 356 XR 3,241,115 3/1966 Maling 197--1XR 3,280,267 10/1966 Feucht 340-166 XR 3,308,439 3/1967 Tink et al. 340-1725 3,375,497 3/1968 Jones et al. 340-176XR EDGAR S. B-URR, Primary Examiner US. Cl. X.R. Patent Citations Cited PatentFiling datePublication dateApplicantTitle US1904784 *Dec 22, 1931Apr 18, 1933 Electbic automatic becobding scale US2031017 *Dec 18, 1931Feb 18, 1936Robert TevisKeyboard US2566971 *Jun 4, 1948Sep 4, 1951IbmRemote control apparatus for typewriting machines US2613797 *Jun 30, 1950Oct 14, 1952Hogg Reuben TTypewriter operating apparatus US2912090 *Dec 16, 1957Nov 10, 1959Holmes Jr LawrenceRemote control system for stenographic machines US2981395 *Jul 9, 1957Apr 25, 1961Gibson Charles HOperator mechanism for the control of the automatic operation of a series of successive individually selected operational steps in business, calculating and similar machines US3022878 *Jan 11, 1960Feb 27, 1962IbmCommunication device US3158318 *Sep 12, 1963Nov 24, 1964The National Cash Register CompanyDetent controlling mechanism US3166856 *Feb 9, 1962Jan 26, 1965IbmEducational device US3234664 *Sep 5, 1963Feb 15, 1966Honeywell IncTraining apparatus US3241115 *May 28, 1962Mar 15, 1966Maling Reginald GeorgeControl systems for use by partially or totally paralyzed persons US3280267 *Mar 8, 1963Oct 18, 1966Siemens AgCross-wire control circuit arrangement for communication systems US3308439 *Jan 2, 1964Mar 7, 1967Ncr CoOn-line system US3375497 *Apr 27, 1964Mar 26, 1968Ncr CoMatrix control circuitry using gate controlled unidirectional signalling devices Referenced by Citing PatentFiling datePublication dateApplicantTitle US3705424 *Mar 29, 1971Dec 5, 1972Richard P Harvey JrElectrical switching apparatus utilizing conductivity of the human skin US3781802 *Mar 27, 1972Dec 25, 1973H KafafianMethod of communication and/or testing of the handicapped US3824354 *Mar 17, 1972Jul 16, 1974Anderson NOperator means associated with multiple switch array and signal to function correlator means US3835468 *Jun 29, 1972Sep 10, 1974Dos Santos ARational alphabetic system US4008793 *Sep 7, 1972Feb 22, 1977Vittorino TerracinaTypewriting machine US4138197 *Jul 22, 1977Feb 6, 1979National Controls, Inc.Key actuator US4194085 *Sep 14, 1978Mar 18, 1980Scelzi Joseph IFinger keyer for code transmission US4274753 *Oct 2, 1978Jun 23, 1981Brown David LNon-oral communication device US4408192 *Aug 8, 1980Oct 4, 1983Ward Geoffrey AMethod and device for use by disabled persons in communicating US4517424 *Jun 12, 1984May 14, 1985Inro FranceHand-secured pushbutton control device US4655621 *Aug 21, 1984Apr 7, 1987Richard HoldenCombinatorial keyboards which encode characters and a space US4661005 *Jan 16, 1984Apr 28, 1987Creative AssociatesSpittable keyboard for word processing, typing and other information input systems US5200988 *Mar 11, 1991Apr 6, 1993Fon-Ex, Inc.Method and means for telecommunications by deaf persons utilizing a small hand held communications device US5220652 *Jun 22, 1989Jun 15, 1993Rowley Blair AComputer application programs data input interface for handicapped persons responsive to multiple push buttons for selecting data stored in binary tree US5581484 *Jun 27, 1994Dec 3, 1996Prince; Kevin R.Finger mounted computer input device US5993089 *Feb 3, 1997Nov 30, 1999Burrell, Iv; James William8-bit binary code for use as an 8-dot braille arrangement and data entry system and method for 8-key chordic binary keyboards US6943776Feb 25, 2002Sep 13, 2005Herman EhrenburgComputer-compatible, visualizably presented, intuitive and self-explanatory manual input system US8884790 *Mar 3, 2011Nov 11, 2014Twitch Technologies LlcMatrix keyboarding system US9342241 *Nov 10, 2014May 17, 2016Twitch Technologies LlcMatrix keyboarding system US20030067444 *Feb 25, 2002Apr 10, 2003Herman EhrenburgVisualizable-presented, computer-compatible, color-coded manual input system US20110187637 *Jan 29, 2010Aug 4, 2011David Scott NicholsTactile Input Apparatus US20110215954 *Mar 3, 2011Sep 8, 2011John Dennis PageMatrix Keyboarding System US20150109151 *Nov 10, 2014Apr 23, 2015Twitch Technologies LlcMatrix keyboarding system EP0050565A1 *Oct 15, 1981Apr 28, 1982Inro FranceHand-held keyboard WO1981000478A1 *Aug 8, 1980Feb 19, 1981G WardCommunication WO1982001345A1 *Oct 15, 1981Apr 29, 1982Kroczynski PatriceHand-bound keyboard Classifications U.S. Classification400/87, 400/477, 341/21, 178/101, 400/474, 340/4.12 International ClassificationA61F4/00, G06F3/09, B41J7/00 Cooperative ClassificationB41J7/005, A61F4/00, G06F3/09 European ClassificationG06F3/09, B41J7/00B, A61F4/00
{ "url": "http://www.google.com/patents/US3507376?dq=inventor:%22Arthur+R.+Hair%22&ei=VAy0Tsa4NYTl0QGQiqWiBA", "source_domain": "www.google.com", "snapshot_id": "crawl=CC-MAIN-2017-30", "warc_metadata": { "Content-Length": "86162", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:FI7544SCWVTYJWYAAYHYIEIWPPLW5MU6", "WARC-Concurrent-To": "<urn:uuid:a060d411-3785-4722-8eb1-4cd183822d4a>", "WARC-Date": "2017-07-23T15:35:54Z", "WARC-IP-Address": "172.217.8.4", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:DSUHZB2WVNG4YYLUZ3UHRXZM7NUI7GBC", "WARC-Record-ID": "<urn:uuid:1c948f5e-e898-4092-aa51-a9c2db344b93>", "WARC-Target-URI": "http://www.google.com/patents/US3507376?dq=inventor:%22Arthur+R.+Hair%22&ei=VAy0Tsa4NYTl0QGQiqWiBA", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:0bf67002-2950-4c78-9458-a35f6e0b2379>" }, "warc_info": "robots: classic\r\nhostname: ip-10-230-98-181.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 56, 64, 205, 206, 214, 215, 243, 273, 295, 324, 348, 374, 403, 486, 509, 540, 579, 630, 671, 684, 707, 717, 731, 741, 762, 805, 806, 2398, 2399, 2686, 2687, 3135, 3136, 3757, 3758, 4123, 4124, 5902, 5903, 6891, 6892, 7273, 7274, 7686, 7687, 8611, 8612, 9755, 9756, 10135, 10136, 10945, 10946, 11763, 11764, 12636, 12637, 13062, 13063, 13416, 13417, 13902, 13903, 14115, 14116, 14524, 14525, 14967, 14968, 15265, 15266, 15651, 15652, 15766, 15767, 15913, 15914, 16023, 16024, 16242, 16243, 16415, 16416, 16565, 16566, 16701, 16702, 16808, 16809, 16947, 16948, 17617, 17618, 18193, 18194, 18930, 18931, 19432, 19433, 19715, 19716, 19968, 19969, 20366, 20367, 21618, 21619, 22259, 22260, 22489, 22490, 23148, 23149, 24529, 24530, 25583, 25584, 26160, 26161, 27043, 27044, 27366, 27367, 28947, 28948, 30196, 30197, 30838, 30839, 31736, 31737, 33030, 33031, 34082, 34083, 35819, 35820, 36243, 36244, 36557, 36558, 36578, 36579, 36634, 36635, 36706, 36707, 37094, 37095, 37312, 37313, 37369, 37370, 37614, 37615, 38187, 38188, 38377, 38378, 38570, 38571, 38606, 38607, 38719, 38720, 38811, 38812, 38969, 38970, 38998, 38999, 39278, 39279, 39541, 39542, 39731, 39732, 39869, 39870, 40222, 40223, 40519, 40520, 40689, 40690, 40884, 40885, 41133, 41134, 41197, 41198, 41224, 41225, 41686, 41687, 41704, 41758, 41829, 41885, 41971, 42050, 42151, 42375, 42434, 42532, 42588, 42654, 42777, 42886, 42940, 43062, 43076, 43131, 43256, 43359, 43497, 43571, 43644, 43714, 43799, 43876, 43987, 44072, 44180, 44317, 44469, 44670, 44757, 44943, 45088, 45171, 45255, 45387, 45468, 45547, 45635, 45702, 45761, 45839, 45855, 45926, 45983, 46039 ], "line_end_idx": [ 56, 64, 205, 206, 214, 215, 243, 273, 295, 324, 348, 374, 403, 486, 509, 540, 579, 630, 671, 684, 707, 717, 731, 741, 762, 805, 806, 2398, 2399, 2686, 2687, 3135, 3136, 3757, 3758, 4123, 4124, 5902, 5903, 6891, 6892, 7273, 7274, 7686, 7687, 8611, 8612, 9755, 9756, 10135, 10136, 10945, 10946, 11763, 11764, 12636, 12637, 13062, 13063, 13416, 13417, 13902, 13903, 14115, 14116, 14524, 14525, 14967, 14968, 15265, 15266, 15651, 15652, 15766, 15767, 15913, 15914, 16023, 16024, 16242, 16243, 16415, 16416, 16565, 16566, 16701, 16702, 16808, 16809, 16947, 16948, 17617, 17618, 18193, 18194, 18930, 18931, 19432, 19433, 19715, 19716, 19968, 19969, 20366, 20367, 21618, 21619, 22259, 22260, 22489, 22490, 23148, 23149, 24529, 24530, 25583, 25584, 26160, 26161, 27043, 27044, 27366, 27367, 28947, 28948, 30196, 30197, 30838, 30839, 31736, 31737, 33030, 33031, 34082, 34083, 35819, 35820, 36243, 36244, 36557, 36558, 36578, 36579, 36634, 36635, 36706, 36707, 37094, 37095, 37312, 37313, 37369, 37370, 37614, 37615, 38187, 38188, 38377, 38378, 38570, 38571, 38606, 38607, 38719, 38720, 38811, 38812, 38969, 38970, 38998, 38999, 39278, 39279, 39541, 39542, 39731, 39732, 39869, 39870, 40222, 40223, 40519, 40520, 40689, 40690, 40884, 40885, 41133, 41134, 41197, 41198, 41224, 41225, 41686, 41687, 41704, 41758, 41829, 41885, 41971, 42050, 42151, 42375, 42434, 42532, 42588, 42654, 42777, 42886, 42940, 43062, 43076, 43131, 43256, 43359, 43497, 43571, 43644, 43714, 43799, 43876, 43987, 44072, 44180, 44317, 44469, 44670, 44757, 44943, 45088, 45171, 45255, 45387, 45468, 45547, 45635, 45702, 45761, 45839, 45855, 45926, 45983, 46039, 46091 ] }
{ "red_pajama_v2": { "ccnet_original_length": 46091, "ccnet_original_nlines": 243, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.40488678216934204, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.024195469915866852, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.14016686379909515, "rps_doc_frac_unique_words": 0.19693507254123688, "rps_doc_mean_word_length": 5.074741363525391, "rps_doc_num_sentences": 277, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.832860469818115, "rps_doc_word_count": 7439, "rps_doc_frac_chars_dupe_10grams": 0.05162777006626129, "rps_doc_frac_chars_dupe_5grams": 0.16826044023036957, "rps_doc_frac_chars_dupe_6grams": 0.12102991342544556, "rps_doc_frac_chars_dupe_7grams": 0.08452755957841873, "rps_doc_frac_chars_dupe_8grams": 0.07371989637613297, "rps_doc_frac_chars_dupe_9grams": 0.06821011006832123, "rps_doc_frac_chars_top_2gram": 0.021588830277323723, "rps_doc_frac_chars_top_3gram": 0.008158720098435879, "rps_doc_frac_chars_top_4gram": 0.01017192006111145, "rps_doc_books_importance": -3691.842041015625, "rps_doc_books_importance_length_correction": -3691.842041015625, "rps_doc_openwebtext_importance": -1918.0745849609375, "rps_doc_openwebtext_importance_length_correction": -1918.0745849609375, "rps_doc_wikipedia_importance": -1825.8336181640625, "rps_doc_wikipedia_importance_length_correction": -1825.8336181640625 }, "fasttext": { "dclm": 0.032428741455078125, "english": 0.9150395393371582, "fineweb_edu_approx": 2.7843236923217773, "eai_general_math": 0.5458675622940063, "eai_open_web_math": 0.1600651741027832, "eai_web_code": 0.02457308955490589 } }
{ "free_decimal_correspondence": { "primary": { "code": "629.8", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "" } }, "secondary": { "code": "621.384", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "11", "label": "Legal/Regulatory" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "2", "label": "Text Extraction Errors" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
2,419,850,966,517,573,000
Free cookie consent management tool by TermsFeed Policy Generator Changeset 13399 Ignore: Timestamp: 11/25/15 17:14:14 (9 years ago) Author: bburlacu Message: #1772: Fix compilation errors caused by changes in the Visualization branch. File: 1 edited Legend: Unmodified Added Removed • branches/HeuristicLab.EvolutionTracking/HeuristicLab.EvolutionTracking.Views/3.4/GenealogyGraphChart.cs r13061 r13399   4343    private Dictionary<Tuple<VisualGenealogyGraphNode, VisualGenealogyGraphNode>, VisualGenealogyGraphArc> arcMap; 4444 45     #region chart modes  45    #region chart options 4646    public bool SimpleLineages { get; set; } 4747    public bool LockGenealogy { get; set; } 4848    public bool TraceFragments { get; set; }  49    #endregion  50  51    #region chart modes  52    public Dictionary<string, ChartMode> ChartMode { get; private set; } 4953    #endregion 5054   8084    } 8185 82     //    public bool UpdateEnabled { 83     //      get { return Chart.UpdateEnabled; } 84     //      set { Chart.UpdateEnabled = value; } 85     //    } 86  87     //    public void EnforceUpdate() { 88     //      Chart.EnforceUpdate(); 89     //    } 90  9186    private Visualization.Rectangle TargetRectangle { get; set; } 9287    protected VisualGenealogyGraphNode SelectedVisualNode { get; set; }   112107    public GenealogyGraphChart() { 113108      InitializeComponent();  109  110      ChartMode = new Dictionary<string, ChartMode> {  111        { "Select", new SelectChartMode(this) },  112        { "ZoomIn", new ZoomInChartMode(this) },  113        { "ZoomOut", new ZoomOutChartMode(this) },  114        { "Pan", new PanChartMode(this) }  115      }; 114116 115117      defaultBrush = new SolidBrush(Color.Transparent);   189191        switch (e.Button) { 190192          case MouseButtons.Left: 191             Mode = ChartMode.Select;  193            Mode = ChartMode["Select"]; 192194            Cursor = Cursors.Default; 193195            break; 194196          case MouseButtons.Middle: 195             Mode = ChartMode.Move;  197            Mode = ChartMode["Pan"]; 196198            Cursor = Cursors.Hand; 197199            break;   203205    protected override void PictureBoxOnMouseUp(object sender, MouseEventArgs e) { 204206      Cursor = Cursors.Default; 205       if (Mode == ChartMode.Move) { 206         Mode = ChartMode.Select; 207         return; 208       } 209       if (Mode != ChartMode.Select) { 210         base.PictureBoxOnMouseUp(sender, e); 211         return; 212       }  207 213208      var primitive = Chart.GetAllPrimitives(e.Location).FirstOrDefault(p => p is VisualGenealogyGraphNode); 214209      if (primitive == null) { Note: See TracChangeset for help on using the changeset viewer.
{ "url": "https://dev.heuristiclab.com/trac.fcgi/changeset/13399", "source_domain": "dev.heuristiclab.com", "snapshot_id": "CC-MAIN-2024-38", "warc_metadata": { "Content-Length": "26971", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:MI6IV7N36TDRPD7ARQZB3B3A3CJBX7LM", "WARC-Concurrent-To": "<urn:uuid:f67771f4-5a0f-482c-9e63-8075baba09e1>", "WARC-Date": "2024-09-11T21:05:08Z", "WARC-IP-Address": "78.47.114.135", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:L6XQWPM34BBHVZEABBKIM2BPHXHXFQBV", "WARC-Record-ID": "<urn:uuid:5727c550-d30c-496e-8aae-c2b3553378cc>", "WARC-Target-URI": "https://dev.heuristiclab.com/trac.fcgi/changeset/13399", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:40e02c8d-31ee-41bb-b4b1-533f75e6a71e>" }, "warc_info": "isPartOf: CC-MAIN-2024-38\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-225\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 66, 67, 83, 84, 85, 93, 104, 136, 144, 153, 162, 163, 240, 241, 247, 256, 257, 265, 266, 277, 283, 291, 399, 400, 420, 543, 552, 583, 616, 669, 721, 774, 796, 804, 835, 915, 938, 947, 953, 967, 976, 1021, 1076, 1132, 1151, 1159, 1206, 1248, 1267, 1275, 1349, 1429, 1435, 1480, 1519, 1528, 1590, 1647, 1704, 1763, 1813, 1830, 1841, 1907, 1913, 1951, 1995, 2040, 2088, 2136, 2165, 2211, 2254, 2299, 2344, 2373, 2379, 2472, 2514, 2558, 2599, 2623, 2639, 2685, 2738, 2762, 2778, 2787, 2906, 2947 ], "line_end_idx": [ 66, 67, 83, 84, 85, 93, 104, 136, 144, 153, 162, 163, 240, 241, 247, 256, 257, 265, 266, 277, 283, 291, 399, 400, 420, 543, 552, 583, 616, 669, 721, 774, 796, 804, 835, 915, 938, 947, 953, 967, 976, 1021, 1076, 1132, 1151, 1159, 1206, 1248, 1267, 1275, 1349, 1429, 1435, 1480, 1519, 1528, 1590, 1647, 1704, 1763, 1813, 1830, 1841, 1907, 1913, 1951, 1995, 2040, 2088, 2136, 2165, 2211, 2254, 2299, 2344, 2373, 2379, 2472, 2514, 2558, 2599, 2623, 2639, 2685, 2738, 2762, 2778, 2787, 2906, 2947, 3010 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3010, "ccnet_original_nlines": 90, "rps_doc_curly_bracket": 0.012956810183823109, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.0777096077799797, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.5480572581291199, "rps_doc_frac_unique_words": 0.7206477522850037, "rps_doc_mean_word_length": 7.43319845199585, "rps_doc_num_sentences": 28, "rps_doc_symbol_to_word_ratio": 0.012269940227270126, "rps_doc_unigram_entropy": 4.989107131958008, "rps_doc_word_count": 247, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.016339870169758797, "rps_doc_frac_chars_top_3gram": 0.014161219820380211, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -224.81468200683594, "rps_doc_books_importance_length_correction": -224.81468200683594, "rps_doc_openwebtext_importance": -120.92369079589844, "rps_doc_openwebtext_importance_length_correction": -120.92369079589844, "rps_doc_wikipedia_importance": -77.96700286865234, "rps_doc_wikipedia_importance_length_correction": -77.96700286865234 }, "fasttext": { "dclm": 0.09019041061401367, "english": 0.12487266212701797, "fineweb_edu_approx": 2.390589714050293, "eai_general_math": -0.000009890000001178123, "eai_open_web_math": 0.6186519861221313, "eai_web_code": 0.5264393091201782 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.02", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "4", "label": "Code/Software" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "22", "label": "Truncated" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
5,808,762,311,724,586,000
使用netty实现文件上传服务器 使用netty实现文件上传服务器 代码实现根据官网提供的example https://github.com/netty/nett... 以及netty官网的api文档 https://netty.io/4.1/api/inde... 项目地址 https://github.com/1433365571... 1 编写 server 启动类 package server; import io.netty.bootstrap.ServerBootstrap; import io.netty.channel.Channel; import io.netty.channel.EventLoopGroup; import io.netty.channel.nio.NioEventLoopGroup; import io.netty.channel.socket.nio.NioServerSocketChannel; import io.netty.handler.logging.LogLevel; import io.netty.handler.logging.LoggingHandler; import io.netty.handler.ssl.SslContext; import io.netty.handler.ssl.SslContextBuilder; import io.netty.handler.ssl.util.SelfSignedCertificate; public final class HttpUploadServer { static final boolean SSL = System.getProperty("ssl") != null; static final int PORT = Integer.parseInt(System.getProperty("port", SSL ? "8443" : "8080")); public static void main(String[] args) throws Exception { // Configure SSL. final SslContext sslCtx; if (SSL) { SelfSignedCertificate ssc = new SelfSignedCertificate(); sslCtx = SslContextBuilder.forServer(ssc.certificate(), ssc.privateKey()).build(); } else { sslCtx = null; } EventLoopGroup bossGroup = new NioEventLoopGroup(1); EventLoopGroup workerGroup = new NioEventLoopGroup(); try { ServerBootstrap b = new ServerBootstrap(); b.group(bossGroup, workerGroup); b.channel(NioServerSocketChannel.class); b.handler(new LoggingHandler(LogLevel.INFO)); b.childHandler(new HttpUploadServerInitializer(sslCtx)); Channel ch = b.bind(PORT).sync().channel(); System.err.println("Open your web browser and navigate to " + (SSL ? "https" : "http") + "://127.0.0.1:" + PORT + '/'); ch.closeFuture().sync(); } finally { bossGroup.shutdownGracefully(); workerGroup.shutdownGracefully(); } } } 2 绑定handler /* * Copyright 2012 The Netty Project * * The Netty Project licenses this file to you under the Apache License, * version 2.0 (the "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * License for the specific language governing permissions and limitations * under the License. */ package server; import io.netty.channel.ChannelInitializer; import io.netty.channel.ChannelPipeline; import io.netty.channel.socket.SocketChannel; import io.netty.handler.codec.http.HttpContentCompressor; import io.netty.handler.codec.http.HttpRequestDecoder; import io.netty.handler.codec.http.HttpResponseEncoder; import io.netty.handler.ssl.SslContext; public class HttpUploadServerInitializer extends ChannelInitializer<SocketChannel> { private final SslContext sslCtx; public HttpUploadServerInitializer(SslContext sslCtx) { this.sslCtx = sslCtx; } @Override public void initChannel(SocketChannel ch) { ChannelPipeline pipeline = ch.pipeline(); if (sslCtx != null) { pipeline.addLast(sslCtx.newHandler(ch.alloc())); } pipeline.addLast(new HttpRequestDecoder()); pipeline.addLast(new HttpResponseEncoder()); // Remove the following line if you don't want automatic content compression. pipeline.addLast(new HttpContentCompressor()); // pipeline.addLast("http-aggregator", // new HttpObjectAggregator(65536));// 目的是将多个消息转换为单一的request或者response对象 pipeline.addLast(new HttpUploadServerHandler()); } } 3 上传处理的handler package server; import io.netty.buffer.ByteBuf; import io.netty.buffer.Unpooled; import io.netty.channel.ChannelHandlerContext; import io.netty.channel.SimpleChannelInboundHandler; import io.netty.handler.codec.http.*; import io.netty.handler.codec.http.multipart.*; import io.netty.util.CharsetUtil; import java.io.File; import java.io.IOException; import java.net.URI; public class HttpUploadServerHandler extends SimpleChannelInboundHandler<HttpObject> { private HttpRequest request; private static final String uploadUrl = "/up"; private static final String fromFileUrl = "/post_multipart"; private static final HttpDataFactory factory = new DefaultHttpDataFactory(DefaultHttpDataFactory.MINSIZE); // Disk if size exceed private HttpPostRequestDecoder decoder; static { DiskFileUpload.deleteOnExitTemporaryFile = true; // should delete file // on exit (in normal // exit) DiskFileUpload.baseDirectory = null; // system temp directory DiskAttribute.deleteOnExitTemporaryFile = true; // should delete file on // exit (in normal exit) DiskAttribute.baseDirectory = null; // system temp directory } @Override public void channelInactive(ChannelHandlerContext ctx) { if (decoder != null) { decoder.cleanFiles(); } } protected void channelRead0(ChannelHandlerContext ctx, HttpObject msg) throws Exception { if (msg instanceof HttpRequest) { this.request = (HttpRequest) msg; URI uri = new URI(request.uri()); System.out.println(uri); urlRoute(ctx, uri.getPath()); } if (decoder != null) { if (msg instanceof HttpContent) { // 接收一个新的请求体 decoder.offer((HttpContent) msg); // 将内存中的数据序列化本地 readHttpDataChunkByChunk(); } if (msg instanceof LastHttpContent) { System.out.println("LastHttpContent"); reset(); writeResponse(ctx, "<h1>上传成功</h1>"); } } } // url路由 private void urlRoute(ChannelHandlerContext ctx, String uri) { StringBuilder urlResponse = new StringBuilder(); // 访问文件上传页面 if (uri.startsWith(uploadUrl)) { urlResponse.append(getUploadResponse()); } else if (uri.startsWith(fromFileUrl)) { decoder = new HttpPostRequestDecoder(factory, request); return; } else { urlResponse.append(getHomeResponse()); } writeResponse(ctx, urlResponse.toString()); } private void writeResponse(ChannelHandlerContext ctx, String context) { ByteBuf buf = Unpooled.copiedBuffer(context, CharsetUtil.UTF_8); FullHttpResponse response = new DefaultFullHttpResponse( HttpVersion.HTTP_1_1, HttpResponseStatus.OK, buf); response.headers().set(HttpHeaderNames.CONTENT_TYPE, "text/html;charset=utf-8"); //设置短连接 addListener 写完马上关闭连接 ctx.channel().writeAndFlush(response).addListener(ChannelFutureListener.CLOSE); } private String getHomeResponse() { return " <h1> welcome home </h1> "; } private String getUploadResponse() { return "<!DOCTYPE html>\n" + "<html lang=\"en\">\n" + "<head>\n" + " <meta charset=\"UTF-8\">\n" + " <title>Title</title>\n" + "</head>\n" + "<body>\n" + "\n" + "<form action=\"http://127.0.0.1:8080/post_multipart\" enctype=\"multipart/form-data\" method=\"POST\">\n" + "\n" + "\n" + " <input type=\"file\" name=" + " " + "" + "\"YOU_KEY\">\n" + "\n" + " <input type=\"submit\" name=\"send\">\n" + "\n" + "</form>\n" + "\n" + "</body>\n" + "</html>"; } private void readHttpDataChunkByChunk() throws IOException { while (decoder.hasNext()) { InterfaceHttpData data = decoder.next(); if (data != null) { if (data.getHttpDataType() == InterfaceHttpData.HttpDataType.FileUpload) { FileUpload fileUpload = (FileUpload) data; if (fileUpload.isCompleted()) { fileUpload.isInMemory();// tells if the file is in Memory // or on File fileUpload.renameTo(new File(PathUtil.getFileBasePath() + fileUpload.getFilename())); // enable to move into another // File dest decoder.removeHttpDataFromClean(fileUpload); //remove } } } } } private void reset() { request = null; // destroy the decoder to release all resources decoder.destroy(); decoder = null; } } 4 环境文件 package server; import java.io.File; public class PathUtil { private static final ClassLoader classLoader = PathUtil.class.getClassLoader(); public static String getFileBasePath() { String os = System.getProperty("os.name"); String basePath; if (os.toLowerCase().startsWith("win")) { basePath = "D:/warehouse/"; } else { basePath = "/root/upload_source"; } basePath = basePath.replace("/", File.separator); return basePath; } public static String getSourcePath(String name) { return classLoader.getResource(name).getPath(); } } 5 pom文件 <?xml version="1.0" encoding="UTF-8"?> <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd"> <modelVersion>4.0.0</modelVersion> <groupId>nettyHttpUploadServer</groupId> <artifactId>http.upload</artifactId> <version>1.0-SNAPSHOT</version> <properties> <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding> </properties> <dependencies> <!-- https://mvnrepository.com/artifact/io.netty/netty-all --> <dependency> <groupId>io.netty</groupId> <artifactId>netty-all</artifactId> <version>4.1.10.Final</version> </dependency> </dependencies> <!-- <build>--> <!-- <plugins>--> <!-- <plugin>--> <!-- <groupId>org.apache.maven.plugins</groupId>--> <!-- <artifactId>maven-jar-plugin</artifactId>--> <!-- <configuration>--> <!-- <archive>--> <!-- <manifest>--> <!-- <addClasspath>true</addClasspath>--> <!-- <mainClass>server.HttpUploadServer</mainClass>--> <!-- </manifest>--> <!-- </archive>--> <!-- </configuration>--> <!-- </plugin>--> <!-- </plugins>--> <!-- </build>--> <build> <plugins> <plugin> <artifactId>maven-assembly-plugin</artifactId> <version>3.0.0</version> <configuration> <archive> <manifest> <mainClass>server.HttpUploadServer</mainClass> </manifest> </archive> <descriptorRefs> <descriptorRef>jar-with-dependencies</descriptorRef> </descriptorRefs> </configuration> <executions> <execution> <id>make-assembly</id> <phase>package</phase> <goals> <goal>single</goal> </goals> </execution> </executions> </plugin> <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-jar-plugin</artifactId> <configuration> <archive> <manifest> <mainClass>server.HttpUploadServer</mainClass> </manifest> </archive> </configuration> </plugin> <plugin> <groupId>com.jolira</groupId> <artifactId>onejar-maven-plugin</artifactId> <version>1.4.4</version> <executions> <execution> <goals> <goal>one-jar</goal> </goals> </execution> </executions> </plugin> <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-compiler-plugin</artifactId> <configuration> <source>1.8</source> <target>1.8</target> </configuration> </plugin> </plugins> </build> </project> 6 代码说明 • ChannelHandlerContext 控制数据处理管道 ChannelPipeline 执行流程 • HttpObject 消息处理的接口 • HttpRequest 封装http请求头请求协议等 • DefaultFullHttpResponse 构造http响应 • httpcontext netty会将请求体分块处理此文章解释较详细,直接处理完整的请求体可以请将HttpObjectAggregator放在ChannelPipelineHttpObjectDecoder之后 图片描述 • LastHttpContent 标识Http请求结束 • HttpDataFactory 上传文件的处理方式 • HttpPostRequestDecoder post请求体的解析类 7 访问 http://127.0.0.1:8080/up 上传文件 0 声望 1 粉丝 0 条评论 推荐阅读 【小白必学】文件上传的漏洞介绍及常见防御方法 在文件上传的功能处,若服务端脚本语言未对上传的文件进行严格验证和过滤,导致恶意用户上传恶意的脚本文件时,就有可能获取执行服务端命令的能力,这就是文件上传漏洞。 代码熬夜敲阅读 1k 一分钟学会、三分钟上手、五分钟应用,快速上手开源责任链框架详解 | 京东云技术团队 责任链模式是开发过程中常用的一种设计模式,在SpringMVC、Netty等许多框架中均有实现。我们日常的开发中如果要使用责任链模式,通常需要自己来实现,但自己临时实现的责任链既不通用,也很容易产生框架与业务代... 京东云开发者阅读 891 封面图 《跟闪电侠学Netty》阅读笔记 - 开篇入门Netty 和 《Netty In Action》 不同,这本书直接从Netty入门程序代码开始引入Netty框架,前半部分教你如何用Netty搭建简易的通讯系统,整体难度比较低,后半部分直接从服务端源码、客户端源码、ChannelPipeline开始介绍... Xander阅读 639 Netty入门 进程通过将一个或多个fd传递给select或poll系统调用,阻塞在select操作上,select/poll是顺序扫描fd是否就绪,需要扫描所有的客户端是否就绪epoll使用基于事件驱动方式替代顺序扫描,当有fd就绪时,立即回调函数r... journey1阅读 412 uniapp实现文件选择上传,支持App/小程序/H5 lsj-upload插件地址:[链接]不清楚使用方式可点击右侧导入示例项目运行完整示例此次更新2.0与1.0使用方式略有差异,已使用1.0的同学自行斟酌是否更新到2.0版本!!!使用插件有任何问题欢迎加入QQ讨论群:群1:70... shanjunLi阅读 376 长连接Netty服务内存泄漏,看我如何一步步捉“虫”解决 | 京东云技术团队 老板说: 长连接吗? 我说:是的! 老板说:该来的还是要来的,最终还是来了,快,赶紧先把服务重启下! 我说:已经重启了! 老板说: 这问题必须给我解决了! 我说:必须的! 京东云开发者阅读 210 封面图 Netty服务端开发及性能优化 | 京东云技术团队 Netty是一个异步基于事件驱动的高性能网络通信框架,可以看做是对NIO和BIO的封装,并提供了简单易用的API、Handler和工具类等,用以快速开发高性能、高可靠性的网络服务端和客户端程序。 京东云开发者阅读 204 封面图 0 声望 1 粉丝 宣传栏
{ "url": "https://segmentfault.com/a/1190000020087277?utm_source=sf-similar-article", "source_domain": "segmentfault.com", "snapshot_id": "CC-MAIN-2023-23", "warc_metadata": { "Content-Length": "70245", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:CKPTRM3WP6J6WAYGMHJL3HF2ZFPNLWTH", "WARC-Concurrent-To": "<urn:uuid:2d0e08a1-27e7-470e-bccf-b1cb9777c86d>", "WARC-Date": "2023-06-08T15:57:31Z", "WARC-IP-Address": "39.107.196.198", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:5M74SC6IHYCM7ISP6PLHQTBMZ4HIQDVK", "WARC-Record-ID": "<urn:uuid:54cbcd0a-47e5-4c18-b6ca-cfa7d494b19a>", "WARC-Target-URI": "https://segmentfault.com/a/1190000020087277?utm_source=sf-similar-article", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ac8b0d53-1ca8-4ec3-8d40-5b8d5520600e>" }, "warc_info": "isPartOf: CC-MAIN-2023-23\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-239\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 17, 18, 35, 36, 88, 137, 175, 176, 192, 193, 209, 210, 253, 286, 326, 373, 432, 474, 522, 562, 609, 665, 666, 704, 705, 771, 772, 869, 870, 932, 958, 991, 1010, 1079, 1174, 1191, 1218, 1228, 1229, 1290, 1352, 1366, 1367, 1422, 1423, 1468, 1469, 1522, 1523, 1581, 1582, 1651, 1652, 1708, 1709, 1783, 1861, 1862, 1899, 1900, 1920, 1964, 2010, 2020, 2026, 2028, 2029, 2041, 2042, 2045, 2081, 2084, 2157, 2236, 2298, 2301, 2349, 2352, 2423, 2500, 2576, 2651, 2673, 2677, 2693, 2694, 2738, 2779, 2825, 2883, 2938, 2994, 3034, 3035, 3120, 3121, 3158, 3159, 3219, 3249, 3255, 3256, 3270, 3318, 3319, 3369, 3370, 3400, 3401, 3462, 3463, 3473, 3474, 3526, 3527, 3580, 3581, 3667, 3722, 3723, 3769, 3857, 3858, 3915, 3921, 3922, 3923, 3925, 3926, 3941, 3942, 3943, 3959, 3960, 3992, 4025, 4072, 4125, 4163, 4211, 4245, 4246, 4267, 4295, 4316, 4317, 4404, 4405, 4438, 4439, 4490, 4491, 4556, 4557, 4608, 4703, 4704, 4748, 4749, 4762, 4841, 4871, 4888, 4958, 5039, 5072, 5141, 5147, 5148, 5162, 5223, 5254, 5288, 5298, 5304, 5305, 5399, 5400, 5442, 5443, 5489, 5490, 5536, 5537, 5574, 5575, 5617, 5618, 5628, 5629, 5660, 5661, 5707, 5708, 5737, 5787, 5819, 5863, 5864, 5878, 5879, 5929, 5930, 5985, 5986, 6011, 6012, 6065, 6066, 6080, 6081, 6091, 6092, 6093, 6099, 6100, 6113, 6180, 6181, 6238, 6239, 6259, 6300, 6301, 6354, 6355, 6405, 6406, 6474, 6475, 6495, 6496, 6513, 6514, 6565, 6566, 6576, 6577, 6629, 6630, 6636, 6637, 6713, 6714, 6787, 6788, 6853, 6920, 6921, 7010, 7011, 7019, 7056, 7144, 7145, 7151, 7152, 7191, 7192, 7236, 7237, 7243, 7244, 7285, 7286, 7323, 7364, 7393, 7444, 7491, 7521, 7550, 7573, 7698, 7721, 7744, 7795, 7817, 7838, 7873, 7896, 7960, 7983, 8013, 8036, 8066, 8093, 8094, 8100, 8101, 8102, 8167, 8168, 8204, 8205, 8258, 8259, 8291, 8292, 8383, 8384, 8447, 8448, 8500, 8501, 8583, 8621, 8762, 8799, 8877, 8878, 8900, 8901, 8902, 8920, 8921, 8935, 8945, 8946, 8952, 8953, 8980, 8981, 9005, 9006, 9062, 9089, 9090, 9114, 9115, 9121, 9122, 9124, 9125, 9132, 9133, 9149, 9150, 9171, 9172, 9196, 9280, 9281, 9326, 9377, 9402, 9452, 9492, 9509, 9555, 9565, 9623, 9648, 9654, 9655, 9709, 9765, 9771, 9773, 9774, 9782, 9783, 9822, 9873, 9936, 10045, 10084, 10085, 10130, 10171, 10207, 10208, 10209, 10226, 10301, 10319, 10320, 10339, 10340, 10411, 10432, 10472, 10519, 10563, 10585, 10586, 10606, 10607, 10630, 10659, 10691, 10762, 10831, 10832, 10875, 10916, 10962, 11035, 11121, 11168, 11210, 11254, 11255, 11288, 11318, 11342, 11354, 11355, 11373, 11394, 11457, 11498, 11530, 11560, 11595, 11670, 11706, 11737, 11774, 11851, 11889, 11922, 11951, 11983, 12030, 12077, 12109, 12157, 12190, 12223, 12253, 12275, 12296, 12356, 12414, 12446, 12476, 12511, 12586, 12622, 12653, 12686, 12708, 12729, 12775, 12836, 12877, 12906, 12938, 12970, 13019, 13052, 13085, 13115, 13137, 13158, 13218, 13281, 13313, 13354, 13395, 13428, 13450, 13469, 13470, 13483, 13484, 13485, 13496, 13497, 13504, 13505, 13561, 13584, 13615, 13652, 13762, 13763, 13768, 13769, 13800, 13830, 13869, 13870, 13905, 13906, 13911, 13916, 13922, 13927, 13950, 14030, 14031, 14042, 14043, 14085, 14194, 14195, 14208, 14209, 14213, 14242, 14368, 14369, 14382, 14383, 14391, 14513, 14514, 14529, 14530, 14558, 14675, 14676, 14692, 14693, 14732, 14818, 14819, 14832, 14833, 14837, 14863, 14961, 14962, 14975, 14976, 14980, 14985, 14990 ], "line_end_idx": [ 17, 18, 35, 36, 88, 137, 175, 176, 192, 193, 209, 210, 253, 286, 326, 373, 432, 474, 522, 562, 609, 665, 666, 704, 705, 771, 772, 869, 870, 932, 958, 991, 1010, 1079, 1174, 1191, 1218, 1228, 1229, 1290, 1352, 1366, 1367, 1422, 1423, 1468, 1469, 1522, 1523, 1581, 1582, 1651, 1652, 1708, 1709, 1783, 1861, 1862, 1899, 1900, 1920, 1964, 2010, 2020, 2026, 2028, 2029, 2041, 2042, 2045, 2081, 2084, 2157, 2236, 2298, 2301, 2349, 2352, 2423, 2500, 2576, 2651, 2673, 2677, 2693, 2694, 2738, 2779, 2825, 2883, 2938, 2994, 3034, 3035, 3120, 3121, 3158, 3159, 3219, 3249, 3255, 3256, 3270, 3318, 3319, 3369, 3370, 3400, 3401, 3462, 3463, 3473, 3474, 3526, 3527, 3580, 3581, 3667, 3722, 3723, 3769, 3857, 3858, 3915, 3921, 3922, 3923, 3925, 3926, 3941, 3942, 3943, 3959, 3960, 3992, 4025, 4072, 4125, 4163, 4211, 4245, 4246, 4267, 4295, 4316, 4317, 4404, 4405, 4438, 4439, 4490, 4491, 4556, 4557, 4608, 4703, 4704, 4748, 4749, 4762, 4841, 4871, 4888, 4958, 5039, 5072, 5141, 5147, 5148, 5162, 5223, 5254, 5288, 5298, 5304, 5305, 5399, 5400, 5442, 5443, 5489, 5490, 5536, 5537, 5574, 5575, 5617, 5618, 5628, 5629, 5660, 5661, 5707, 5708, 5737, 5787, 5819, 5863, 5864, 5878, 5879, 5929, 5930, 5985, 5986, 6011, 6012, 6065, 6066, 6080, 6081, 6091, 6092, 6093, 6099, 6100, 6113, 6180, 6181, 6238, 6239, 6259, 6300, 6301, 6354, 6355, 6405, 6406, 6474, 6475, 6495, 6496, 6513, 6514, 6565, 6566, 6576, 6577, 6629, 6630, 6636, 6637, 6713, 6714, 6787, 6788, 6853, 6920, 6921, 7010, 7011, 7019, 7056, 7144, 7145, 7151, 7152, 7191, 7192, 7236, 7237, 7243, 7244, 7285, 7286, 7323, 7364, 7393, 7444, 7491, 7521, 7550, 7573, 7698, 7721, 7744, 7795, 7817, 7838, 7873, 7896, 7960, 7983, 8013, 8036, 8066, 8093, 8094, 8100, 8101, 8102, 8167, 8168, 8204, 8205, 8258, 8259, 8291, 8292, 8383, 8384, 8447, 8448, 8500, 8501, 8583, 8621, 8762, 8799, 8877, 8878, 8900, 8901, 8902, 8920, 8921, 8935, 8945, 8946, 8952, 8953, 8980, 8981, 9005, 9006, 9062, 9089, 9090, 9114, 9115, 9121, 9122, 9124, 9125, 9132, 9133, 9149, 9150, 9171, 9172, 9196, 9280, 9281, 9326, 9377, 9402, 9452, 9492, 9509, 9555, 9565, 9623, 9648, 9654, 9655, 9709, 9765, 9771, 9773, 9774, 9782, 9783, 9822, 9873, 9936, 10045, 10084, 10085, 10130, 10171, 10207, 10208, 10209, 10226, 10301, 10319, 10320, 10339, 10340, 10411, 10432, 10472, 10519, 10563, 10585, 10586, 10606, 10607, 10630, 10659, 10691, 10762, 10831, 10832, 10875, 10916, 10962, 11035, 11121, 11168, 11210, 11254, 11255, 11288, 11318, 11342, 11354, 11355, 11373, 11394, 11457, 11498, 11530, 11560, 11595, 11670, 11706, 11737, 11774, 11851, 11889, 11922, 11951, 11983, 12030, 12077, 12109, 12157, 12190, 12223, 12253, 12275, 12296, 12356, 12414, 12446, 12476, 12511, 12586, 12622, 12653, 12686, 12708, 12729, 12775, 12836, 12877, 12906, 12938, 12970, 13019, 13052, 13085, 13115, 13137, 13158, 13218, 13281, 13313, 13354, 13395, 13428, 13450, 13469, 13470, 13483, 13484, 13485, 13496, 13497, 13504, 13505, 13561, 13584, 13615, 13652, 13762, 13763, 13768, 13769, 13800, 13830, 13869, 13870, 13905, 13906, 13911, 13916, 13922, 13927, 13950, 14030, 14031, 14042, 14043, 14085, 14194, 14195, 14208, 14209, 14213, 14242, 14368, 14369, 14382, 14383, 14391, 14513, 14514, 14529, 14530, 14558, 14675, 14676, 14692, 14693, 14732, 14818, 14819, 14832, 14833, 14837, 14863, 14961, 14962, 14975, 14976, 14980, 14985, 14990, 14993 ] }
{ "red_pajama_v2": { "ccnet_original_length": 14993, "ccnet_original_nlines": 530, "rps_doc_curly_bracket": 0.004935639910399914, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.05812102183699608, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.017117829993367195, "rps_doc_frac_lines_end_with_ellipsis": 0.013182669878005981, "rps_doc_frac_no_alph_words": 0.5445860028266907, "rps_doc_frac_unique_words": 0.5626566410064697, "rps_doc_mean_word_length": 11.194235801696777, "rps_doc_num_sentences": 297, "rps_doc_symbol_to_word_ratio": 0.0027866200543940067, "rps_doc_unigram_entropy": 5.7161784172058105, "rps_doc_word_count": 798, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.06873390823602676, "rps_doc_frac_chars_dupe_6grams": 0.05832307040691376, "rps_doc_frac_chars_dupe_7grams": 0.00850777979940176, "rps_doc_frac_chars_dupe_8grams": 0.00850777979940176, "rps_doc_frac_chars_dupe_9grams": 0.00850777979940176, "rps_doc_frac_chars_top_2gram": 0.007388339843600988, "rps_doc_frac_chars_top_3gram": 0.00850777979940176, "rps_doc_frac_chars_top_4gram": 0.003582220058888197, "rps_doc_books_importance": -1150.032958984375, "rps_doc_books_importance_length_correction": -1150.032958984375, "rps_doc_openwebtext_importance": -818.9967651367188, "rps_doc_openwebtext_importance_length_correction": -818.9967651367188, "rps_doc_wikipedia_importance": -566.2986450195312, "rps_doc_wikipedia_importance_length_correction": -566.2986450195312 }, "fasttext": { "dclm": 0.9874184131622314, "english": 0.1617950201034546, "fineweb_edu_approx": 1.6551716327667236, "eai_general_math": 0.4081834554672241, "eai_open_web_math": 0.024707019329071045, "eai_web_code": 0.9084154367446899 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.678", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
-4,299,464,974,054,544,400
Rafael Mizrahi: Bong - The Roomba Lazy Pong Bong - The Roomba Lazy Pong Bong - The Roomba Lazy Pong   Bong - The Roomba Lazy Pong GeekCon 2021 Makers UnConference https://geekcon.org/ Built By: Rafael Mizrahi, Eyal Keidar, Mickey Martin, Ofir Noy and Boris Fisherman Buggy code at https://github.com/Feng-GUI/experience/tree/master/RoombaPong Roomba 650 + Arduino Uno + Bluetooth HC-6 + C# OpenCV + ArCode very similar to https://create.arduino.cc/projecthub/mjrobot/controlling-a-roomba-robot-with-arduino-and-android-device-56970d Copyright © Rafael Mizrahi Urang-kurai
{ "url": "https://www.rafaelmizrahi.com/2021/10/bong-roomba-lazy-pong.html", "source_domain": "www.rafaelmizrahi.com", "snapshot_id": "CC-MAIN-2024-10", "warc_metadata": { "Content-Length": "108683", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:LCY4NMRGCHOVRJXJFTZLI2P4WM7XRX6D", "WARC-Concurrent-To": "<urn:uuid:d0febbce-2ccf-44f7-94ae-e453771b29b5>", "WARC-Date": "2024-03-01T17:08:43Z", "WARC-IP-Address": "172.253.122.121", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:RQGGBEG6A3VV3UQXLGEWMSZQFZV2KNEE", "WARC-Record-ID": "<urn:uuid:d2304dd7-3b4c-4f06-af76-188463af2f07>", "WARC-Target-URI": "https://www.rafaelmizrahi.com/2021/10/bong-roomba-lazy-pong.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e6b4f1a3-7ea7-41b1-a2dc-3ef9553ee3d6>" }, "warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-183\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 44, 45, 73, 74, 102, 104, 132, 186, 269, 345, 408, 535, 536, 537, 538, 539, 540, 541, 542, 543, 544, 545, 546 ], "line_end_idx": [ 44, 45, 73, 74, 102, 104, 132, 186, 269, 345, 408, 535, 536, 537, 538, 539, 540, 541, 542, 543, 544, 545, 546, 584 ] }
{ "red_pajama_v2": { "ccnet_original_length": 584, "ccnet_original_nlines": 23, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.06106869876384735, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.022900760173797607, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.35114502906799316, "rps_doc_frac_unique_words": 0.6774193644523621, "rps_doc_mean_word_length": 7.290322780609131, "rps_doc_num_sentences": 5, "rps_doc_symbol_to_word_ratio": 0.007633590139448643, "rps_doc_unigram_entropy": 3.5332703590393066, "rps_doc_word_count": 62, "rps_doc_frac_chars_dupe_10grams": 0.18584071099758148, "rps_doc_frac_chars_dupe_5grams": 0.18584071099758148, "rps_doc_frac_chars_dupe_6grams": 0.18584071099758148, "rps_doc_frac_chars_dupe_7grams": 0.18584071099758148, "rps_doc_frac_chars_dupe_8grams": 0.18584071099758148, "rps_doc_frac_chars_dupe_9grams": 0.18584071099758148, "rps_doc_frac_chars_top_2gram": 0.06194689869880676, "rps_doc_frac_chars_top_3gram": 0.1150442510843277, "rps_doc_frac_chars_top_4gram": 0.1504424810409546, "rps_doc_books_importance": -64.71429443359375, "rps_doc_books_importance_length_correction": -78.9591064453125, "rps_doc_openwebtext_importance": -16.079641342163086, "rps_doc_openwebtext_importance_length_correction": -30.324451446533203, "rps_doc_wikipedia_importance": -31.33966636657715, "rps_doc_wikipedia_importance_length_correction": -45.584476470947266 }, "fasttext": { "dclm": 0.10149539262056351, "english": 0.6031751036643982, "fineweb_edu_approx": 2.6978561878204346, "eai_general_math": 0.00012040000001434237, "eai_open_web_math": 0.0032390400301665068, "eai_web_code": -0.000005840000085299835 } }
{ "free_decimal_correspondence": { "primary": { "code": "629.895", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "" } }, "secondary": { "code": "004.0285", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "1", "label": "No Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "6", "label": "Not Applicable/Indeterminate" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
1,413,410,942,544,748,000
.htaccessと.htpasswdファイルを使って手動でベーシック認証(Basic Auth)をかける方法 .htaccess web制作時にサイトを公開するまではベーシック認証をかけておきたいケースがありますよね。レンタルサーバーであれば、レンタルサーバーの管理画面から設定できることもありますが、その他のサーバーを利用している場合には.htaccessと.htpasswdファイルを使って認証をかけるのが一般的です。 やりたいこと ベーシック認証のポップアップ ページにアクセスすると、上記のようなベーシック認証(Basic Auth)の画面を表示したいと思います。 ユーザー名とパスワードを設定して、ログインできるようにしていきます。 結論 # 認証タイプをベーシック認証を指定 AuthType BASIC # 認証の名前 AuthName "Input your ID and Password." # .htpasswd ファイルまでのフルパス AuthUserFile "/var/www/html/.htpasswd" # 全てのユーザーを対象にする require valid-user # ユーザー名とパスワードを「:(半角コロン)」で繋げる user:password # パスワード例 sinciate:$apr1$kGbO0bjk$g8WnslsTgcEHh84MYqirz/ .htaccessファイルのあるディレクトリ以下のページにベーシック認証が設定されます。 また、パスワードは暗号化することが推奨されています。 パスワードの暗号化について パスワードは平文でも使用できますが、セキュリティを強化するには暗号化する必要があります。 「ベーシック認証 パスワード 暗号化」などとウェブ検索すると、暗号化してくれるページがいろいろ出てきますが、1つだけご紹介します。 http://www.cityjp.com/cript/crpt.cgi こちらのサイトで、ユーザー名とパスワードを入れると秒速で.htpasswdファイルに入力する1文を生成してくれます。 ベーシック認証パスワードの暗号化 MD5を使った暗号化が強度が強いので、1番上の1行を使うとよいですね。 三上 龍志|株式会社シンシエイト この記事を書いた人 三上 龍志|株式会社シンシエイト 2005年からWeb制作に従事。システム開発ベンチャーでエンジニアとしてWeb開発、Webコンサルティング会社でマーケター・新規事業開発を経て2015年に当社を創業。顧客の成果に顧客よりも本気になることをテーマに、Webを通じて顧客の事業を加速させるために日々奮闘中。 関連する記事 .htaccess htaccessでディレクトリ(フォルダ)丸ごとリダイレクトする方法 htaccess .htaccess 全ページを特定のページへリダイレクトするhtaccess設定方法 htaccess .htaccess 全ページを常時SSL(HTTPS)化に対応させる.htaccessの設定方法 htaccess マーケティングとWeb制作で 貴社の経営課題を解決します 市場調査や競合調査を始め、企業やサービスの優位性を理解した上で、UI/UX設計やコンテンツマーケティング、SEO・ネット広告を中心としたWebマーケティングを通じて、ビジネスを加速させるご提案をしています。
{ "url": "https://sinciate.co.jp/blog/2991/", "source_domain": "sinciate.co.jp", "snapshot_id": "CC-MAIN-2024-30", "warc_metadata": { "Content-Length": "39565", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:X5QEA76CGD3LWQ7IHBX6IALFRA24UZY5", "WARC-Concurrent-To": "<urn:uuid:00dcc851-4f48-46b9-bc11-9f1b75af40cb>", "WARC-Date": "2024-07-23T04:43:00Z", "WARC-IP-Address": "202.233.67.75", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:XBGMEAMTAA4CUKGBRXEEEAJ4LUFDILZK", "WARC-Record-ID": "<urn:uuid:10aa86f0-206c-444b-8c3c-af9d17bca684>", "WARC-Target-URI": "https://sinciate.co.jp/blog/2991/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:edf3f91a-55ce-4aae-ab6f-c00ea69b271f>" }, "warc_info": "isPartOf: CC-MAIN-2024-30\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-173\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 56, 57, 67, 68, 215, 216, 223, 224, 239, 240, 293, 294, 329, 330, 333, 334, 353, 368, 369, 377, 416, 417, 441, 480, 481, 497, 516, 545, 559, 560, 569, 616, 617, 662, 663, 690, 691, 705, 706, 751, 752, 818, 819, 856, 857, 916, 917, 937, 938, 974, 975, 992, 1002, 1019, 1154, 1161, 1171, 1206, 1215, 1225, 1258, 1267, 1277, 1316, 1325, 1340, 1354, 1355 ], "line_end_idx": [ 56, 57, 67, 68, 215, 216, 223, 224, 239, 240, 293, 294, 329, 330, 333, 334, 353, 368, 369, 377, 416, 417, 441, 480, 481, 497, 516, 545, 559, 560, 569, 616, 617, 662, 663, 690, 691, 705, 706, 751, 752, 818, 819, 856, 857, 916, 917, 937, 938, 974, 975, 992, 1002, 1019, 1154, 1161, 1171, 1206, 1215, 1225, 1258, 1267, 1277, 1316, 1325, 1340, 1354, 1355, 1458 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1458, "ccnet_original_nlines": 68, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.014634150080382824, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.039024390280246735, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.6926829218864441, "rps_doc_frac_unique_words": 0.868852436542511, "rps_doc_mean_word_length": 23.37704849243164, "rps_doc_num_sentences": 16, "rps_doc_symbol_to_word_ratio": 0.0292682908475399, "rps_doc_unigram_entropy": 3.842120409011841, "rps_doc_word_count": 61, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.021037869155406952, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -69.2317886352539, "rps_doc_books_importance_length_correction": -64.21622467041016, "rps_doc_openwebtext_importance": -34.74049758911133, "rps_doc_openwebtext_importance_length_correction": -34.74049758911133, "rps_doc_wikipedia_importance": -33.1178092956543, "rps_doc_wikipedia_importance_length_correction": -23.97658348083496 }, "fasttext": { "dclm": 0.7271771430969238, "english": 0.00006972999835852534, "fineweb_edu_approx": 1.260044813156128, "eai_general_math": 0.8327659368515015, "eai_open_web_math": 0.13682621717453003, "eai_web_code": 0.781111478805542 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.82", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-5,706,267,570,669,416,000
wont charge past 90% Discussion in 'Android Tech Support' started by LOUISSSSS, Aug 19, 2010. 1. LOUISSSSS LOUISSSSS Member Joined: Mar 31, 2010 Messages: 64 Likes Received: 0 Trophy Points: 6 Ratings: +0 Won't charge past 90%. I just updated to 2.2 and my phone has been at 90% charge for w hours. How do I get it to fully charge?   2. dmacleo dmacleo Premium Member Rescue Squad Premium Member Joined: Jan 12, 2010 Messages: 1,479 Likes Received: 0 Trophy Points: 36 Location: Etna,ME Ratings: +0 I'd drain and let it die then recharge on approved AC charger. had this happen once.   3. hookbill hookbill Premium Member Premium Member Joined: Nov 30, 2009 Messages: 19,502 Likes Received: 7 Trophy Points: 168 Location: N.E. Ohio Ratings: +7 There has got to be an app running that's keeping it from reaching maximum charge. Does it feel hot?   4. LOUISSSSS LOUISSSSS Member Joined: Mar 31, 2010 Messages: 64 Likes Received: 0 Trophy Points: 6 Ratings: +0 looks like it wasn't the battery, was the program (battery time) i had it when i was using 2.1, then i upgraded to 2.2 and it didn't go to 100%. I just reinstalled it and looks like i'm getting the correct reading again I found out that i was getting incorrect reading by looking at the "locked" screen when i'm charging. It shoes the phone's reading on the screen.   5. LOUISSSSS LOUISSSSS Member Joined: Mar 31, 2010 Messages: 64 Likes Received: 0 Trophy Points: 6 Ratings: +0 update. My problem is not fixed. I still can't charge past 90%. The phone has been charging w/ original charger sitting there idling for over 2 hours and its still maxing out at 90%. How do i go about this??? how can i find out which app is sucking up the battery while running in the backgroud to keep it from reaching 100%. The battery successfully charged from 60% -> 90% though...   6. jstafford1 jstafford1 DF Super Moderator Rescue Squad Joined: Nov 15, 2009 Messages: 9,863 Likes Received: 631 Trophy Points: 228 Location: Hebron, Oh. Ratings: +677 Twitter: jstaff79 Try uninstalling battery time then reboot.   7. Jonny Kansas Jonny Kansas DF Super Moderator Staff Member Rescue Squad Joined: Jan 21, 2010 Messages: 7,922 Likes Received: 2,038 Trophy Points: 393 Location: Michigan's Upper Peninsula Ratings: +2,395 Current Phone Model: Note 4 Twitter: jonny_ks Thread moved to appropriate sub-forum.   8. Tallica Tallica Premium Member Rescue Squad Premium Member Joined: Mar 17, 2010 Messages: 3,259 Likes Received: 1 Trophy Points: 101 Location: Middleboro, MA Ratings: +1 settings>about phone>battery use   9. Vivien Vivien New Member Joined: Aug 22, 2011 Messages: 1 Likes Received: 0 Trophy Points: 1 Ratings: +0 I have the Motorola Atrix and am experiencing the same problem. After updating my phone it can not charge past 80% (as displayed on the lock screen). However if I turn off my phone and turn on again it shows it fully charged. I believe that the update has caused some glitch in displaying the correct percentage of battery. Does anyone have anone have any knowledge on this issue? Thanks!   10. SacramentoDJ SacramentoDJ New Member Joined: Aug 24, 2011 Messages: 1 Likes Received: 0 Trophy Points: 1 Ratings: +0 Turn the power off and you will notice... the charge is at 100%...it is probably a bug in the software...It wasn't happening with the earlier version of the OS for me...only after the Gingerbread update...   11. Brhad56 Brhad56 New Member Joined: Dec 11, 2011 Messages: 1 Likes Received: 0 Trophy Points: 1 Ratings: +0 90% Charging Solution I had the same problem, where my ATRIX would not charge past 90%. Based upon reading the android hackers posts for solutions to this problem I found one that worked for me. 1) Let your battery fall to 0%. (Play a game or something till it shuts itself down) 2) Pull out battery 3) wait 30 seconds put it back in 4) Charge phone from wall mount.DO NOT TURN PHONE ON 5) DO NOT TURN PHONE BACK ON , let it charge while off. Don't press button to check status or anything, just give it enough time fully charge. 5 hours should work. 6) After 5+ hours haveshould elapsed, leaving phone still plugged in, pull out battery 7) After Motorola logo pops up, unplug phone. 8) Put battery back in. 9) Turn on phone. It should now say 100% Seems there is a battery statistic file that your trying to fix. I read about rooting your phone and running battery calibration tools but my phone isn't rooted and I built this solution trying to reproduce the phone receiving a fresh new battery. I honestly don't know if all the steps are required, but its what I did and it worked for me. Good luck.   Search tags for this page android phone only charges to 90 , my phone stops charging at 80 , phone only charges to 90 , phone stops charging at 80 , phone stops charging at 80% , phone wont charge over 90 , phone wont charge past 80 , phone wont charge past 90 , why does my phone only charge to 90 , why isn't my motorola atrix charging
{ "url": "http://www.droidforums.net/threads/wont-charge-past-90.72310/", "source_domain": "www.droidforums.net", "snapshot_id": "crawl=CC-MAIN-2015-14", "warc_metadata": { "Content-Length": "99414", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:VO6OVKDS7TDGKH4AQRGF5HTUEUFNVQAV", "WARC-Concurrent-To": "<urn:uuid:06663c7e-0d32-47a0-8fcc-abd82493359d>", "WARC-Date": "2015-04-01T09:29:33Z", "WARC-IP-Address": "209.99.52.71", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:7NLUNDNQM3VRY7INQBKUSF5PFMIABHAP", "WARC-Record-ID": "<urn:uuid:d84d66cb-6578-412e-a405-5898095b265a>", "WARC-Target-URI": "http://www.droidforums.net/threads/wont-charge-past-90.72310/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:00221dbd-283e-49e6-b67b-c5ad09b34ed1>" }, "warc_info": "robots: classic\r\nhostname: ip-10-168-14-71.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-14\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 21, 22, 95, 96, 111, 112, 133, 134, 146, 163, 177, 184, 204, 210, 229, 235, 248, 255, 386, 392, 405, 406, 461, 462, 474, 491, 505, 515, 535, 541, 560, 567, 581, 593, 606, 613, 680, 706, 712, 726, 727, 770, 771, 783, 800, 814, 825, 845, 851, 870, 878, 892, 906, 919, 926, 1031, 1037, 1052, 1053, 1074, 1075, 1087, 1104, 1118, 1125, 1145, 1151, 1170, 1176, 1189, 1196, 1265, 1266, 1425, 1426, 1576, 1582, 1597, 1598, 1619, 1620, 1632, 1649, 1663, 1670, 1690, 1696, 1715, 1721, 1734, 1741, 1954, 1955, 2135, 2141, 2157, 2158, 2205, 2206, 2218, 2235, 2249, 2259, 2279, 2287, 2306, 2314, 2328, 2344, 2357, 2366, 2379, 2392, 2439, 2445, 2463, 2464, 2526, 2527, 2539, 2556, 2570, 2580, 2600, 2610, 2629, 2637, 2651, 2682, 2695, 2706, 2731, 2742, 2755, 2768, 2811, 2817, 2830, 2831, 2886, 2887, 2899, 2916, 2930, 2940, 2960, 2966, 2985, 2993, 3007, 3026, 3039, 3046, 3083, 3089, 3101, 3102, 3124, 3125, 3137, 3154, 3168, 3174, 3194, 3200, 3219, 3225, 3238, 3245, 3638, 3644, 3663, 3664, 3692, 3693, 3705, 3722, 3736, 3742, 3762, 3768, 3787, 3793, 3806, 3813, 3859, 3860, 4028, 4034, 4048, 4049, 4072, 4073, 4085, 4102, 4116, 4122, 4142, 4148, 4167, 4173, 4186, 4193, 4219, 4220, 4397, 4398, 4487, 4511, 4549, 4606, 4774, 4865, 4915, 4943, 4988, 4989, 4990, 5347, 5353, 5379, 5412, 5414, 5444, 5446, 5447, 5472, 5473, 5475, 5502, 5504, 5532, 5534, 5560, 5562, 5588, 5590, 5591, 5617, 5618, 5620, 5621, 5657, 5658, 5660 ], "line_end_idx": [ 21, 22, 95, 96, 111, 112, 133, 134, 146, 163, 177, 184, 204, 210, 229, 235, 248, 255, 386, 392, 405, 406, 461, 462, 474, 491, 505, 515, 535, 541, 560, 567, 581, 593, 606, 613, 680, 706, 712, 726, 727, 770, 771, 783, 800, 814, 825, 845, 851, 870, 878, 892, 906, 919, 926, 1031, 1037, 1052, 1053, 1074, 1075, 1087, 1104, 1118, 1125, 1145, 1151, 1170, 1176, 1189, 1196, 1265, 1266, 1425, 1426, 1576, 1582, 1597, 1598, 1619, 1620, 1632, 1649, 1663, 1670, 1690, 1696, 1715, 1721, 1734, 1741, 1954, 1955, 2135, 2141, 2157, 2158, 2205, 2206, 2218, 2235, 2249, 2259, 2279, 2287, 2306, 2314, 2328, 2344, 2357, 2366, 2379, 2392, 2439, 2445, 2463, 2464, 2526, 2527, 2539, 2556, 2570, 2580, 2600, 2610, 2629, 2637, 2651, 2682, 2695, 2706, 2731, 2742, 2755, 2768, 2811, 2817, 2830, 2831, 2886, 2887, 2899, 2916, 2930, 2940, 2960, 2966, 2985, 2993, 3007, 3026, 3039, 3046, 3083, 3089, 3101, 3102, 3124, 3125, 3137, 3154, 3168, 3174, 3194, 3200, 3219, 3225, 3238, 3245, 3638, 3644, 3663, 3664, 3692, 3693, 3705, 3722, 3736, 3742, 3762, 3768, 3787, 3793, 3806, 3813, 3859, 3860, 4028, 4034, 4048, 4049, 4072, 4073, 4085, 4102, 4116, 4122, 4142, 4148, 4167, 4173, 4186, 4193, 4219, 4220, 4397, 4398, 4487, 4511, 4549, 4606, 4774, 4865, 4915, 4943, 4988, 4989, 4990, 5347, 5353, 5379, 5412, 5414, 5444, 5446, 5447, 5472, 5473, 5475, 5502, 5504, 5532, 5534, 5560, 5562, 5588, 5590, 5591, 5617, 5618, 5620, 5621, 5657, 5658, 5660, 5696 ] }
{ "red_pajama_v2": { "ccnet_original_length": 5696, "ccnet_original_nlines": 245, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.259892076253891, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.037769779562950134, "rps_doc_frac_lines_end_with_ellipsis": 0.012195119634270668, "rps_doc_frac_no_alph_words": 0.318345308303833, "rps_doc_frac_unique_words": 0.39344263076782227, "rps_doc_mean_word_length": 4.450819492340088, "rps_doc_num_sentences": 63, "rps_doc_symbol_to_word_ratio": 0.005395680200308561, "rps_doc_unigram_entropy": 5.325892448425293, "rps_doc_word_count": 854, "rps_doc_frac_chars_dupe_10grams": 0.10418310761451721, "rps_doc_frac_chars_dupe_5grams": 0.16285188496112823, "rps_doc_frac_chars_dupe_6grams": 0.14680346846580505, "rps_doc_frac_chars_dupe_7grams": 0.12680873274803162, "rps_doc_frac_chars_dupe_8grams": 0.10418310761451721, "rps_doc_frac_chars_dupe_9grams": 0.10418310761451721, "rps_doc_frac_chars_top_2gram": 0.03762168064713478, "rps_doc_frac_chars_top_3gram": 0.025782689452171326, "rps_doc_frac_chars_top_4gram": 0.03683241084218025, "rps_doc_books_importance": -471.43890380859375, "rps_doc_books_importance_length_correction": -471.43890380859375, "rps_doc_openwebtext_importance": -250.24581909179688, "rps_doc_openwebtext_importance_length_correction": -250.24581909179688, "rps_doc_wikipedia_importance": -149.51513671875, "rps_doc_wikipedia_importance_length_correction": -149.51513671875 }, "fasttext": { "dclm": 0.024329839274287224, "english": 0.9416692852973938, "fineweb_edu_approx": 0.9509250521659851, "eai_general_math": 0.0004843499918933958, "eai_open_web_math": 0.12930476665496826, "eai_web_code": 0.000018840000848285854 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.16", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.457", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "2", "label": "Partially Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
2,118,856,299,833,420,500
Medical Definition of Pyogenic granuloma Reviewed on 3/29/2021 Pyogenic granuloma: a small, vascular benign tumor of the skin or mucous membranes. They appear as a small reddish bump that grows rapidly at first and then remains a constant size. The size rarely exceeds 1 cm in diameter. Pyogenic granulomas usually develop on the arms, hands, or face. They occur in people of all ages, but those most commonly affected are in the second and third decades of life. Their exact cause is unknown. They bleed easily because they are rich in blood vessels. Surgery is the preferred treatment because they do not resolve on their own and tend to bleed heavily. They may recur if not completely excised. Pyogenic granuloma is also known as lobular capillary hemangioma. The name "pyogenic" suggests an infectious process, but an infection is not believed to be the cause. CONTINUE SCROLLING OR CLICK HERE SLIDESHOW Rosacea, Acne, Shingles, Covid-19 Rashes: Common Adult Skin Diseases See Slideshow Health Solutions From Our Sponsors References MedlinePlus.com. Pyogenic granuloma.
{ "url": "https://www.medicinenet.com/pyogenic_granuloma/definition.htm", "source_domain": "www.medicinenet.com", "snapshot_id": "crawl=CC-MAIN-2022-49", "warc_metadata": { "Content-Length": "194851", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:NZKZXC3OSXEAXJ6NKRTPWBVROY5FMOHD", "WARC-Concurrent-To": "<urn:uuid:29ef885b-06b5-46f2-b066-cd26cfb5a90d>", "WARC-Date": "2022-12-01T14:36:25Z", "WARC-IP-Address": "104.18.28.163", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:OG2E5JS5TYBNYCTDIZB7NPEPNPYU6SLE", "WARC-Record-ID": "<urn:uuid:7a911f44-7521-4e22-9f46-c6c633857fb3>", "WARC-Target-URI": "https://www.medicinenet.com/pyogenic_granuloma/definition.htm", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:4818747a-1df8-4d2b-acae-8bad0e2a81fd>" }, "warc_info": "isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-125\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 41, 42, 64, 65, 699, 700, 868, 869, 902, 903, 913, 914, 997, 998, 1033, 1034, 1045 ], "line_end_idx": [ 41, 42, 64, 65, 699, 700, 868, 869, 902, 903, 913, 914, 997, 998, 1033, 1034, 1045, 1081 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1081, "ccnet_original_nlines": 17, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.33497536182403564, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.029556650668382645, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.16748768091201782, "rps_doc_frac_unique_words": 0.699999988079071, "rps_doc_mean_word_length": 5.147058963775635, "rps_doc_num_sentences": 14, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.595773696899414, "rps_doc_word_count": 170, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.07771428674459457, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -56.664546966552734, "rps_doc_books_importance_length_correction": -56.664546966552734, "rps_doc_openwebtext_importance": -38.235477447509766, "rps_doc_openwebtext_importance_length_correction": -27.69217300415039, "rps_doc_wikipedia_importance": -27.90818214416504, "rps_doc_wikipedia_importance_length_correction": -27.90818214416504 }, "fasttext": { "dclm": 0.018908560276031494, "english": 0.933892011642456, "fineweb_edu_approx": 3.279818534851074, "eai_general_math": 0.08311765640974045, "eai_open_web_math": 0.5499518513679504, "eai_web_code": 0.004301129840314388 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.019", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.01", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "1", "label": "Remember" } }, "bloom_knowledge_domain": { "primary": { "code": "1", "label": "Factual" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "2", "label": "Click Here References" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "1", "label": "No Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
2,945,657,375,960,794,600
Unoffical empeg BBS Quick Links: Empeg FAQ | Software | RioCar.Org | Hijack | jEmplode | emphatic Repairs: Repairs | Addons: Eutronix | Cases Topic Options #221187 - 13/03/2002 02:36 VNC server tlilley new poster Registered: 20/12/1999 Posts: 19 Loc: Blacksburg, VA File this under "proof of concept" and don't expect miracles Note: you need to "know what you're doing" to use this right now. Grab Frank's displayserver kit (see the Wish List thread on remote control) and install it per instructions. Edit his /sbin/init to remove the call to displayserver (cd /ds, etc.) and replace it with a call to vncd & Point your vncviewer at port 5900 on your Rio Receiver. Note: the server is ultra-brittle and has many things hardcoded. For instance, you must use the -bgr233 option to vncviewer to force the right pixel format, since I don't actually handle the pixel format messages from the client right now. Here's my sample vncviewer (Linux) invocation: vncviewer -bgr233 -encodings raw 10.0.1.204 Right now, the server is incredibly naive and just continuously blasts update messages out over the network. Since each message is only 8KB, that will be line noise on a 10/100 switched segment, but it's still ugly. Since I'm pretty sure a VNC server is part of my Rio / Empeg destiny any way I slice it, I'll likely work on fixing all of this mess My next step (after I get back to real work for a while) is to look at Frank's kernel hacks for displayserver, and see what I can learn from his work. Attachments 1391-vncd (283 downloads) _________________________ S/N 0141 Blue 20GB Top #221188 - 13/03/2002 02:43 Re: VNC server [Re: tlilley] number6 old hand Registered: 30/04/2001 Posts: 744 Loc: In The Village or sometimes: A... Don't forget to check what wfaulk did with his vnc server over in the Empeg BBS as Bitt did something similar for the empeg and there may be a existing codebase you can use to save having to reinvent the wheel. Have a search in the empeg BBS programming forum for vncserver. Top #221189 - 13/03/2002 03:06 Re: VNC server [Re: number6] tlilley new poster Registered: 20/12/1999 Posts: 19 Loc: Blacksburg, VA Hmm. Thanks for the pointer. Second time tonight I've discovered that I'm being redundant It looks like that VNC server requires the Hijack kernel, which, as far as I can tell from searching around here, hasn't been ported yet. Since mine doesn't (currently) handle input, it doesn't need the Hijack kernel's button injector mechanisms. I might wade into hacking up empegVNC to decouple its input handling, though. That way, it would be of use to people with and without the Hijack kernel, and also of use to hackers building "from scratch" (ie: discarding the monolithic player app). Then again, I -could- just get back to my real work _________________________ S/N 0141 Blue 20GB Top #221190 - 13/03/2002 03:35 Re: VNC server [Re: tlilley] fvgestel old hand Registered: 12/08/2000 Posts: 702 Loc: Netherlands the mods in the kernel allow you to write IR-codes to /dev/ir : example code from displayserver.c : struct empeg_ir_write { int type; long ircode; } *irdata; irfd = open("/dev/ir", O_WRONLY|O_CREAT|O_TRUNC); irdata->type=0; irdata->ircode=1; rts = write(irfd, irdata, sizeof(irdata)); if (rts == -1 ) perror("Writing to IR device."); close(irfd); the type is actually allways zero _________________________ Frank van Gestel Top #221191 - 13/03/2002 20:34 Re: VNC server [Re: fvgestel] tlilley new poster Registered: 20/12/1999 Posts: 19 Loc: Blacksburg, VA I can't seem to get this to work. That is, rts is showing me the 'correct' number of bytes written, but nothing's actually -happening- with the Receiver. Do you have a list of the IR codes available? Have you made available, or can you make available, the source for displayserver? I was only able to find what is apparently a quite old version that doesn't support the input / IR stuff. _________________________ S/N 0141 Blue 20GB Top #221192 - 13/03/2002 23:36 Re: VNC server [Re: tlilley] tlilley new poster Registered: 20/12/1999 Posts: 19 Loc: Blacksburg, VA Okay, I originally didn't notice dsrec.c sitting right there in the tarball, but now I have. Apparently I'm completely blind. Whee. Anyway, I've fixed the bug where I wasn't malloc'ing the irdata struct, but I'm still not getting any actual response from the receiver to my button injections. _________________________ S/N 0141 Blue 20GB Top #221193 - 13/03/2002 23:46 Re: VNC server [Re: tlilley] tlilley new poster Registered: 20/12/1999 Posts: 19 Loc: Blacksburg, VA Okay, got it. In the original sample code snippet, you used sizeof(irdata), but that should be sizeof(*irdata). I should've caught that much earlier than this. Dur. Thanks! It's accepting keypresses now (admittedly, with horrendous lag, but, hey. I can deal.) _________________________ S/N 0141 Blue 20GB Top #221194 - 14/03/2002 00:17 Re: VNC server [Re: tlilley] tlilley new poster Registered: 20/12/1999 Posts: 19 Loc: Blacksburg, VA Here's a version with rudimentary keyboard control. Commands mimic the remote keys, not the front panel keys: ENTER: enter ESC: cancel M: menu P: play/pause S: stop >: FF <: REW UP ARROW: select up DOWN ARROW: select down RIGHT ARROW: volume up LEFT ARROW: volume down warning: there's an incredible amount of latency between the keypress and the Receiver's reaction. I haven't debugged that yet, but I suspect it's because I'm just blasting framebuffer updates out indiscriminantly. I don't know whether or not I'll update this further, because I'm considering hacking on empegVNC, since it's much more nicely put together (this is a hack). However, anyone wanting source code is welcome to drop me a mail and I'll send it along. _________________________ S/N 0141 Blue 20GB Top
{ "url": "http://empegbbs.com/ubbthreads.php/topics/221194/VNC_server", "source_domain": "empegbbs.com", "snapshot_id": "crawl=CC-MAIN-2018-22", "warc_metadata": { "Content-Length": "36324", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:DXL5OPJCQVVNS7JUSW4SKRIZTD5IT3YL", "WARC-Concurrent-To": "<urn:uuid:a3bfc910-baa1-44ed-8737-4020e76ce6fe>", "WARC-Date": "2018-05-28T07:48:15Z", "WARC-IP-Address": "212.71.238.72", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:DILWFSVB7DJ6WEVZRD7M5M7IQMQLCTXI", "WARC-Record-ID": "<urn:uuid:6f6f4ea9-5bd7-4db7-bb04-c80cb107d892>", "WARC-Target-URI": "http://empegbbs.com/ubbthreads.php/topics/221194/VNC_server", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:bd6d3dda-8e1a-465d-aafd-2b815ee1ed3c>" }, "warc_info": "robots: classic\r\nhostname: ip-10-229-179-82.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 20, 21, 99, 143, 144, 158, 196, 204, 215, 216, 239, 249, 269, 330, 331, 397, 398, 615, 616, 912, 913, 960, 961, 1005, 1006, 1355, 1356, 1507, 1508, 1509, 1521, 1547, 1548, 1574, 1593, 1594, 1598, 1654, 1662, 1671, 1672, 1695, 1706, 1745, 1825, 1956, 1957, 2021, 2022, 2023, 2027, 2083, 2091, 2102, 2103, 2126, 2136, 2156, 2246, 2247, 2494, 2495, 2743, 2744, 2796, 2822, 2841, 2842, 2846, 2902, 2911, 2920, 2921, 2944, 2955, 2972, 3036, 3072, 3073, 3097, 3107, 3120, 3131, 3132, 3182, 3198, 3216, 3259, 3275, 3308, 3321, 3322, 3323, 3357, 3383, 3400, 3401, 3405, 3462, 3470, 3481, 3482, 3505, 3515, 3535, 3689, 3690, 3736, 3737, 3925, 3951, 3970, 3971, 3975, 4031, 4039, 4050, 4051, 4074, 4084, 4104, 4236, 4237, 4398, 4424, 4443, 4444, 4448, 4504, 4512, 4523, 4524, 4547, 4557, 4577, 4742, 4743, 4838, 4864, 4883, 4884, 4888, 4944, 4952, 4963, 4964, 4987, 4997, 5017, 5127, 5128, 5141, 5153, 5161, 5175, 5183, 5189, 5196, 5216, 5240, 5263, 5287, 5288, 5503, 5504, 5751, 5777, 5796, 5797 ], "line_end_idx": [ 20, 21, 99, 143, 144, 158, 196, 204, 215, 216, 239, 249, 269, 330, 331, 397, 398, 615, 616, 912, 913, 960, 961, 1005, 1006, 1355, 1356, 1507, 1508, 1509, 1521, 1547, 1548, 1574, 1593, 1594, 1598, 1654, 1662, 1671, 1672, 1695, 1706, 1745, 1825, 1956, 1957, 2021, 2022, 2023, 2027, 2083, 2091, 2102, 2103, 2126, 2136, 2156, 2246, 2247, 2494, 2495, 2743, 2744, 2796, 2822, 2841, 2842, 2846, 2902, 2911, 2920, 2921, 2944, 2955, 2972, 3036, 3072, 3073, 3097, 3107, 3120, 3131, 3132, 3182, 3198, 3216, 3259, 3275, 3308, 3321, 3322, 3323, 3357, 3383, 3400, 3401, 3405, 3462, 3470, 3481, 3482, 3505, 3515, 3535, 3689, 3690, 3736, 3737, 3925, 3951, 3970, 3971, 3975, 4031, 4039, 4050, 4051, 4074, 4084, 4104, 4236, 4237, 4398, 4424, 4443, 4444, 4448, 4504, 4512, 4523, 4524, 4547, 4557, 4577, 4742, 4743, 4838, 4864, 4883, 4884, 4888, 4944, 4952, 4963, 4964, 4987, 4997, 5017, 5127, 5128, 5141, 5153, 5161, 5175, 5183, 5189, 5196, 5216, 5240, 5263, 5287, 5288, 5503, 5504, 5751, 5777, 5796, 5797, 5800 ] }
{ "red_pajama_v2": { "ccnet_original_length": 5800, "ccnet_original_nlines": 169, "rps_doc_curly_bracket": 0.0003448300121817738, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.27452415227890015, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.06588579714298248, "rps_doc_frac_lines_end_with_ellipsis": 0.005882349796593189, "rps_doc_frac_no_alph_words": 0.3294290006160736, "rps_doc_frac_unique_words": 0.4839424192905426, "rps_doc_mean_word_length": 4.727574825286865, "rps_doc_num_sentences": 47, "rps_doc_symbol_to_word_ratio": 0.006588580086827278, "rps_doc_unigram_entropy": 5.608602046966553, "rps_doc_word_count": 903, "rps_doc_frac_chars_dupe_10grams": 0.0946357473731041, "rps_doc_frac_chars_dupe_5grams": 0.12789881229400635, "rps_doc_frac_chars_dupe_6grams": 0.0946357473731041, "rps_doc_frac_chars_dupe_7grams": 0.0946357473731041, "rps_doc_frac_chars_dupe_8grams": 0.0946357473731041, "rps_doc_frac_chars_dupe_9grams": 0.0946357473731041, "rps_doc_frac_chars_top_2gram": 0.023190440610051155, "rps_doc_frac_chars_top_3gram": 0.018037009984254837, "rps_doc_frac_chars_top_4gram": 0.021316470578312874, "rps_doc_books_importance": -669.1272583007812, "rps_doc_books_importance_length_correction": -669.1272583007812, "rps_doc_openwebtext_importance": -315.5077209472656, "rps_doc_openwebtext_importance_length_correction": -315.5077209472656, "rps_doc_wikipedia_importance": -193.1865692138672, "rps_doc_wikipedia_importance_length_correction": -193.1865692138672 }, "fasttext": { "dclm": 0.018419800326228142, "english": 0.8805705308914185, "fineweb_edu_approx": 1.031867265701294, "eai_general_math": 0.20250481367111206, "eai_open_web_math": 0.23575043678283691, "eai_web_code": 0.01725279912352562 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.6", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.457", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "2", "label": "Partially Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
8,424,801,266,784,628,000
jQuery Plugin: Table of Contents with Smooth Scrolling Hey guys, have you noticed that pretty box on WordPress codex that gives us a preview about what we can see on a page? So, I haven’t seen too many blogs use this kind of feature and it is really useful for our readers, since they can just skip to the content that they are interested in and avoid wasting time. Wikipedia has a table of contents that makes it easier for readers to skip around, right? I’m not the very first to do something like this with jQuery. But our goal in here is to develop a complete jQuery plugin, from start to finish, with options, and that is easy to customize. And, of course, something that I hope is useful to you So, let’s rock! STOC – Smooth Table of Contents jQuery plugin Since there are a lot of “tocs” around the web, our plugin will be called STOC and the main features are: • Automatically adds the table of contents to target element • You can select to search just a part of you page • You can select what is the first heading we will have to search (h1, h2…) • You can select the “depth” of the search • SubItems are made of sublists inside parent item • You can select which text will display before the table (title) • You can select whether ol or ul to you listing • You can enable / disable smooth scrolling Here is how it should look in our demo: Here’s a running Demo. You can also download all files here. Planning and planning – Before code, let’s think about it The main idea is to have a jQuery plugin that generates a table of content inside the target element. To have this working we need some basic customization with these options: • Where to search – If the table is generated based on entire page, just a section content • Depth of H’s – How many “levels” of titles we will have in our search • Start tag – Which level of heading will be the first on set (h1, h2, h3) • Title if the box – What to display as box’s title • List type – whether to have ordered or unordered list The hardest thing when we are doing something just for fun is to define the scope. Actually it is hard too when we have a “real” project, but when it comes to pet projects it is harder because you just can’t measure accurately what will bring you the expected revenue (fun). So, what do I do in these cases is list anything that I could do on it, and just cut down what will take too much time and will not be so good to do. In this case, for example I listed these features: • Customizable via options – I think this one was essential, so I just kept it • Smooth scrolling - This one I didn’t see in any other plugin / snippet. It would be good to have, so I kept it. • Accordion for hierarchy - I found this idea really cool, but useless, I drop it. • Preview of the text on hover - I’ve stolen this idea of one site but actually didn’t find it useful also, so I drop it. So what I’ve done here is to define which of the cool features had big potential to be a waste of time. Even if I had more time to code I would never use them, just because they haven’t the expected benefit (fun x time). Now that we now what we want to do, let’s start to code. Basic plugin structure with options First we need to create our file. The standard for jQuery plugins files names is jQuery.PLUGINNAME.js so, our file will be jquery.stoc.js. We also have all our options defined above, so we need now to save a variable for each one of them, so our user can send his own parameters. Here is our commented code: /* This line creates our function "wrapped" by jQuery container, so we won't have any problem with others libraries */ (function($){ /* Here the standard is $.fn.PLUGINNAME. so when we call $(element).stoc() jquery will run this code Pay attention that we pass options to our funcion, so when user defines it we can extend our plugin */ $.fn.stoc = function(options) { //Our default options var defaults = { search: "body", //where we will search for titles depth: 6, //how many hN should we search start: 1, //which hN will be the first (and after it we go just deeper) stocTitle: "<h2>Contents</h2>", //what to display before our box listType: "ul", //could be ul or ol smoothScroll: 1 }; //let's extend our plugin with default or user options when defined var options = $.extend(defaults, options); return this.each(function() { //our functions here alert("I'm a beta tester alert box!"); }); }; })(jQuery); Let’s try a simple demo to see it working. Create this HTML in same folder as our plugin: <!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Smooth Table Of Contents jQuery plugin - DEMO</title> <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js"></script> <script type="text/javascript" src="jquery.stoc.js"></script> <script type="text/javascript"> $(function(){ $("#items").stoc(); }); </script> <style type="text/css"> body { background: #fafafa url(handmadepaper.png); //via subtlepatterns } #container { position: relative; top: 50px; width: 960px; margin: 0 auto; padding-bottom: 20px; } #container p, #container h1, #container h2, #container h3, #container h4, #container h5 { font-family: "arial"; padding: 10px 20px 0; margin: 0 } #items { float: right; width: 260px; padding-bottom: 10px; margin:0 0 10px 20px; /* rgba with ie compatibility */ background-color: transparent; background-color: rgba(255,255,255,0.4); filter:progid:DXImageTransform.Microsoft.gradient(startColorstr=#20ffffff,endColorstr=#20ffffff); -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorstr=#20ffffff,endColorstr=#20ffffff)"; } #items ul { margin: 0 0 0 20px; padding: 0 0 5px; list-style-type: none; } #items ul ul { font-size: 90%; } #items ul a { font-family: "arial"; text-decoration: none; color: #c10000; } #items ul a:hover { color: #ff0000 } </style> </head> <body id="page-1"> <div id="container"> <div id="items"> </div> <h1>1 - Phasellus vulputate</h1> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Maecenas metus est, egestas vel aliquet at, pellentesque nec lorem. Pellentesque molestie bibendum eros, eu suscipit nisi volutpat fringilla. Vivamus fringilla nisl ut ante commodo porta. Morbi ipsum nunc, sollicitudin ac pretium pretium, iaculis vel enim. Nulla cursus porta orci, sed vulputate magna feugiat et. Aliquam nibh massa, pharetra tincidunt vehicula ac, pellentesque vitae nibh. In lobortis semper eros fermentum pretium. Sed posuere, urna eget ornare luctus, mi lectus lacinia leo, sit amet faucibus orci ipsum sit amet ipsum. Maecenas sapien neque, ultrices a lacinia sit amet, fermentum non enim. Integer at venenatis orci. In hac habitasse platea dictumst.</p> [... lot of more lipsum text with h's here] </div> </body> </html> If you create this file, when you load it you should see our pretty beta tester alert. So our plugin is being called (make sure that you add jquery before it, as I’ve done including api.googleapis…). if you want to overwrite any option defined before, you just have to pass it as .stoc({ OPTIONNAME: VALUE }) instead of just .stoc(). For example, to define our search just in #container, add .stoc({ search: "#container" }). How should we select our headings? Now we have to prepare our plugin to get all h’s that we have to (based in our options). What we can do is get all the headings we have to, and when we loop through each one of them we will discover which level it is. I think it is easier than trying to get the whole hierarchy for each “tree” of headings. Since our current object can change as we run our code, we have also to “cache” our current object so we will always now which object we are modifying. Our code now will be: return this.each(function() { //"cache" our target and search objects obj = $(this); //target src = $(options.search); //search //let's declare some variables. We need this var declaration to create them as local variables (not global) var appHTML = "", tagNumber = 0, txt = "", id = "", before = "", after = "", previous = options.start, start = options.start, depth = options.depth, i = 0, srcTags = "h" + options.start, cacheHN = ""; //which tags we will search while ( depth > 1) { start++; //we will just get our start level and numbers higher than it srcTags = srcTags + ", h" + start; depth--; //since went one level up, our depth will go one level down } }); If you alert you srcTags you will see something like this “h1, h2, h3, h4, h5, h6″. This is what we will pass to jQuery as the elements that we want to search for. Building our table We have all our elements, what we have to do is run a function on each one of them with the wonderful each() jQuery function. Inside each element, we need to: • Know which level the current element is (tagNumber) • Set one id to this element, if it doesn’t have one • Get the elements text • Test if is its level is lower, higher or equal than previous element and open / close ul’s based on this • If element number is higher than previous means that we went down one level (e.g. from h2 to h3) • If element number is equals to previous means that we stay on same level (e.g. h4) • If element number is lower than previous means that we went up, but we don’t know how many levels (e.g. from h4 to h1) • Append element HTML to our target item We also have to correct the last item because if it is not top-level it will let some uls open, and we don’t want it :D Our commented code now will be: /* our setup stuff here */ /*inside our return function */ //which tags we will search while ( depth > 1) { start++; //we will just get our start level and numbers higher than it srcTags = srcTags + ", h" + start; depth--; //since went one level up, our depth will go one level down } src.find(srcTags).each(function() { //we will cache our current H element cacheHN = $(this); //if we are on h1, 2, 3... tagNumber = ( cacheHN.get(0).tagName ).substr(1); //sets the needed id to the element id = cacheHN.attr('id'); if (id == "") { //if it doesn't have only, of course id = "h" + tagNumber + "_" + i; cacheHN.attr('id', id); } //our current text txt = cacheHN.text(); switch(true) { //with switch(true) we can do comparisons in each case case (tagNumber > previous) : //it means that we went down one level (e.g. from h2 to h3) appHTML = appHTML + "<" + options.listType +"><li>"+ before +"<a href=\"#"+ id + "\">" + txt + "</a>"; previous = tagNumber; break; case (tagNumber == previous) : //it means that stay on the same level (e.g. h3 and stay on it) appHTML = appHTML + "</li><li>"+ before +"<a href=\"#"+ id + "\">" + txt + "</a>"; break; case (tagNumber < previous) : //it means that we went up but we don't know how much levels (e.g. from h3 to h2) while(tagNumber != previous) { appHTML = appHTML + "</" + options.listType +"></li>"; previous--; } appHTML = appHTML + "<li>"+ before +"<a href=\"#"+ id + "\">" + txt + "</a></li>"; break; } i++; }); //corrects our last item, because it may have some opened ul's while(tagNumber != options.start) { appHTML = appHTML + "</" + options.listType +">"; tagNumber--; } //append our html to our object appHTML = options.stocTitle + "<"+ options.listType + ">" + appHTML + "</" + options.listType + ">"; obj.append(appHTML); How to Make our STOC smoother I’ve stolen CSS trick’s smooth scroll code, but I hope they don’t mind :D What we have to do here is just put this (compressed) function to load when our smooth scroll in on (if the user doesn’t set it as 0). /*all code above in here*/ //append our html to our object appHTML = options.stocTitle + "<"+ options.listType + ">" + appHTML + "</" + options.listType + ">"; obj.append(appHTML); //our pretty smooth scrolling here // acctually I've just compressed the code so you guys will think that I'm the man . Source: http://css-tricks.com/snippets/jquery/smooth-scrolling/ if (options.smoothScroll == 1) { $(window).load(function(){ function filterPath(string){return string.replace(/^\//,'').replace(/(index|default).[a-zA-Z]{3,4}$/,'').replace(/\/$/,'')}var locationPath=filterPath(location.pathname);var scrollElem=scrollableElement('html','body');obj.find('a[href*=#]').each(function(){var thisPath=filterPath(this.pathname)||locationPath;if(locationPath==thisPath&&(location.hostname==this.hostname||!this.hostname)&&this.hash.replace(/#/,'')){var $target=$(this.hash),target=this.hash;if(target){var targetOffset=$target.offset().top;$(this).click(function(event){event.preventDefault();$(scrollElem).animate({scrollTop:targetOffset},400,function(){location.hash=target})})}}});function scrollableElement(els){for(var i=0,argLength=arguments.length;i<argLength;i++){var el=arguments[i],$scrollElement=$(el);if($scrollElement.scrollTop()>0){return el}else{$scrollElement.scrollTop(1);var isScrollable=$scrollElement.scrollTop()>0;$scrollElement.scrollTop(0);if(isScrollable){return el}}}return[]} }); } Our final result is this: (function($){ $.fn.stoc = function(options) { //Our default options var defaults = { search: "body", //where we will search for titles depth: 6, //how many hN should we search start: 1, //which hN will be the first (and after it we go just deeper) stocTitle: "<h2>Contents</h2>", //what to display before our box listType: "ul", //could be ul or ol smoothScroll: 1 }; //let's extend our plugin with default or user options when defined var options = $.extend(defaults, options); return this.each(function() { //"cache" our target and search objects obj = $(this); //target src = $(options.search); //search //let's declare some variables. We need this var declaration to create them as local variables (not global) var appHTML = "", tagNumber = 0, txt = "", id = "", before = "", after = "", previous = options.start, start = options.start, depth = options.depth, i = 0, srcTags = "h" + options.start, cacheHN = ""; //which tags we will search while ( depth > 1) { start++; //we will just get our start level and numbers higher than it srcTags = srcTags + ", h" + start; depth--; //since went one level up, our depth will go one level down } src.find(srcTags).each(function() { //we will cache our current H element cacheHN = $(this); //if we are on h1, 2, 3... tagNumber = ( cacheHN.get(0).tagName ).substr(1); //sets the needed id to the element id = cacheHN.attr('id'); if (id == "") { //if it doesn't have only, of course id = "h" + tagNumber + "_" + i; cacheHN.attr('id', id); } //our current text txt = cacheHN.text(); switch(true) { //with switch(true) we can do comparisons in each case case (tagNumber > previous) : //it means that we went down one level (e.g. from h2 to h3) appHTML = appHTML + "<" + options.listType +"><li>"+ before +"<a href=\"#"+ id + "\">" + txt + "</a>"; previous = tagNumber; break; case (tagNumber == previous) : //it means that stay on the same level (e.g. h3 and stay on it) appHTML = appHTML + "</li><li>"+ before +"<a href=\"#"+ id + "\">" + txt + "</a>"; break; case (tagNumber < previous) : //it means that we went up but we don't know how much levels (e.g. from h3 to h2) while(tagNumber != previous) { appHTML = appHTML + "</" + options.listType +"></li>"; previous--; } appHTML = appHTML + "<li>"+ before +"<a href=\"#"+ id + "\">" + txt + "</a></li>"; break; } i++; }); //corrects our last item, because it may have some opened ul's while(tagNumber != options.start) { appHTML = appHTML + "</" + options.listType +">"; tagNumber--; } //append our html to our object appHTML = options.stocTitle + "<"+ options.listType + ">" + appHTML + "</" + options.listType + ">"; obj.append(appHTML); //our pretty smooth scrolling here // acctually I've just compressed the code so you guys will think that I'm the man . Source: http://css-tricks.com/snippets/jquery/smooth-scrolling/ if (options.smoothScroll == 1) { $(window).load(function(){ function filterPath(string){return string.replace(/^\//,'').replace(/(index|default).[a-zA-Z]{3,4}$/,'').replace(/\/$/,'')}var locationPath=filterPath(location.pathname);var scrollElem=scrollableElement('html','body');obj.find('a[href*=#]').each(function(){var thisPath=filterPath(this.pathname)||locationPath;if(locationPath==thisPath&&(location.hostname==this.hostname||!this.hostname)&&this.hash.replace(/#/,'')){var $target=$(this.hash),target=this.hash;if(target){var targetOffset=$target.offset().top;$(this).click(function(event){event.preventDefault();$(scrollElem).animate({scrollTop:targetOffset},400,function(){location.hash=target})})}}});function scrollableElement(els){for(var i=0,argLength=arguments.length;i<argLength;i++){var el=arguments[i],$scrollElement=$(el);if($scrollElement.scrollTop()>0){return el}else{$scrollElement.scrollTop(1);var isScrollable=$scrollElement.scrollTop()>0;$scrollElement.scrollTop(0);if(isScrollable){return el}}}return[]} }); } }); }; })(jQuery); Are you hungry yet? What about you help me with some improvements on this plugin? Do you have any tip? Anything that you can think of a better way to do? Do you have any other features in mind? Or even another plugin idea that you’d like to see a tutorial on? Share your thoughts with us! :D Rochester Oliveira I'm a web designer and entrepreneur from Itajubá (MG), Brasil. I love writing about obscure topics and doing some cool stuff. And also I do some FREE stuff, check it out: http://www.roch.com.br/ 15 Smart Tools To Help You Build Your Freelance Business Discover the awesome tools we use in making our clients comfortable and happy in learning new things every day. Download Now Comments 1. says Hey, I fixed a bug in your plugin where it went to an infinite loop at this line: while(tagNumber != options.start) { appHTML = appHTML + “”; tagNumber–; } The tagnumber went under 0 so this loop never stopped and made the browsers to crash. You can find the fix here: https://gist.github.com/2719592 2. Diego says sorry. Here is the code case (tagNumber < previous) : //it means that we went up but we don't know how much levels (e.g. from h3 to h2) appHTML = appHTML + ""; while(tagNumber != previous) { appHTML = appHTML + ""; previous--; } appHTML = appHTML + ""+ before +"" + txt + ""; break; • Diego says Here i go again… case (tagNumber < previous) : //it means that we went up but we don't know how much levels (e.g. from h3 to h2) appHTML = appHTML + "”; while(tagNumber != previous) { appHTML = appHTML + “”; previous–; } appHTML = appHTML + “”+ before +”lessThan a h ref=\”#”+ id + “\”>” + txt + “Lessthan/a>”; break; 3. Robin says Any chance of fixing this for the latest version of JQuery? The link come back as undefined and smooth scroll doesn’t work. 4. says Great plugin! The best part about it is that there is nothing you have to hardcode. So, as long as there are H1s on the page, you are good to go :) Thank you so much! 5. Alex C says Documented how to use your amazing plugin with SharePoint. Thanks again for this great article and the code :) • says Hi Alex, I’ve read it, and you won’t believe how glad I am. You really improved it, and your article is pretty well explained. Thanks A LOT! []’s Rochester 6. Alex C says For some reason, on SharePoint 2010, it was appending “#undefined” to all the table of contents items. So I modified the JS to this: if (id == "" || typeof id === "undefined") { //if it doesn't have only, of course id = "h" + tagNumber + "_" + i; cacheHN.attr('id', id); } It now works! Just in case anyone else runs into this issue. 7. Alex C says Amazing stuff! Thanks for sharing this. I was looking to add this to a SharePoint publishing page and thought of creating from scratch until I came across this. Very nice. Thank you for creating this :) 8. says Thanks for sharing, it’s a very useful technique. I just want to add that a scroll to top will be a nice feature. But there’s so many options to implement this… it’s not a problem. I spent several years making internal manuals in various companies, and online classes too, it’s like making a mini-site with huge individual pages. I found that a non-fix vertical menu on a left sidebar was the more practical and intuitive way to implement a table of content. You want your reader focused on its reading, so the wiki format isn’t, in my feel, the best way to help somebody to learn and memorize something new. If you sum to this some tool-tips and modal windows, and your table of content, you have a fantastic and powerful tool for teaching. Once again, thanks for sharing this. • says Hey egiova, As Abdelhadi said below it would be really helpful. It is pretty easy to add it, is just append some code (like this “top” link) while you are in each() loop. I agree with you, this must to be the best way to wiki-like sites, and I think it is really helpful for tutorials or roundups, so readers can go and read just what they want to learn (like if you are in a jquery plugins roundup and just want to see the sliders).. Thank you, again! []’s 9. Julian says nice code,and good description to develop own jquery plugins. very usefull, thanks! 10. Abdelhadi Touil says Very nice plugin; thanks very much for sharing. I think it’ll be better if it adds automatically a “top” link ine the of each section. What do you think? (Sorry for my bad English) • says Hey Abdelhadi, It is a good idea, and pretty simple do do, since our smooth scrolling can apply to this link also.. Thank you for the insight! []’s • says Hey wesley, I think we missed it. MIT is ok to me, since you can do anything you want with this code and it has no warranty. Thank you for pointing it out, next time I’ll include this in our .zip ! []’s
{ "url": "http://www.1stwebdesigner.com/css/jquery-plugin-smooth-scrolling/", "source_domain": "www.1stwebdesigner.com", "snapshot_id": "crawl=CC-MAIN-2014-49", "warc_metadata": { "Content-Length": "110001", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:P4CHSYURWWZZ7QHWDIKWP6SUPZLP43PS", "WARC-Concurrent-To": "<urn:uuid:6dece6cf-b0d3-4456-8799-2a8590cf2917>", "WARC-Date": "2014-11-24T05:07:41Z", "WARC-IP-Address": "104.131.160.43", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:Y4K6R3TKH5SJLEGWUHKAPX457L3UOEG5", "WARC-Record-ID": "<urn:uuid:e3269fe6-49de-4ed8-8a77-7f399b14bfa4>", "WARC-Target-URI": "http://www.1stwebdesigner.com/css/jquery-plugin-smooth-scrolling/", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c3b7a3d7-c3fc-48a7-9413-1072b6c915d6>" }, "warc_info": "robots: classic\r\nhostname: ip-10-235-23-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-49\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for November 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 55, 56, 457, 458, 703, 704, 720, 721, 767, 768, 874, 875, 938, 991, 1069, 1114, 1167, 1235, 1286, 1332, 1333, 1373, 1374, 1435, 1436, 1494, 1495, 1671, 1672, 1765, 1839, 1916, 1970, 2028, 2029, 2304, 2305, 2455, 2456, 2507, 2508, 2589, 2705, 2790, 2914, 2915, 3136, 3137, 3194, 3195, 3231, 3232, 3371, 3372, 3513, 3514, 3542, 3543, 3546, 3659, 3662, 3676, 3679, 3777, 3877, 3880, 3913, 3936, 3954, 4006, 4049, 4123, 4190, 4228, 4246, 4250, 4251, 4320, 4364, 4365, 4396, 4419, 4460, 4465, 4468, 4480, 4481, 4571, 4572, 4682, 4732, 4801, 4863, 4975, 5038, 5071, 5087, 5110, 5116, 5127, 5152, 5161, 5229, 5233, 5249, 5273, 5288, 5306, 5326, 5352, 5357, 5450, 5476, 5502, 5516, 5521, 5533, 5551, 5569, 5595, 5621, 5658, 5693, 5738, 5840, 5949, 5954, 5970, 5995, 6018, 6046, 6052, 6072, 6094, 6101, 6119, 6146, 6174, 6195, 6201, 6243, 6253, 6261, 6280, 6302, 6321, 6330, 6365, 7104, 7150, 7158, 7166, 7174, 7175, 7600, 7601, 7636, 7637, 7944, 7945, 8119, 8120, 8153, 8195, 8221, 8257, 8367, 8570, 8571, 8601, 8624, 8698, 8736, 8808, 8812, 8813, 8821, 8822, 8986, 8987, 9006, 9007, 9133, 9134, 9167, 9168, 9224, 9279, 9305, 9414, 9517, 9606, 9731, 9774, 9775, 9895, 9896, 9928, 9929, 9956, 9988, 10017, 10040, 10114, 10152, 10224, 10228, 10266, 10307, 10329, 10359, 10412, 10413, 10452, 10480, 10536, 10572, 10600, 10605, 10627, 10652, 10653, 10726, 10820, 10929, 10957, 10969, 11068, 11158, 11170, 11287, 11324, 11386, 11405, 11413, 11502, 11514, 11519, 11527, 11533, 11598, 11636, 11689, 11705, 11709, 11743, 11846, 11869, 11870, 11900, 11901, 11975, 11976, 12111, 12112, 12139, 12172, 12275, 12298, 12299, 12336, 12487, 12522, 12552, 13525, 13532, 13536, 13537, 13563, 13564, 13578, 13611, 13634, 13652, 13704, 13747, 13821, 13888, 13926, 13944, 13948, 13949, 14018, 14062, 14063, 14097, 14139, 14165, 14201, 14311, 14514, 14515, 14545, 14568, 14642, 14680, 14752, 14756, 14794, 14835, 14857, 14887, 14940, 14941, 14980, 15008, 15064, 15100, 15128, 15133, 15155, 15180, 15181, 15254, 15348, 15457, 15485, 15497, 15596, 15686, 15698, 15815, 15852, 15914, 15933, 15941, 16030, 16042, 16047, 16055, 16061, 16126, 16164, 16217, 16233, 16237, 16271, 16374, 16397, 16398, 16435, 16586, 16621, 16651, 17624, 17631, 17635, 17643, 17647, 17659, 17660, 17680, 17681, 17815, 17816, 17922, 17923, 17955, 17956, 17975, 17976, 18171, 18172, 18229, 18230, 18342, 18343, 18356, 18357, 18366, 18367, 18377, 18378, 18387, 18388, 18469, 18470, 18510, 18538, 18554, 18560, 18561, 18678, 18714, 18715, 18731, 18732, 18743, 18764, 18765, 18881, 18909, 18944, 18972, 18988, 18994, 19045, 19056, 19057, 19074, 19075, 19098, 19099, 19217, 19247, 19284, 19314, 19331, 19339, 19435, 19448, 19449, 19465, 19466, 19594, 19595, 19605, 19606, 19624, 19625, 19763, 19764, 19787, 19788, 19805, 19806, 19921, 19922, 19933, 19934, 19949, 19950, 20074, 20075, 20095, 20106, 20122, 20123, 20140, 20141, 20278, 20364, 20400, 20428, 20434, 20435, 20500, 20501, 20518, 20519, 20726, 20727, 20737, 20738, 20923, 20924, 21489, 21530, 21531, 21542, 21543, 21561, 21562, 21727, 21728, 21998, 21999, 22023, 22034, 22035, 22052, 22053, 22124, 22145, 22146, 22173, 22174, 22226, 22336, 22367, 22368, 22379, 22380, 22502, 22503, 22536, 22547, 22548, 22559, 22560, 22691, 22692, 22771, 22772 ], "line_end_idx": [ 55, 56, 457, 458, 703, 704, 720, 721, 767, 768, 874, 875, 938, 991, 1069, 1114, 1167, 1235, 1286, 1332, 1333, 1373, 1374, 1435, 1436, 1494, 1495, 1671, 1672, 1765, 1839, 1916, 1970, 2028, 2029, 2304, 2305, 2455, 2456, 2507, 2508, 2589, 2705, 2790, 2914, 2915, 3136, 3137, 3194, 3195, 3231, 3232, 3371, 3372, 3513, 3514, 3542, 3543, 3546, 3659, 3662, 3676, 3679, 3777, 3877, 3880, 3913, 3936, 3954, 4006, 4049, 4123, 4190, 4228, 4246, 4250, 4251, 4320, 4364, 4365, 4396, 4419, 4460, 4465, 4468, 4480, 4481, 4571, 4572, 4682, 4732, 4801, 4863, 4975, 5038, 5071, 5087, 5110, 5116, 5127, 5152, 5161, 5229, 5233, 5249, 5273, 5288, 5306, 5326, 5352, 5357, 5450, 5476, 5502, 5516, 5521, 5533, 5551, 5569, 5595, 5621, 5658, 5693, 5738, 5840, 5949, 5954, 5970, 5995, 6018, 6046, 6052, 6072, 6094, 6101, 6119, 6146, 6174, 6195, 6201, 6243, 6253, 6261, 6280, 6302, 6321, 6330, 6365, 7104, 7150, 7158, 7166, 7174, 7175, 7600, 7601, 7636, 7637, 7944, 7945, 8119, 8120, 8153, 8195, 8221, 8257, 8367, 8570, 8571, 8601, 8624, 8698, 8736, 8808, 8812, 8813, 8821, 8822, 8986, 8987, 9006, 9007, 9133, 9134, 9167, 9168, 9224, 9279, 9305, 9414, 9517, 9606, 9731, 9774, 9775, 9895, 9896, 9928, 9929, 9956, 9988, 10017, 10040, 10114, 10152, 10224, 10228, 10266, 10307, 10329, 10359, 10412, 10413, 10452, 10480, 10536, 10572, 10600, 10605, 10627, 10652, 10653, 10726, 10820, 10929, 10957, 10969, 11068, 11158, 11170, 11287, 11324, 11386, 11405, 11413, 11502, 11514, 11519, 11527, 11533, 11598, 11636, 11689, 11705, 11709, 11743, 11846, 11869, 11870, 11900, 11901, 11975, 11976, 12111, 12112, 12139, 12172, 12275, 12298, 12299, 12336, 12487, 12522, 12552, 13525, 13532, 13536, 13537, 13563, 13564, 13578, 13611, 13634, 13652, 13704, 13747, 13821, 13888, 13926, 13944, 13948, 13949, 14018, 14062, 14063, 14097, 14139, 14165, 14201, 14311, 14514, 14515, 14545, 14568, 14642, 14680, 14752, 14756, 14794, 14835, 14857, 14887, 14940, 14941, 14980, 15008, 15064, 15100, 15128, 15133, 15155, 15180, 15181, 15254, 15348, 15457, 15485, 15497, 15596, 15686, 15698, 15815, 15852, 15914, 15933, 15941, 16030, 16042, 16047, 16055, 16061, 16126, 16164, 16217, 16233, 16237, 16271, 16374, 16397, 16398, 16435, 16586, 16621, 16651, 17624, 17631, 17635, 17643, 17647, 17659, 17660, 17680, 17681, 17815, 17816, 17922, 17923, 17955, 17956, 17975, 17976, 18171, 18172, 18229, 18230, 18342, 18343, 18356, 18357, 18366, 18367, 18377, 18378, 18387, 18388, 18469, 18470, 18510, 18538, 18554, 18560, 18561, 18678, 18714, 18715, 18731, 18732, 18743, 18764, 18765, 18881, 18909, 18944, 18972, 18988, 18994, 19045, 19056, 19057, 19074, 19075, 19098, 19099, 19217, 19247, 19284, 19314, 19331, 19339, 19435, 19448, 19449, 19465, 19466, 19594, 19595, 19605, 19606, 19624, 19625, 19763, 19764, 19787, 19788, 19805, 19806, 19921, 19922, 19933, 19934, 19949, 19950, 20074, 20075, 20095, 20106, 20122, 20123, 20140, 20141, 20278, 20364, 20400, 20428, 20434, 20435, 20500, 20501, 20518, 20519, 20726, 20727, 20737, 20738, 20923, 20924, 21489, 21530, 21531, 21542, 21543, 21561, 21562, 21727, 21728, 21998, 21999, 22023, 22034, 22035, 22052, 22053, 22124, 22145, 22146, 22173, 22174, 22226, 22336, 22367, 22368, 22379, 22380, 22502, 22503, 22536, 22547, 22548, 22559, 22560, 22691, 22692, 22771, 22772, 22782 ] }
{ "red_pajama_v2": { "ccnet_original_length": 22782, "ccnet_original_nlines": 494, "rps_doc_curly_bracket": 0.005881839897483587, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0.00005293999856803566, "rps_doc_stop_word_fraction": 0.3001708686351776, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.015378770418465137, "rps_doc_frac_lines_end_with_ellipsis": 0.006060610059648752, "rps_doc_frac_no_alph_words": 0.33149799704551697, "rps_doc_frac_unique_words": 0.26014700531959534, "rps_doc_mean_word_length": 5.0373921394348145, "rps_doc_num_sentences": 303, "rps_doc_symbol_to_word_ratio": 0.007784320041537285, "rps_doc_unigram_entropy": 5.845767021179199, "rps_doc_word_count": 3129, "rps_doc_frac_chars_dupe_10grams": 0.3661971688270569, "rps_doc_frac_chars_dupe_5grams": 0.3777439296245575, "rps_doc_frac_chars_dupe_6grams": 0.36911559104919434, "rps_doc_frac_chars_dupe_7grams": 0.3675929605960846, "rps_doc_frac_chars_dupe_8grams": 0.3661971688270569, "rps_doc_frac_chars_dupe_9grams": 0.3661971688270569, "rps_doc_frac_chars_top_2gram": 0.015099610202014446, "rps_doc_frac_chars_top_3gram": 0.006280929781496525, "rps_doc_frac_chars_top_4gram": 0.007613250054419041, "rps_doc_books_importance": -2244.673095703125, "rps_doc_books_importance_length_correction": -2244.673095703125, "rps_doc_openwebtext_importance": -1245.7884521484375, "rps_doc_openwebtext_importance_length_correction": -1245.7884521484375, "rps_doc_wikipedia_importance": -933.7453002929688, "rps_doc_wikipedia_importance_length_correction": -933.7453002929688 }, "fasttext": { "dclm": 0.2761227488517761, "english": 0.7655848264694214, "fineweb_edu_approx": 1.4676697254180908, "eai_general_math": 0.5146803259849548, "eai_open_web_math": 0.28984224796295166, "eai_web_code": 0.3566736578941345 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.133", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "2", "label": "Click Here References" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-794,818,164,276,827,000
Grawe, Thomas; Schrader, Thomas; Finocchiaro, Paolo; Failla, Salvatore; Consiglio, Giuseppe: A new receptor molecule for lysine and histidine in water - strong binding of basic amino acids by a macrocyclic host. In: Proceedings of ECSOC-3, [and] Proceedings of ECSOC-4, Sept.1-30, 1999 and 2000, S. 1623 - 1637 2000Artikel/Aufsatz in ZeitschriftChemie Titel: A new receptor molecule for lysine and histidine in water - strong binding of basic amino acids by a macrocyclic host. Autor(in): Grawe, Thomas; Schrader, ThomasLSF; Finocchiaro, Paolo; Failla, Salvatore; Consiglio, Giuseppe Erscheinungsjahr 2000 Abstract: An electronic conference proceeding. A tetrakisphosphonate receptor mol. well sol. in polar solvents such as methanol and water, but insol. in DMSO and acetonitrile was prepd. as a macrocyclic host for lysine and histidine. To check the complex stoichiometries with lysine, arginine, ornithine and histidine, Job-Plots were taken for each of the amino acid-complexes. The result showed that the smaller amino acids histidine, ornithine and arginine produced a clear 2:1-stoichiometry, but lysine was bound in a clean 1:1-complex. NMR titrns. was also performed for each of the four complexes in methanol and the resulting binding curves were analyzed by nonlinear regression. Thus, prepd. tetrakisphosphonate receptor mol. is moderately selective for lysine in water.
{ "url": "https://bibliographie.ub.uni-due.de/servlets/DozBibEntryServlet?id=ubo_mods_00010826", "source_domain": "bibliographie.ub.uni-due.de", "snapshot_id": "crawl=CC-MAIN-2017-30", "warc_metadata": { "Content-Length": "16327", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:EDOX7Q37ZAT4LPFAGVTIMULM3SGZDNSB", "WARC-Concurrent-To": "<urn:uuid:7c02e414-9c21-4723-bd92-4227979ed2f3>", "WARC-Date": "2017-07-22T02:46:51Z", "WARC-IP-Address": "132.252.176.246", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:QGCO7ZV3VKKSYQL4KBUNVMOR3FSJ33GV", "WARC-Record-ID": "<urn:uuid:3926cacf-ced5-4cca-ae1e-81a22eb8cff5>", "WARC-Target-URI": "https://bibliographie.ub.uni-due.de/servlets/DozBibEntryServlet?id=ubo_mods_00010826", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:efc2583e-3bfc-44bf-a8c5-69ff9da1ce49>" }, "warc_info": "robots: classic\r\nhostname: ip-10-35-132-58.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 93, 212, 311, 352, 359, 478, 489, 584, 601, 606, 607, 617, 618 ], "line_end_idx": [ 93, 212, 311, 352, 359, 478, 489, 584, 601, 606, 607, 617, 618, 1385 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1385, "ccnet_original_nlines": 13, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.23636363446712494, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.02909090928733349, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.290909081697464, "rps_doc_frac_unique_words": 0.5153061151504517, "rps_doc_mean_word_length": 5.698979377746582, "rps_doc_num_sentences": 17, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.342077732086182, "rps_doc_word_count": 196, "rps_doc_frac_chars_dupe_10grams": 0.17188899219036102, "rps_doc_frac_chars_dupe_5grams": 0.25783348083496094, "rps_doc_frac_chars_dupe_6grams": 0.25783348083496094, "rps_doc_frac_chars_dupe_7grams": 0.17188899219036102, "rps_doc_frac_chars_dupe_8grams": 0.17188899219036102, "rps_doc_frac_chars_dupe_9grams": 0.17188899219036102, "rps_doc_frac_chars_top_2gram": 0.032229188829660416, "rps_doc_frac_chars_top_3gram": 0.032229188829660416, "rps_doc_frac_chars_top_4gram": 0.05640107020735741, "rps_doc_books_importance": -130.82757568359375, "rps_doc_books_importance_length_correction": -130.81871032714844, "rps_doc_openwebtext_importance": -68.22325897216797, "rps_doc_openwebtext_importance_length_correction": -68.22325897216797, "rps_doc_wikipedia_importance": -50.600868225097656, "rps_doc_wikipedia_importance_length_correction": -48.888893127441406 }, "fasttext": { "dclm": 0.05654000863432884, "english": 0.8542819023132324, "fineweb_edu_approx": 2.382901191711426, "eai_general_math": 0.954562246799469, "eai_open_web_math": 0.4255755543708801, "eai_web_code": 0.008589860051870346 } }
{ "free_decimal_correspondence": { "primary": { "code": "547.0", "labels": { "level_1": "Science and Natural history", "level_2": "Chemistry", "level_3": "Chemistry, Organic" } }, "secondary": { "code": "548.0", "labels": { "level_1": "Science and Natural history", "level_2": "Chemistry", "level_3": "Crystallography" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "-1", "label": "Abstain" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
2,713,382,212,950,097,000
%0 Journal Article %A Hodge, D S %A Borczyk, A %A Wat, L L %T Evaluation of the indoxyl acetate hydrolysis test for the differentiation of Campylobacters. %D 1990 %J Journal of Clinical Microbiology %P 1482-1483 %V 28 %N 6 %X Indoxyl acetate hydrolysis is a rapid, inexpensive differential test which can be performed easily to help identify campylobacter. A total of 571 Campylobacter cultures, including atypical variants, representing 10 species was tested. %U https://jcm.asm.org/content/jcm/28/6/1482.full.pdf
{ "url": "https://jcm.asm.org/highwire/citation/56242/endnote-tagged", "source_domain": "jcm.asm.org", "snapshot_id": "crawl=CC-MAIN-2020-29", "warc_metadata": { "Content-Length": "1720", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:TXYZ2WHZWPHL7LNJU3MANU7JOUKPBKQ6", "WARC-Concurrent-To": "<urn:uuid:2413e641-a4c3-423c-9159-1b551c5013ba>", "WARC-Date": "2020-07-06T21:50:32Z", "WARC-IP-Address": "104.18.28.165", "WARC-Identified-Payload-Type": "application/x-endnote-refer", "WARC-Payload-Digest": "sha1:U7F2KJQ4IVJOATQIPIFRTJDEEM7VBPRX", "WARC-Record-ID": "<urn:uuid:bd00b162-d2e3-4d0f-b407-8c398a03f0bf>", "WARC-Target-URI": "https://jcm.asm.org/highwire/citation/56242/endnote-tagged", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:55b7b5d0-3d2e-49ef-86e4-15ba96bf50b3>" }, "warc_info": "isPartOf: CC-MAIN-2020-29\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-193.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0 ], "line_end_idx": [ 514 ] }
{ "red_pajama_v2": { "ccnet_original_length": 514, "ccnet_original_nlines": 0, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.12711864709854126, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.14406779408454895, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3644067943096161, "rps_doc_frac_unique_words": 0.7733333110809326, "rps_doc_mean_word_length": 5.413333415985107, "rps_doc_num_sentences": 8, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 3.933856248855591, "rps_doc_word_count": 75, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.06896551698446274, "rps_doc_frac_chars_top_3gram": 0.11822660267353058, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -53.59593963623047, "rps_doc_books_importance_length_correction": -64.63177490234375, "rps_doc_openwebtext_importance": -25.213489532470703, "rps_doc_openwebtext_importance_length_correction": -36.24932861328125, "rps_doc_wikipedia_importance": -26.306699752807617, "rps_doc_wikipedia_importance_length_correction": -37.3425407409668 }, "fasttext": { "dclm": 0.022410569712519646, "english": 0.8477925658226013, "fineweb_edu_approx": 2.348263740539551, "eai_general_math": 0.03618687018752098, "eai_open_web_math": 0.6440696716308594, "eai_web_code": 0.00216853991150856 } }
{ "free_decimal_correspondence": { "primary": { "code": "579.2", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Biological specimens" } }, "secondary": { "code": "616.9", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "1", "label": "Factual" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "1", "label": "Leftover HTML" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "1", "label": "Truncated Snippets" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "1", "label": "No Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "6", "label": "Not Applicable/Indeterminate" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "5", "label": "Indeterminate" } } }
71f077df794da2774531b20248bb19b0
3,421,954,402,712,151,000
Publications Publications in peer reviewed journals 34 Publications found • Acidobacteria are active and abundant members of diverse atmospheric H2-oxidizing communities detected in temperate soils Giguere AT, Eichorst SA, Meier D, Herbold CW, Richter A, Greening C, Woebken D 2020 - ISME J, in press Abstract:  Significant rates of atmospheric H2 consumption have been observed in temperate soils due to the activity of high-affinity enzymes, such as the group 1h [NiFe]-hydrogenase. We designed broadly inclusive primers targeting the large subunit gene (hhyL) of group 1h [NiFe]-hydrogenases for long-read sequencing to explore its taxonomic distribution across soils. This approach revealed a diverse collection of microorganisms harboring hhyL, including previously unknown groups and taxonomically not assignable sequences. Acidobacterial group 1h [NiFe]-hydrogenases genes were abundant and expressed in temperate soils. To support the participation of acidobacteria in H2 consumption, we studied two representative mesophilic soil acidobacteria, which expressed group 1h [NiFe]-hydrogenases and consumed atmospheric H2 during carbon starvation. This is the first time mesophilic acidobacteria, which are abundant in ubiquitous temperate soils, have been shown to oxidize H2 down to below atmospheric concentrations. As this physiology allows bacteria to survive periods of carbon starvation, it could explain the success of soil acidobacteria. With our long-read sequencing approach of group 1h [NiFe]-hydrogenases genes, we show that the ability to oxidize atmospheric levels of His more widely distributed among soil bacteria than previously recognized and could represent a common mechanism enabling bacteria to persist during periods of carbon deprivation. • Genomic and kinetic analysis of novel Nitrospinae enriched by cell sorting Mueller AJ, Jung MY, Strachan CR, Herbold CW, Kirkegaard RH, Wagner M, Daims H 2020 - ISME J., in press Abstract:  Chemolithoautotrophic nitrite-oxidizing bacteria (NOB) are key players in global nitrogen and carbon cycling. Members of the phylum Nitrospinae are the most abundant, known NOB in the oceans. To date, only two closely affiliated Nitrospinae species have been isolated, which are only distantly related to the environmentally abundant uncultured Nitrospinae clades. Here, we applied live cell sorting, activity screening, and subcultivation on marine nitrite-oxidizing enrichments to obtain novel marine Nitrospinae. Two binary cultures were obtained, each containing one Nitrospinae strain and one alphaproteobacterial heterotroph. The Nitrospinae strains represent two new genera, and one strain is more closely related to environmentally abundant Nitrospinae than previously cultured NOB. With an apparent half-saturation constant of 8.7±2.5 µM, this strain has the highest affinity for nitrite among characterized marine NOB, while the other strain (16.2±1.6 µM) and Nitrospina gracilis (20.1±2.1 µM) displayed slightly lower nitrite affinities. The new strains and N. gracilis share core metabolic pathways for nitrite oxidation and CO2 fixation but differ remarkably in their genomic repertoires of terminal oxidases, use of organic N sources, alternative energy metabolisms, osmotic stress and phage defense. The new strains, tentatively named “Candidatus Nitrohelix vancouverensis” and “Candidatus Nitronauta litoralis”, shed light on the niche differentiation and potential ecological roles of Nitrospinae. • Environmental and intestinal phylum Firmicutes bacteria metabolize the plant sugar sulfoquinovose via a 6-deoxy-6-sulfofructose transaldolase pathway Frommeyer B, Fiedler AW, Oehler SR, Hanson BT, Loy A, Franchini P, Spiteller D, Schleheck D 2020 - iScience, In press Abstract:  Bacterial degradation of the sugar sulfoquinovose (SQ, 6-deoxy-6-sulfoglucose) produced by plants, algae and cyanobacteria, is an important component of the biogeochemical carbon and sulfur cycles. Here, we reveal a third biochemical pathway for primary SQ degradation in an aerobic Bacillus aryabhattaistrain. An isomerase converts SQ to 6-deoxy-6-sulfofructose (SF). A novel transaldolase enzyme cleaves the SF to 3-sulfolactaldehyde (SLA), while the non-sulfonated C3-(glycerone)-moiety is transferred to an acceptor molecule, glyceraldehyde phosphate (GAP), yielding fructose-6-phosphate (F6P). Intestinal anaerobic bacteria such as Enterococcus gilvus, Clostridium symbiosum and Eubacterium rectale strains also express transaldolase-pathway gene clusters during fermentative growth with SQ. The now three known biochemical strategies for SQ catabolism reflect adaptations to the aerobic or anaerobic life-style of the different bacteria. The occurrence of these pathways in intestinal (family) Enterobacteriaceae and (phylum) Firmicutes strains further highlights a potential importance of metabolism of green-diet SQ by gut microbial communities to, ultimately, hydrogen sulfide. • Anaerobic bacterial degradation of protein and lipid macromolecules in subarctic marine sediment Pelikan C, Wasmund K, Glombitza C, Hausmann H, Herbold CW, Flieder M, Loy A 2020 - ISME J, In press Abstract:  Microorganisms in marine sediments play major roles in marine biogeochemical cycles by mineralizing substantial quantities of organic matter from decaying cells. Proteins and lipids are abundant components of necromass, yet the taxonomic identities of microorganisms that actively degrade them remain poorly resolved. Here, we revealed identities, trophic interactions and genomic features of bacteria that degraded 13C-labelled proteins and lipids in cold anoxic microcosms containing sulfidic subarctic marine sediment. Supplemented proteins and lipids were rapidly fermented to various volatile fatty acids within five days. DNA-stable isotope probing (SIP) suggested Psychrilyobacter atlanticus was an important primary degrader of proteins, and Psychromonas members were important primary degraders of both proteins and lipids. Closely related Psychromonas populations, as represented by distinct 16S rRNA gene variants, differentially utilized either proteins or lipids. DNA-SIP also showed 13C-labeling of various Deltaproteobacteria within ten days, indicating trophic transfer of carbon to putative sulfate-reducers. Metagenome-assembled genomes revealed the primary hydrolyzers encoded secreted peptidases or lipases, and enzymes for catabolism of protein or lipid degradation products. Psychromonas species are prevalent in diverse marine sediments, suggesting they are important players in organic carbon processing in situ. Together, this study provides new insights into the identities, functions and genomes of bacteria that actively degrade abundant necromass macromolecules in the seafloor. • Proposal to reclassify the proteobacterial classes Deltaproteobacteria and Oligoflexia, and the phylum Thermodesulfobacteria into four phyla reflecting major functional capabilities Waite DW, Chuvochina M, Pelikan C, Parks DH, Yilmaz P, Wagner M, Loy A, Naganuma T, Nakai R, Whitman WB, Hahn MW, Kuever J, Hugenholtz P 2020 - Int J Syst Evol Microbiol, in press Abstract:  The class Deltaproteobacteria comprises an ecologically and metabolically diverse group of bacteria best known for dissimilatory sulphate reduction and predatory behaviour. Although this lineage is the fourth described class of the phylum Proteobacteria, it rarely affiliates with other proteobacterial classes and is frequently not recovered as a monophyletic unit in phylogenetic analyses. Indeed, one branch of the class Deltaproteobacteria encompassing Bdellovibrio-like predators was recently reclas- sified into a separate proteobacterial class, the Oligoflexia. Here we systematically explore the phylogeny of taxa currently assigned to these classes using 120 conserved single-copy marker genes as well as rRNA genes. The overwhelming majority of markers reject the inclusion of the classes Deltaproteobacteria and Oligoflexia in the phylum Proteobacteria. Instead, the great majority of currently recognized members of the class Deltaproteobacteria are better classified into four novel phylum-level lineages. We propose the names Desulfobacterota phyl. nov. and Myxococcota phyl. nov. for two of these phyla, based on the oldest validly published names in each lineage, and retain the placeholder name SAR324 for the third phylum pending formal description of type material. Members of the class Oligoflexia represent a separate phylum for which we propose the name Bdellovibrionota phyl. nov. based on priority in the literature and general recognition of the genus Bdellovibrio. Desulfobacterota phyl. nov. includes the taxa previously classified in the phylum Thermodesulfobacteria, and these reclassifications imply that the ability of sulphate reduction was vertically inherited in the phylum Thermodesulfobacteria rather than laterally acquired as previously inferred. Our analysis also indicates the independent acquisition of predatory behaviour in the phyla Myxococcota and Bdellovibrionota, which is consistent with their distinct modes of action. This work represents a stable reclassification of one of the most taxonomically challenging areas of the bacterial tree and provides a robust framework for future ecological and systematic studies. • Rational design of a microbial consortium of mucosal sugar utilizers reduces Clostridiodes difficile colonization. Pereira FC, Wasmund K, Cobankovic I, Jehmlich N, Herbold CW, Lee KS, Sziranyi B, Vesely C, Decker T, Stocker R, Warth B, von Bergen M, Wagner M, Berry D 2020 - Nat Commun, 1: 5104 Abstract:  Many intestinal pathogens, including Clostridioides difficile, use mucus-derived sugars as crucial nutrients in the gut. Commensals that compete with pathogens for such nutrients are therefore ecological gatekeepers in healthy guts, and are attractive candidates for therapeutic interventions. Nevertheless, there is a poor understanding of which commensals use mucin-derived sugars in situ as well as their potential to impede pathogen colonization. Here, we identify mouse gut commensals that utilize mucus-derived monosaccharides within complex communities using single-cell stable isotope probing, Raman-activated cell sorting and mini-metagenomics. Sequencing of cell-sorted fractions reveals members of the underexplored family Muribaculaceae as major mucin monosaccharide foragers, followed by members of Lachnospiraceae, Rikenellaceae, and Bacteroidaceae families. Using this information, we assembled a five-member consortium of sialic acid and N-acetylglucosamine utilizers that impedes C. difficile's access to these mucosal sugars and impairs pathogen colonization in antibiotic-treated mice. Our findings underscore the value of targeted approaches to identify organisms utilizing key nutrients and to rationally design effective probiotic mixtures. • A refined set of rRNA-targeted oligonucleotide probes for in situ detection and quantification of ammonia-oxidizing bacteria Lukumbuzya M, Kristensen JM, Kitzinger K, Pommerening-Roser A, Nielsen PH, Wagner M, Daims H, Pjevac P 2020 - Water Res., 186: 116372 ammonia oxidizing bacteria FISH picture Abstract:  Ammonia-oxidizing bacteria (AOB) of the betaproteobacterial genera Nitrosomonas and Nitrosospira are key nitrifying microorganisms in many natural and engineered ecosystems. Since many AOB remain uncultured, fluorescence in situ hybridization (FISH) with rRNA-targeted oligonucleotide probes has been one of the most widely used approaches to study the community composition, abundance, and other features of AOB directly in environmental samples. However, the established and widely used AOB-specific 16S rRNA-targeted FISH probes were designed up to two decades ago, based on much smaller rRNA gene sequence datasets than available today. Several of these probes cover their target AOB lineages incompletely and suffer from a weak target specificity, which causes cross-hybridization of probes that should detect different AOB lineages. Here, a set of new highly specific 16S rRNA-targeted oligonucleotide probes was developed and experimentally evaluated that complements the existing probes and enables the specific detection and differentiation of the known, major phylogenetic clusters of betaproteobacterial AOB. The new probes were successfully applied to visualize and quantify AOB in activated sludge and biofilm samples from seven pilot- and full-scale wastewater treatment systems. Based on its improved target group coverage and specificity, the refined probe set will facilitate future in situ analyses of AOB. • Flow-through stable isotope probing (Flow-SIP) minimizes cross-feeding in complex microbial communities. Mooshammer M, Kitzinger K, Schintlmeister A, Ahmerkamp S, Nielsen JL, Nielsen PH, Wagner M 2020 - ISME J, in press Abstract:  Stable isotope probing (SIP) is a key tool for identifying the microorganisms catalyzing the turnover of specific substrates in the environment and to quantify their relative contributions to biogeochemical processes. However, SIP-based studies are subject to the uncertainties posed by cross-feeding, where microorganisms release isotopically labeled products, which are then used by other microorganisms, instead of incorporating the added tracer directly. Here, we introduce a SIP approach that has the potential to strongly reduce cross-feeding in complex microbial communities. In this approach, the microbial cells are exposed on a membrane filter to a continuous flow of medium containing isotopically labeled substrate. Thereby, metabolites and degradation products are constantly removed, preventing consumption of these secondary substrates. A nanoSIMS-based proof-of-concept experiment using nitrifiers in activated sludge and C-bicarbonate as an activity tracer showed that Flow-SIP significantly reduces cross-feeding and thus allows distinguishing primary consumers from other members of microbial food webs. • Woeseiales transcriptional response to shallow burial in Arctic fjord surface sediment Buongiorno J, Sipes K, Wasmund K, Loy A, Lloyd K 2020 - PLoS One, 15: e0234839 Abstract:  Distinct lineages of Gammaproteobacteria clade Woeseiales are globally distributed in marine sediments, based on metagenomic and 16S rRNA gene analysis. Yet little is known about why they are dominant or their ecological role in Arctic fjord sediments, where glacial retreat is rapidly imposing change. This study combined 16S rRNA gene analysis, metagenome-assembled genomes (MAGs), and genome-resolved metatranscriptomics uncovered the in situ abundance and transcriptional activity of Woeseiales with burial in four shallow sediment sites of Kongsfjorden and Van Keulenfjorden of Svalbard (79°N). We present five novel Woeseiales MAGs and show transcriptional evidence for metabolic plasticity during burial, including sulfur oxidation with reverse dissimilatory sulfite reductase (dsrAB) down to 4 cm depth and nitrite reduction down to 6 cm depth. A single stress protein, spore protein SP21 (hspA), had a tenfold higher mRNA abundance than any other transcript, and was a hundredfold higher on average than other transcripts. At three out of the four sites, SP21 transcript abundance increased with depth, while total mRNA abundance and richness decreased, indicating a shift in investment from metabolism and other cellular processes to build-up of spore protein SP21. The SP21 gene in MAGs was often flanked by genes involved in membrane-associated stress response. The ability of Woeseiales to shift from sulfur oxidation to nitrite reduction with burial into marine sediments with decreasing access to overlying oxic bottom waters, as well as enter into a dormant state dominated by SP21, may account for its ubiquity and high abundance in marine sediments worldwide, including those of the rapidly shifting Arctic. • It Takes a Village: Discovering and Isolating the Nitrifiers. 2020 - Front Microbiol, 1900 Abstract:  It has been almost 150 years since Jean-Jacques Schloesing and Achille Müntz discovered that the process of nitrification, the oxidation of ammonium to nitrate, is a biological process carried out by microorganisms. In the following 15 years, numerous researchers independently contributed paradigm shifting discoveries that formed the foundation of nitrification and nitrification-related research. One of them was Sergei Winogradsky, whose major accomplishments include the discovery of both lithotrophy (in sulfur-oxidizing bacteria) and chemoautotrophy (in nitrifying bacteria). However, Winogradsky often receives most of the credit for many other foundational nitrification discoveries made by his contemporaries. This accumulation of credit over time is at least in part due to the increased attention, Winogradsky receives in the scientific literature and textbooks as a "founder of microbiology" and "the founder of microbial ecology." Here, some light is shed on several other researchers who are often overlooked, but whose work was instrumental to the emerging field of nitrification and to the work of Winogradsky himself. Specifically, the discovery of the biological process of nitrification by Schloesing and Müntz, the isolation of the first nitrifier by Grace and Percy Frankland, and the observation that nitrification is carried out by two distinct groups of microorganisms by Robert Warington are highlighted. Finally, the more recent discoveries of the chemolithoautotrophic ammonia-oxidizing archaea and complete ammonia oxidizers are put into this historical context. • Dietary Supplementation with Sugar Beet Fructooligosaccharides and Garlic Residues Promotes Growth of Beneficial Bacteria and Increases Weight Gain in Neonatal Lambs. Quijada NM, Bodas R, Lorenzo JM, Schmitz-Esser S, Rodríguez-Lázaro D, Hernández M 2020 - Biomolecules, 8: in press Abstract:  The proper development of the early gastrointestinal tract (GIT) microbiota is critical for newborn ruminants. This microbiota is susceptible to modification by diverse external factors (such as diet) that can lead to long-lasting results when occurring in young ruminants. Dietary supplementation with prebiotics, ingredients nondigestible and nonabsorbable by the host that stimulate the growth of beneficial GIT bacteria, has been applied worldwide as a potential approach in order to improve ruminant health and production yields. However, how prebiotics affect the GIT microbiota during ruminants' early life is still poorly understood. We investigated the effect of milk supplementation with a combination of two well-known prebiotics, fructooligosaccharides (FOS) from sugar beet and garlic residues (all together named as "additive"), exerted on preweaned lamb growth and the composition of their fecal microbiota, by using 16S rRNA gene amplicon high-throughput sequencing. The results showed a significant increase in the mean daily weight gain of lambs fed with the additive. Lamb fecal microbiota was also influenced by the additive intake, as additive-diet lambs showed lower bacterial diversity and were significantly more abundant in , , and . These bacteria have been previously reported to confer beneficial properties to the ruminant, including promotion of growth and health status, and our results showed that they were strongly linked to the additive intake and the increased weight gain of lambs. This study points out the combination of FOS from sugar beet and garlic residues as a potential prebiotic to be used in young ruminants' nutrition in order to improve production yields. • Molecular causes of an evolutionary shift along the parasitism-mutualism continuum in a bacterial symbiont. Herrera P, Schuster L, Wentrup C, König L, Kempinger T, Na H, Schwarz J, Köstlbacher S, Wascher F, Zojer M, Rattei T, Horn M 2020 - Proc. Natl. Acad. Sci. U.S.A., in press Abstract:  Symbiosis with microbes is a ubiquitous phenomenon with a massive impact on all living organisms, shaping the world around us today. Theoretical and experimental studies show that vertical transmission of symbionts leads to the evolution of mutualistic traits, whereas horizontal transmission facilitates the emergence of parasitic features. However, these studies focused on phenotypic data, and we know little about underlying molecular changes at the genomic level. Here, we combined an experimental evolution approach with infection assays, genome resequencing, and global gene expression analysis to study the effect of transmission mode on an obligate intracellular bacterial symbiont. We show that a dramatic shift in the frequency of genetic variants, coupled with major changes in gene expression, allow the symbiont to alter its position in the parasitism-mutualism continuum depending on the mode of between-host transmission. We found that increased parasitism in horizontally transmitted chlamydiae residing in amoebae was a result of processes occurring at the infectious stage of the symbiont's developmental cycle. Specifically, genes involved in energy production required for extracellular survival and the type III secretion system-the symbiont's primary virulence mechanism-were significantly up-regulated. Our results identify the genomic and transcriptional dynamics sufficient to favor parasitic or mutualistic strategies. • Composition and activity of nitrifier communities in soil are unresponsive to elevated temperature and CO, but strongly affected by drought. Séneca J, Pjevac P, Canarini A, Herbold CW, Zioutis C, Dietrich M, Simon E, Prommer J, Bahn M, Pötsch EM, Wagner M, Wanek W, Richter A 2020 - ISME J, in press soil nitrifier response to climate change Abstract:  Nitrification is a fundamental process in terrestrial nitrogen cycling. However, detailed information on how climate change affects the structure of nitrifier communities is lacking, specifically from experiments in which multiple climate change factors are manipulated simultaneously. Consequently, our ability to predict how soil nitrogen (N) cycling will change in a future climate is limited. We conducted a field experiment in a managed grassland and simultaneously tested the effects of elevated atmospheric CO, temperature, and drought on the abundance of active ammonia-oxidizing bacteria (AOB) and archaea (AOA), comammox (CMX) Nitrospira, and nitrite-oxidizing bacteria (NOB), and on gross mineralization and nitrification rates. We found that N transformation processes, as well as gene and transcript abundances, and nitrifier community composition were remarkably resistant to individual and interactive effects of elevated CO and temperature. During drought however, process rates were increased or at least maintained. At the same time, the abundance of active AOB increased probably due to higher NH availability. Both, AOA and comammox Nitrospira decreased in response to drought and the active community composition of AOA and NOB was also significantly affected. In summary, our findings suggest that warming and elevated CO have only minor effects on nitrifier communities and soil biogeochemical variables in managed grasslands, whereas drought favors AOB and increases nitrification rates. This highlights the overriding importance of drought as a global change driver impacting on soil microbial community structure and its consequences for N cycling. • Exploring the upper pH limits of nitrite oxidation: diversity, ecophysiology, and adaptive traits of haloalkalitolerant Nitrospira Daebeler A, Kitzinger K, Koch H, Herbold CW, Steinberger M, Schwarz J, Zechmeister T, Karst S, Albertsen M, Nielsen PH, Wagner M, Daims H 2020 - ISME J, in press Ca. N. alkalitolerans Abstract:  Nitrite-oxidizing bacteria of the genus Nitrospira are key players of the biogeochemical nitrogen cycle. However, little is known about their occurrence and survival strategies in extreme pH environments. Here, we report on the discovery of physiologically versatile, haloalkalitolerant Nitrospira that drive nitrite oxidation at exceptionally high pH. Nitrospiradistribution, diversity, and ecophysiology were studied in hypo- and subsaline (1.3-12.8 g salt/l), highly alkaline (pH 8.9-10.3) lakes by amplicon sequencing, metagenomics, and cultivation-based approaches. Surprisingly, not only were Nitrospira populations detected, but they were also considerably diverse with presence of members of Nitrospira lineages I, II and IV. Furthermore, the ability of Nitrospira enrichment cultures to oxidize nitrite at neutral to highly alkaline pH of 10.5 was demonstrated. Metagenomic analysis of a newly enriched Nitrospira lineage IV species, “Candidatus Nitrospira alkalitolerans”, revealed numerous adaptive features of this organism to its extreme environment. Among them were a sodium-dependent N-type ATPase and NADH:quinone oxidoreductase next to the proton-driven forms usually found in Nitrospira. Other functions aid in pH and cation homeostasis and osmotic stress defense. “Ca. Nitrospira alkalitolerans” also possesses group 2a and 3b [NiFe] hydrogenases, suggesting it can use hydrogen as alternative energy source. These results reveal how Nitrospira cope with strongly fluctuating pH and salinity conditions and expand our knowledge of nitrogen cycling in extreme habitats. • Gut microbiota and undigested food constituents modify toxin composition and suppress the genotoxicity of a naturally occurring mixture of Alternaria toxins in vitro. Crudo F, Aichinger G, Mihajlovic J, Dellafiora L, Varga E, Puntscher H, Warth B, Dall'Asta C, Berry D, Marko D 2020 - Arch. Toxicol., in press Abstract:  Molds of the genus Alternaria produce several mycotoxins, some of which may pose a threat for health due to their genotoxicity. Due to the lack of adequate toxicological and occurrence data, they are currently not regulated. Interactions between mycotoxins, gut microbiota and food constituents might occur after food ingestion, modifying the bioavailability and, therefore, overall toxicity of mycotoxins. The present work aimed to investigate the impact of in vitro short-term fecal incubation on the in vitro DNA-damaging effects exerted by 5 µg/mL of an Alternaria alternata extract, containing, among others, 15 nM alternariol, 12 nM alternariol monomethyl ether, 241 nM altertoxin II and 301 nM stemphyltoxin III, all of which are known as genotoxic. The involvement of microorganisms, undigested food constituents and soluble substances of human fecal samples in modifying the composition and the genotoxicity of the extract was investigated through the application of LC-MS/MS analysis and comet assays in HT-29 cells. Results showed that the potential of the mycotoxins to induce DNA strand breaks was almost completely quenched, even before anaerobic incubation, by contact with the different fractions of the fecal samples, while the potency to induce formamidopyrimidine DNA glycosylase (FPG)-sensitive sites was only slightly reduced. These effects were in line with a reduction of mycotoxin concentrations found in samples analyzed by LC-MS/MS. Although a direct correlation between the metabolic activity of the gut microbiota and modifications in mycotoxin contents was not clearly observed, adsorptive phenomena to bacterial cells and to undigested food constituents might explain the observed modifications. • Microbiome definition re-visited: old concepts and new challenges. Berg G, Rybakova D, Fischer D, Cernava T, Vergès MC, Charles T, Chen X, Cocolin L, Eversole K, Corral GH, Kazou M, Kinkel L, Lange L, Lima N, Loy A, Macklin JA, Maguin E, Mauchline T, McClure R, Mitter B, Ryan M, Sarand I, Smidt H, Schelkle B, Roume H, Kiran GS, Selvin J, Souza RSC, van Overbeek L, Singh BK, Wagner M, Walsh A, Sessitsch A, Schloter M 2020 - Microbiome, 1: 103 Abstract:  The field of microbiome research has evolved rapidly over the past few decades and has become a topic of great scientific and public interest. As a result of this rapid growth in interest covering different fields, we are lacking a clear commonly agreed definition of the term "microbiome." Moreover, a consensus on best practices in microbiome research is missing. Recently, a panel of international experts discussed the current gaps in the frame of the European-funded MicrobiomeSupport project. The meeting brought together about 40 leaders from diverse microbiome areas, while more than a hundred experts from all over the world took part in an online survey accompanying the workshop. This article excerpts the outcomes of the workshop and the corresponding online survey embedded in a short historical introduction and future outlook. We propose a definition of microbiome based on the compact, clear, and comprehensive description of the term provided by Whipps et al. in 1988, amended with a set of novel recommendations considering the latest technological developments and research findings. We clearly separate the terms microbiome and microbiota and provide a comprehensive discussion considering the composition of microbiota, the heterogeneity and dynamics of microbiomes in time and space, the stability and resilience of microbial networks, the definition of core microbiomes, and functionally relevant keystone species as well as co-evolutionary principles of microbe-host and inter-species interactions within the microbiome. These broad definitions together with the suggested unifying concepts will help to improve standardization of microbiome studies in the future, and could be the starting point for an integrated assessment of data resulting in a more rapid transfer of knowledge from basic science into practice. Furthermore, microbiome standards are important for solving new challenges associated with anthropogenic-driven changes in the field of planetary health, for which the understanding of microbiomes might play a key role. Video Abstract. • Chlamydiae in the Environment. Collingro A, Köstlbacher S, Horn M 2020 - Trends Microbiol., in press Abstract:  Chlamydiae have been known for more than a century as major pathogens of humans. Yet they are also found ubiquitously in the environment where they thrive within protists and in an unmatched wide range of animals. This review summarizes recent advances in understanding chlamydial diversity and distribution in nature. Studying these environmental chlamydiae provides a novel perspective on basic chlamydial biology and evolution. A picture is beginning to emerge with chlamydiae representing one of the evolutionarily most ancient and successful groups of obligate intracellular bacteria. • Roadmap for naming uncultivated Archaea and Bacteria. Murray AE, Freudenstein J, Gribaldo S, Hatzenpichler R, Hugenholtz P, Kämpfer P, Konstantinidis KT, Lane CE, Papke RT, Parks DH, Rosselló-Móra R, Stott MB, Sutcliffe IC, Thrash JC, Venter SN, Whitman WB, Acinas SG, Amann RI, Anantharaman K, Armengaud J, Baker BJ, Barco RA, Bode HB, Boyd ES, Brady CL, Carini P, Chain PSG, Colman DR, DeAngelis KM, de Los Rios MA, Estrada-de los Santos P, Dunlap CA, Eisen JA, Emerson D, Ettema TJG, Eveillard D, Girguis PR, Hentschel U, Hollibaugh JT, Hug LA, Inskeep WP, Ivanova EP, Klenk HP, Li WJ, Lloyd KG, Löffler FE, Makhalanyane TP, Moser DP, Nunoura T, Palmer M, Parro V, Pedrós-Alió C, Probst AJ, Smits THM, Steen AD, Steenkamp ET, Spang A, Stewart FJ, Tiedje JM, Vandamme P, Wagner M, Wang FP, Hedlund BP, Reysenbach AL 2020 - Nat Microbiol, 8: 987-994 Roadmap for naming uncultured microbes Abstract:  The assembly of single-amplified genomes (SAGs) and metagenome-assembled genomes (MAGs) has led to a surge in genome-based discoveries of members affiliated with Archaea and Bacteria, bringing with it a need to develop guidelines for nomenclature of uncultivated microorganisms. The International Code of Nomenclature of Prokaryotes (ICNP) only recognizes cultures as 'type material', thereby preventing the naming of uncultivated organisms. In this Consensus Statement, we propose two potential paths to solve this nomenclatural conundrum. One option is the adoption of previously proposed modifications to the ICNP to recognize DNA sequences as acceptable type material; the other option creates a nomenclatural code for uncultivated Archaea and Bacteria that could eventually be merged with the ICNP in the future. Regardless of the path taken, we believe that action is needed now within the scientific community to develop consistent rules for nomenclature of uncultivated taxa in order to provide clarity and stability, and to effectively communicate microbial diversity. • The role of metal contamination in shaping microbial communities in heavily polluted marine sediments Di Cesare A, Pjevac P, Eckert E, Curkov N, Miko Šparica M, Corno G, Orlić S 2020 - Environ. Pollut., 265: 114823 Abstract:  Microorganisms in coastal sediments are fundamental for ecosystem functioning, and regulate processes relevant in global biogeochemical cycles. Still, our understanding of the effects anthropogenic perturbation and pollution can have on microbial communities in marine sediments is limited. We surveyed the microbial diversity, and the occurrence and abundance of metal and antibiotic resistance genes is sediments collected from the Pula Bay (Croatia), one of the most significantly polluted sites along the Croatian coast. With a collection of 14 samples from the bay area, we were able to generate a detailed status quo picture of a site that only recently started a cleaning and remediation process (closing of sewage pipes and reduction of industrial activity). The concentrations of heavy metals in Pula Bay sediments are significantly higher than in pristine sediments from the Adriatic Sea, and in some cases, manifold exceed international sediment quality guidelines. While the sedimentary concentrations of heavy metals did significantly influence the abundance of the tested metal resistance genes, no strong effect of heavy metal pollution on the overall microbial community composition was observed. Like in many other marine sediments, Gammaproteobacteria, Bacteroidota and Desulfobacterota dominated the microbial community composition in most samples, and community assembly was primarily driven by water column depth and nutrient (carbon and nitrogen) availability, regardless of the degree of heavy metal pollution. • Verrucomicrobia use hundreds of enzymes to digest the algal polysaccharide fucoidan. Sichert A, Corzett CH, Schechter MS, Unfried F, Markert S, Becher D, Fernandez-Guerra A, Liebeke M, Schweder T, Polz MF, Hehemann JH 2020 - Nat Microbiol, 8: 1026-1039 Abstract:  Brown algae are important players in the global carbon cycle by fixing carbon dioxide into 1 Gt of biomass annually, yet the fate of fucoidan-their major cell wall polysaccharide-remains poorly understood. Microbial degradation of fucoidans is slower than that of other polysaccharides, suggesting that fucoidans are more recalcitrant and may sequester carbon in the ocean. This may be due to the complex, branched and highly sulfated structure of fucoidans, which also varies among species of brown algae. Here, we show that 'Lentimonas' sp. CC4, belonging to the Verrucomicrobia, acquired a remarkably complex machinery for the degradation of six different fucoidans. The strain accumulated 284 putative fucoidanases, including glycoside hydrolases, sulfatases and carbohydrate esterases, which are primarily located on a 0.89-megabase pair plasmid. Proteomics reveals that these enzymes assemble into substrate-specific pathways requiring about 100 enzymes per fucoidan from different species of brown algae. These enzymes depolymerize fucoidan into fucose, which is metabolized in a proteome-costly bacterial microcompartment that spatially constrains the metabolism of the toxic intermediate lactaldehyde. Marine metagenomes and microbial genomes show that Verrucomicrobia including 'Lentimonas' are abundant and highly specialized degraders of fucoidans and other complex polysaccharides. Overall, the complexity of the pathways underscores why fucoidans are probably recalcitrant and more slowly degraded, since only highly specialized organisms can effectively degrade them in the ocean. • Crypt residing bacteria and proximal colonic carcinogenesis in a mouse model of Lynch syndrome. Lang M, Baumgartner M, Rożalska A, Frick A, Riva A, Jarek M, Berry D, Gasche C 2020 - Int. J. Cancer, 8: 2316-2326 Abstract:  Colorectal cancer is a multifactorial disease involving inherited DNA mutations, environmental factors, gut inflammation and intestinal microbiota. Certain germline mutations within the DNA mismatch repair system are associated with Lynch syndrome tumors including right-sided colorectal cancer with mucinous phenotype and presence of an inflammatory infiltrate. Such tumors are more often associated with bacterial biofilms, which may contribute to disease onset and progression. Inflammatory bowel diseases are also associated with colorectal cancer and intestinal dysbiosis. Herein we addressed the question, whether inflammation can aggravate colorectal cancer development under mismatch repair deficiency. MSH2 mice were crossed into the IL-10 background to study the importance of inflammation and mucosal bacteria as a driver of tumorigenesis in a Lynch syndrome mouse model. An increase in large bowel tumorigenesis was found in double knockout mice both under conventional housing and under specific pathogen-free conditions. This increase was mostly due to the development of proximal tumors, a hotspot for tumorigenesis in Lynch syndrome, and was associated with a higher degree of inflammation. Additionally, bacterial invasion into the mucus of tumor crypts was observed in the proximal tumors. Inflammation shifted fecal and mucosal microbiota composition and was associated with enrichment in Escherichia-Shigella as well as Akkermansia, Bacteroides and Parabacteroides genera in fecal samples. Tumor-bearing double knockout mice showed a similar enrichment for Escherichia-Shigella and Parabacteroides. Lactobacilli, Lachnospiraceae and Muribaculaceae family members were depleted upon inflammation. In summary, chronic inflammation aggravates colonic tumorigenesis under mismatch repair deficiency and is associated with a shift in microbiota composition. • Energetic Basis of Microbial Growth and Persistence in Desert Ecosystems. Leung PM, Bay SK, Meier DV, Chiri E, Cowan DA, Gillor O, Woebken D, Greening C 2020 - mSystems, 2: in press Abstract:  Microbial life is surprisingly abundant and diverse in global desert ecosystems. In these environments, microorganisms endure a multitude of physicochemical stresses, including low water potential, carbon and nitrogen starvation, and extreme temperatures. In this review, we summarize our current understanding of the energetic mechanisms and trophic dynamics that underpin microbial function in desert ecosystems. Accumulating evidence suggests that dormancy is a common strategy that facilitates microbial survival in response to water and carbon limitation. Whereas photoautotrophs are restricted to specific niches in extreme deserts, metabolically versatile heterotrophs persist even in the hyper-arid topsoils of the Atacama Desert and Antarctica. At least three distinct strategies appear to allow such microorganisms to conserve energy in these oligotrophic environments: degradation of organic energy reserves, rhodopsin- and bacteriochlorophyll-dependent light harvesting, and oxidation of the atmospheric trace gases hydrogen and carbon monoxide. In turn, these principles are relevant for understanding the composition, functionality, and resilience of desert ecosystems, as well as predicting responses to the growing problem of desertification. • Activity and metabolic versatility of complete ammonia oxidizers in full-scale wastewater treatment systems. Yang Y, Daims H, Liu Y, Herbold CW, Pjevac P, Lin JG, Li M, Gu JD 2020 - mBio, 11: e03175-19 Abstract:  The recent discovery of complete ammonia oxidizers (comammox) contradicts the paradigm that chemolithoautotrophic nitrification is always catalyzed by two different microorganisms. However, our knowledge of the survival strategies of comammox in complex ecosystems, such as full-scale wastewater treatment plants (WWTPs), remains limited. Analyses of genomes and transcriptomes of four comammox organisms from two full-scale WWTPs revealed that comammox were active and showed a surprisingly high metabolic versatility. A gene cluster for the utilization of urea and a gene encoding cyanase suggest that comammox may use diverse organic nitrogen compounds in addition to free ammonia as the substrates. The comammox organisms also encoded the genomic potential for multiple alternative energy metabolisms, including respiration with hydrogen, formate, and sulfite as electron donors. Pathways for the biosynthesis and degradation of polyphosphate, glycogen, and polyhydroxyalkanoates as intracellular storage compounds likely help comammox survive unfavorable conditions and facilitate switches between lifestyles in fluctuating environments. One of the comammox strains acquired from the anaerobic tank encoded and transcribed genes involved in homoacetate fermentation or in the utilization of exogenous acetate, both pathways being unexpected in a nitrifying bacterium. Surprisingly, this strain also encoded a respiratory nitrate reductase which has not yet been found in any other genome and might confer a selective advantage to this strain over other strains in anoxic conditions. The discovery of comammox in the genus changes our perception of nitrification. However, genomes of comammox organisms have not been acquired from full-scale WWTPs, and very little is known about their survival strategies and potential metabolisms in complex wastewater treatment systems. Here, four comammox metagenome-assembled genomes and metatranscriptomic data sets were retrieved from two full-scale WWTPs. Their impressive and-among nitrifiers-unsurpassed ecophysiological versatility could make comammox an interesting target for optimizing nitrification in current and future bioreactor configurations. • Raman-based sorting of microbial cells to link functions to their genes. Lee KS, Wagner M, Stocker R 2020 - Microb Cell, 3: 62-65 Abstract:  In our recent work, we developed an optofluidic platform that allows a direct link to be made between the phenotypes (functions) and the genotypes (genes) of microbial cells within natural communities. By combining stable isotope probing, optical tweezers, Raman microspectroscopy, and microfluidics, the platform performs automated Raman-based sorting of taxa from within a complex community in terms of their functional properties. In comparison with manual sorting approaches, our method provides high throughput (up to 500 cells per hour) and very high sorting accuracy (98.3 ± 1.7%), and significantly reduces the human labour required. The system provides an efficient manner to untangle the contributions of individual members within environmental and host-associated microbiomes. In this News and Thoughts, we provide an overview of our platform, describe potential applications, suggest ways in which the system could be improved, and discuss future directions in which Raman-based analysis of microbial populations might be developed. • Complementary Metagenomic Approaches Improve Reconstruction of Microbial Diversity in a Forest Soil. Alteio LV, Schulz F, Seshadri R, Varghese N, Rodriguez-Reillo W, Ryan E, Goudeau D, Eichorst SA, Malmstrom RR, Bowers RM, Katz LA, Blanchard JL, Woyke T 2020 - mSystems, 2: in press Abstract:  Soil ecosystems harbor diverse microorganisms and yet remain only partially characterized as neither single-cell sequencing nor whole-community sequencing offers a complete picture of these complex communities. Thus, the genetic and metabolic potential of this "uncultivated majority" remains underexplored. To address these challenges, we applied a pooled-cell-sorting-based mini-metagenomics approach and compared the results to bulk metagenomics. Informatic binning of these data produced 200 mini-metagenome assembled genomes (sorted-MAGs) and 29 bulk metagenome assembled genomes (MAGs). The sorted and bulk MAGs increased the known phylogenetic diversity of soil taxa by 7.2% with respect to the Joint Genome Institute IMG/M database and showed clade-specific sequence recruitment patterns across diverse terrestrial soil metagenomes. Additionally, sorted-MAGs expanded the rare biosphere not captured through MAGs from bulk sequences, exemplified through phylogenetic and functional analyses of members of the phylum Analysis of 67 sorted-MAGs showed conserved patterns of carbon metabolism across four clades. These results indicate that mini-metagenomics enables genome-resolved investigation of predicted metabolism and demonstrates the utility of combining metagenomics methods to tap into the diversity of heterogeneous microbial assemblages. Microbial ecologists have historically used cultivation-based approaches as well as amplicon sequencing and shotgun metagenomics to characterize microbial diversity in soil. However, challenges persist in the study of microbial diversity, including the recalcitrance of the majority of microorganisms to laboratory cultivation and limited sequence assembly from highly complex samples. The uncultivated majority thus remains a reservoir of untapped genetic diversity. To address some of the challenges associated with bulk metagenomics as well as low throughput of single-cell genomics, we applied flow cytometry-enabled mini-metagenomics to capture expanded microbial diversity from forest soil and compare it to soil bulk metagenomics. Our resulting data from this pooled-cell sorting approach combined with bulk metagenomics revealed increased phylogenetic diversity through novel soil taxa and rare biosphere members. In-depth analysis of genomes within the highly represented phylum provided insights into conserved and clade-specific patterns of carbon metabolism. • Using Colonization Assays and Comparative Genomics To Discover Symbiosis Behaviors and Factors in Vibrio fischeri. Bongrand C, Moriano-Gutierrez S, Arevalo P, McFall-Ngai M, Visick KL, Polz M, Ruby EG 2020 - mBio, 2: in press Abstract:  The luminous marine Gram-negative bacterium () is the natural light organ symbiont of several squid species, including the Hawaiian bobtail squid, , and the Japanese bobtail squid, Work with has shown how the bacteria establish their niche in the light organ of the newly hatched host. Two types of strains have been distinguished based upon their behavior in cocolonization competition assays in juvenile , i.e., (i) niche-sharing or (ii) niche-dominant behavior. This study aimed to determine whether these behaviors are observed with other strains or whether they are specific to those isolated from light organs. Cocolonization competition assays between strains isolated from the congeneric squid or from other marine animals revealed the same sharing or dominant behaviors. In addition, whole-genome sequencing of these strains showed that the dominant behavior is polyphyletic and not associated with the presence or absence of a single gene or genes. Comparative genomics of 44 squid light organ isolates from around the globe led to the identification of symbiosis-specific candidates in the genomes of these strains. Colonization assays using genetic derivatives with deletions of these candidates established the importance of two such genes in colonization. This study has allowed us to expand the concept of distinct colonization behaviors to strains isolated from a number of squid and fish hosts. There is an increasing recognition of the importance of strain differences in the ecology of a symbiotic bacterial species and, in particular, how these differences underlie crucial interactions with their host. Nevertheless, little is known about the genetic bases for these differences, how they manifest themselves in specific behaviors, and their distribution among symbionts of different host species. In this study, we sequenced the genomes of isolated from the tissues of squids and fishes and applied comparative genomics approaches to look for patterns between symbiont lineages and host colonization behavior. In addition, we identified the only two genes that were exclusively present in all strains isolated from the light organs of sepiolid squid species. Mutational studies of these genes indicated that they both played a role in colonization of the squid light organ, emphasizing the value of applying a comparative genomics approach in the study of symbioses. • The Signal and the Noise: Characteristics of Antisense RNA in Complex Microbial Communities. Michaelsen TY, Brandt J, Singleton CM, Kirkegaard RH, Wiesinger J, Segata N, Albertsen M 2020 - mSystems, 1: in press Abstract:  High-throughput sequencing has allowed unprecedented insight into the composition and function of complex microbial communities. With metatranscriptomics, it is possible to interrogate the transcriptomes of multiple organisms simultaneously to get an overview of the gene expression of the entire community. Studies have successfully used metatranscriptomics to identify and describe relationships between gene expression levels and community characteristics. However, metatranscriptomic data sets contain a rich suite of additional information that is just beginning to be explored. Here, we focus on antisense expression in metatranscriptomics, discuss the different computational strategies for handling it, and highlight the strengths but also potentially detrimental effects on downstream analysis and interpretation. We also analyzed the antisense transcriptomes of multiple genomes and metagenome-assembled genomes (MAGs) from five different data sets and found high variability in the levels of antisense transcription for individual species, which were consistent across samples. Importantly, we challenged the conceptual framework that antisense transcription is primarily the product of transcriptional noise and found mixed support, suggesting that the total observed antisense RNA in complex communities arises from the combined effect of unknown biological and technical factors. Antisense transcription can be highly informative, including technical details about data quality and novel insight into the biology of complex microbial communities. This study systematically evaluated the global patterns of microbial antisense expression across various environments and provides a bird's-eye view of general patterns observed across data sets, which can provide guidelines in our understanding of antisense expression as well as interpretation of metatranscriptomic data in general. This analysis highlights that in some environments, antisense expression from microbial communities can dominate over regular gene expression. We explored some potential drivers of antisense transcription, but more importantly, this study serves as a starting point, highlighting topics for future research and providing guidelines to include antisense expression in generic bioinformatic pipelines for metatranscriptomic data. • Diarrhoeal events can trigger long-term Clostridium difficile colonization with recurrent blooms. VanInsberghe D, Elsherbini JA, Varian B, Poutahidis T, Erdman S, Polz MF 2020 - Nat Microbiol, 4: 642-650 Abstract:  Although Clostridium difficile is widely considered an antibiotic- and hospital-associated pathogen, recent evidence indicates that this is an insufficient depiction of the risks and reservoirs. A common thread that links all major risk factors of infection is their association with gastrointestinal disturbances, but this relationship to C. difficile colonization has never been tested directly. Here, we show that disturbances caused by diarrhoeal events trigger susceptibility to C. difficile colonization. Using survey data of the human gut microbiome, we detected C. difficile colonization and blooms in people recovering from food poisoning and Vibrio cholerae infections. Carriers remained colonized for year-long time scales and experienced highly variable patterns of C. difficile abundance, where increased shedding over short periods of 1-2 d interrupted week-long periods in which C. difficile was undetectable. Given that short shedding events were often linked to gastrointestinal disturbances, our results help explain why C. difficile is frequently detected as a co-infecting pathogen in patients with diarrhoea. To directly test the impact of diarrhoea on susceptibility to colonization, we developed a mouse model of variable disturbance intensity, which allowed us to monitor colonization in the absence of disease. As mice exposed to avirulent C. difficile spores ingested increasing quantities of laxatives, more individuals experienced C. difficile blooms. Our results indicate that the likelihood of colonization is highest in the days immediately following acute disturbances, suggesting that this could be an important window during which transmission could be interrupted and the incidence of infection lowered. • Single cell analyses reveal contrasting life strategies of the two main nitrifiers in the ocean. Kitzinger K, Marchant HK, Bristow LA, Herbold CW, Padilla CC, Kidane AT, Littmann S, Daims H, Pjevac P, Stewart FJ, Wagner M, Kuypers MMM 2020 - Nat Commun, 1: 767 Nitrospina AOA in situ growth rates Abstract:  Nitrification, the oxidation of ammonia via nitrite to nitrate, is a key process in marine nitrogen (N) cycling. Although oceanic ammonia and nitrite oxidation are balanced, ammonia-oxidizing archaea (AOA) vastly outnumber the main nitrite oxidizers, the bacterial Nitrospinae. The ecophysiological reasons for this discrepancy in abundance are unclear. Here, we compare substrate utilization and growth of Nitrospinae to AOA in the Gulf of Mexico. Based on our results, more than half of the Nitrospinae cellular N-demand is met by the organic-N compounds urea and cyanate, while AOA mainly assimilate ammonium. Nitrospinae have, under in situ conditions, around four-times higher biomass yield and five-times higher growth rates than AOA, despite their ten-fold lower abundance. Our combined results indicate that differences in mortality between Nitrospinae and AOA, rather than thermodynamics, biomass yield and cell size, determine the abundances of these main marine nitrifiers. Furthermore, there is no need to invoke yet undiscovered, abundant nitrite oxidizers to explain nitrification rates in the ocean. • Culture-independent tracking of Vibrio cholerae lineages reveals complex spatiotemporal dynamics in a natural population. Kirchberger PC, Orata FD, Nasreen T, Kauffman KM, Tarr CL, Case RJ, Polz MF, Boucher YF 2020 - Environ. Microbiol., in press Abstract:  Populations of the bacterium Vibrio cholerae consist of dozens of distinct lineages, with primarily (but not exclusively) members of the pandemic generating lineage capable of causing the diarrhoeal disease cholera. Assessing the composition and temporal dynamics of such populations requires extensive isolation efforts and thus only rarely covers large geographic areas or timeframes exhaustively. We developed a culture-independent amplicon sequencing strategy based on the protein-coding gene viuB (vibriobactin utilization) to study the structure of a V. cholerae population over the course of a summer. We show that the 26 co-occurring V. cholerae lineages continuously compete for limited space on nutrient-rich particles where only a few of them can grow to large numbers. Differential abundance of lineages between locations and size-fractions associated with a particle-attached or free-swimming lifestyle could reflect adaptation to various environmental niches. In particular, a major V. cholerae lineage occasionally grows to large numbers on particles but remain undetectable using isolation-based methods, indicating selective culturability for some members of the species. We thus demonstrate that isolation-based studies may not accurately reflect the structure and complex dynamics of V. cholerae populations and provide a scalable high-throughput method for both epidemiological and ecological approaches to studying this species. • Transcriptomic Response of Nitrosomonas europaea Transitioned from Ammonia- to Oxygen-Limited Steady-State Growth. Sedlacek CJ, Giguere AT, Dobie MD, Mellbye BL, Ferrell RV, Woebken D, Sayavedra-Soto LA, Bottomley PJ, Daims H, Wagner M, Pjevac P 2020 - mSystems, 1: e00562-19 N. europaea electron flow Abstract:  Ammonia-oxidizing microorganisms perform the first step of nitrification, the oxidation of ammonia to nitrite. The bacterium is the best-characterized ammonia oxidizer to date. Exposure to hypoxic conditions has a profound effect on the physiology of , e.g., by inducing nitrifier denitrification, resulting in increased nitric and nitrous oxide production. This metabolic shift is of major significance in agricultural soils, as it contributes to fertilizer loss and global climate change. Previous studies investigating the effect of oxygen limitation on have focused on the transcriptional regulation of genes involved in nitrification and nitrifier denitrification. Here, we combine steady-state cultivation with whole-genome transcriptomics to investigate the overall effect of oxygen limitation on Under oxygen-limited conditions, growth yield was reduced and ammonia-to-nitrite conversion was not stoichiometric, suggesting the production of nitrogenous gases. However, the transcription of the principal nitric oxide reductase (cNOR) did not change significantly during oxygen-limited growth, while the transcription of the nitrite reductase-encoding gene () was significantly lower. In contrast, both heme-copper-containing cytochrome oxidases encoded by were upregulated during oxygen-limited growth. Particularly striking was the significant increase in transcription of the B-type heme-copper oxidase, proposed to function as a nitric oxide reductase (sNOR) in ammonia-oxidizing bacteria. In the context of previous physiological studies, as well as the evolutionary placement of sNOR with regard to other heme-copper oxidases, these results suggest sNOR may function as a high-affinity terminal oxidase in and other ammonia-oxidizing bacteria. Nitrification is a ubiquitous microbially mediated process in the environment and an essential process in engineered systems such as wastewater and drinking water treatment plants. However, nitrification also contributes to fertilizer loss from agricultural environments, increasing the eutrophication of downstream aquatic ecosystems, and produces the greenhouse gas nitrous oxide. As ammonia-oxidizing bacteria are the most dominant ammonia-oxidizing microbes in fertilized agricultural soils, understanding their responses to a variety of environmental conditions is essential for curbing the negative environmental effects of nitrification. Notably, oxygen limitation has been reported to significantly increase nitric oxide and nitrous oxide production during nitrification. Here, we investigate the physiology of the best-characterized ammonia-oxidizing bacterium, , growing under oxygen-limited conditions. • The role of gut microbiota, butyrate and proton pump inhibitors in amyotrophic lateral sclerosis: a systematic review. Erber AC, Cetin H, Berry D, Schernhammer ES 2020 - Int. J. Neurosci., 7: 727-735 Abstract:  We conducted a systematic review on existing literature in humans and animals, linking the gut microbiome with amyotrophic lateral sclerosis (ALS). Additionally, we sought to explore the role of the bacterially produced metabolite butyrate as well as of proton pump inhibitors (PPIs) in these associations. Following PRISMA guidelines for systematic literature reviews, four databases (Medline, Scopus, Embase and Web of Science) were searched and screened by two independent reviewers against defined inclusion criteria. Six studies in humans and six animal studies were identified, summarized and reviewed. Overall, the evidence accrued to date is supportive of changes in the gut microbiome being associated with ALS risk, and potentially progression, though observational studies are small (describing a total of 145 patients with ALS across all published studies), and not entirely conclusive. With emerging studies beginning to apply metagenome sequencing, more clarity regarding the importance and promise of the gut microbiome in ALS can be expected. Future studies may also help establish the therapeutic potential of butyrate, and the role of PPIs in these associations. • Archaeal nitrification is constrained by copper complexation with organic matter in municipal wastewater treatment plants. Gwak JH, Jung MY, Hong H, Kim JG, Quan ZX, Reinfelder JR, Spasov E, Neufeld JD, Wagner M, Rhee SK 2020 - ISME J, 2: 335-346 Abstract:  Consistent with the observation that ammonia-oxidizing bacteria (AOB) outnumber ammonia-oxidizing archaea (AOA) in many eutrophic ecosystems globally, AOB typically dominate activated sludge aeration basins from municipal wastewater treatment plants (WWTPs). In this study, we demonstrate that the growth of AOA strains inoculated into sterile-filtered wastewater was inhibited significantly, in contrast to uninhibited growth of a reference AOB strain. In order to identify possible mechanisms underlying AOA-specific inhibition, we show that complex mixtures of organic compounds, such as yeast extract, were highly inhibitory to all AOA strains but not to the AOB strain. By testing individual organic compounds, we reveal strong inhibitory effects of organic compounds with high metal complexation potentials implying that the inhibitory mechanism for AOA can be explained by the reduced bioavailability of an essential metal. Our results further demonstrate that the inhibitory effect on AOA can be alleviated by copper supplementation, which we observed for pure AOA cultures in a defined medium and for AOA inoculated into nitrifying sludge. Our study offers a novel mechanistic explanation for the relatively low abundance of AOA in most WWTPs and provides a basis for modulating the composition of nitrifying communities in both engineered systems and naturally occurring environments. • Horizontal acquisition of a patchwork Calvin cycle by symbiotic and free-living Campylobacterota (formerly Epsilonproteobacteria). Assié A, Leisch N, Meier DV, Gruber-Vodicka H, Tegetmeyer HE, Meyerdierks A, Kleiner M, Hinzke T, Joye S, Saxton M, Dubilier N, Petersen JM 2020 - ISME J, 1: 104-122 Abstract:  Most autotrophs use the Calvin-Benson-Bassham (CBB) cycle for carbon fixation. In contrast, all currently described autotrophs from the Campylobacterota (previously Epsilonproteobacteria) use the reductive tricarboxylic acid cycle (rTCA) instead. We discovered campylobacterotal epibionts ("Candidatus Thiobarba") of deep-sea mussels that have acquired a complete CBB cycle and may have lost most key genes of the rTCA cycle. Intriguingly, the phylogenies of campylobacterotal CBB cycle genes suggest they were acquired in multiple transfers from Gammaproteobacteria closely related to sulfur-oxidizing endosymbionts associated with the mussels, as well as from Betaproteobacteria. We hypothesize that "Ca. Thiobarba" switched from the rTCA cycle to a fully functional CBB cycle during its evolution, by acquiring genes from multiple sources, including co-occurring symbionts. We also found key CBB cycle genes in free-living Campylobacterota, suggesting that the CBB cycle may be more widespread in this phylum than previously known. Metatranscriptomics and metaproteomics confirmed high expression of CBB cycle genes in mussel-associated "Ca. Thiobarba". Direct stable isotope fingerprinting showed that "Ca. Thiobarba" has typical CBB signatures, suggesting that it uses this cycle for carbon fixation. Our discovery calls into question current assumptions about the distribution of carbon fixation pathways in microbial lineages, and the interpretation of stable isotope measurements in the environment. Book chapters and other publications 4 Publications found • Is too much fertilizer a problem? Sedlacek CJ, Giguere AT, Pjevac P 2020 - Frontiers for Young Minds, 8: 63 Abstract:  Fertilizers are added to crops in order to produce enough food to feed the human population. Fertilizers provide crops with nutrients like potassium, phosphorus, and nitrogen, which allow crops to grow bigger, faster, and to produce more food. Nitrogen in particular is an essential nutrient for the growth of every organismon Earth.Nitrogen is all around us and makes up about 78% of the air you breathe. However, plants and animals cannot use the nitrogen gas in the air. To grow, plants require nitrogen compounds fromthe soil,which can be produced naturally or be provided by fertilizers. However, applying excessive amounts of fertilizer leads to the release of harmful greenhouse gases into the atmosphere and the eutrophication of our waterways. Scientists are currently trying to find solutions to reduce the environmentally harmful effects of fertilizers, without reducing the amount of food we can produce when using them. • Thinking outside the Chlamydia box A Taylor-Brown, T Halter, A Polkinghorne, M Horn 2020 - 429-458. in Chlamydia Biology. (M Tan, JH Hegemann, C Sütterlin). Caister Academic Press Abstract:  Chlamydiae have long been studied exclusively in the context of disease. Yet, accumulating evidence over nearly three decades shows that chlamydiae are ubiquitous in the environment, thriving as symbionts of unicellular eukaryotes such as amoeba and infecting a broad range of animal hosts. These chlamydiae share the characteristic chlamydial developmental cycle and other chlamydial hallmarks. Their discovery fundamentally changed our perspective on chlamydial diversity. Instead of a single genus, Chlamydia, including closely related pathogens, the chlamydiae comprise hundreds of families and genera. Investigating isolates and non-cultured representatives provided insights into features that are in common with or divergent from known Chlamydia species, and suggested that some of these chlamydiae may also be considered pathogens. Importantly, these studies have contributed to a better understanding of the biology of all chlamydiae, and they provide a framework for investigating the evolution of the chlamydial intracellular lifestyle and pathogenicity. • One complete and seven draft genome sequences of subdivision 1 and 3 Acidobacteria from soil Eichorst SA, Trojan D, Huntemann M, Clum A, Pillay M, Palaniappan K, Varghese N, Mikhailova N, Stamatis D, Reddy TBK, Daum C, Goodwin LA, Shapiro N, Ivanova N, Kyrpides N, Woyke T, Woebken D 2020 - Microbiology Resource Announcements, 9: 1-4 Abstract:  We report eight genomes from representatives of the phylum Acidobacteriasubdivisions 1 and 3, isolated from soils. The genome sizes range from 4.9 to 6.7 Mb. Genomic analysis reveals putative genes for low- and high-affinity respiratory oxygen reductases, high-affinity hydrogenases, and the capacity to use a diverse collection of carbohydrates. • Draft genome sequences of Chlamydiales bacterium STE3 and Neochlamydia sp. AcF84, endosymbionts of Acanthamoeba spp. Köstlbacher S, Michels S, Siegl A, Schulz F, Domman D, Jongwutiwes S, Putaporntip C, Horn M, Collingro A 2020 - Microbiol Resour Announc, 9: e00220-20 Abstract:  Chlamydiales bacterium STE3 and Neochlamydia sp. strain AcF84 are obligate intracellular symbionts of Acanthamoeba spp. isolated from the biofilm of a littoral cave wall and gills from striped tiger leaf fish, respectively. We report the draft genome sequences of these two environmental chlamydiae affiliated with the family Parachlamydiaceae.
{ "url": "https://dome.csb.univie.ac.at/publications?id=1485", "source_domain": "dome.csb.univie.ac.at", "snapshot_id": "crawl=CC-MAIN-2020-45", "warc_metadata": { "Content-Length": "165575", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:3OG2HK5DDGGP2HNCAYHKOOYKBHIUUCXD", "WARC-Concurrent-To": "<urn:uuid:ea6eae8b-5734-4fe3-9fc7-0a7e188b92d0>", "WARC-Date": "2020-10-22T04:12:50Z", "WARC-IP-Address": "131.130.65.129", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:JSPE5M6GMCJG5X5KQNWJFW7OAQ2G4J76", "WARC-Record-ID": "<urn:uuid:1503aa6b-893d-4747-bf99-7c1b2bd35b78>", "WARC-Target-URI": "https://dome.csb.univie.ac.at/publications?id=1485", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:4311c8ab-2d4d-4ee1-b841-e44acc1a8b46>" }, "warc_info": "isPartOf: CC-MAIN-2020-45\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-208.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 13, 14, 53, 54, 76, 202, 203, 286, 314, 315, 330, 331, 1792, 1793, 1872, 1873, 1956, 1985, 1986, 2001, 2002, 3521, 3522, 3676, 3677, 3773, 3803, 3804, 3819, 3820, 5011, 5012, 5113, 5114, 5194, 5222, 5223, 5238, 5239, 6851, 6852, 7038, 7039, 7180, 7227, 7228, 7243, 7244, 9414, 9415, 9534, 9535, 9692, 9723, 9724, 9739, 9740, 11007, 11008, 11137, 11138, 11245, 11280, 11324, 11325, 11340, 11341, 12770, 12771, 12880, 12881, 12976, 13004, 13005, 13020, 13021, 14148, 14149, 14240, 14241, 14294, 14328, 14329, 14344, 14345, 16075, 16076, 16142, 16143, 16176, 16177, 16192, 16193, 17789, 17790, 17961, 17962, 18048, 18085, 18086, 18101, 18102, 19811, 19812, 19924, 19925, 20054, 20105, 20106, 20121, 20122, 21572, 21573, 21718, 21719, 21858, 21886, 21932, 21933, 21948, 21949, 23628, 23629, 23764, 23765, 23907, 23935, 23961, 23962, 23977, 23978, 25570, 25571, 25742, 25743, 25858, 25894, 25895, 25910, 25911, 27641, 27642, 27713, 27714, 28071, 28101, 28102, 28117, 28118, 30198, 30199, 30234, 30235, 30274, 30313, 30314, 30329, 30330, 30924, 30925, 30983, 30984, 31752, 31789, 31832, 31833, 31848, 31849, 32931, 32932, 33038, 33039, 33119, 33160, 33161, 33176, 33177, 34715, 34716, 34805, 34806, 34943, 34982, 34983, 34998, 34999, 36599, 36600, 36700, 36701, 36784, 36824, 36825, 36840, 36841, 38718, 38719, 38797, 38798, 38881, 38914, 38915, 38930, 38931, 40194, 40195, 40308, 40309, 40379, 40410, 40411, 40426, 40427, 42631, 42632, 42709, 42710, 42742, 42775, 42776, 42791, 42792, 43841, 43842, 43947, 43948, 44105, 44138, 44139, 44154, 44155, 46585, 46586, 46705, 46706, 46796, 46825, 46826, 46841, 46842, 49235, 49236, 49333, 49334, 49427, 49460, 49461, 49476, 49477, 51805, 51806, 51908, 51909, 51986, 52023, 52024, 52039, 52040, 53783, 53784, 53885, 53886, 54028, 54058, 54098, 54099, 54114, 54115, 55234, 55235, 55361, 55362, 55454, 55495, 55496, 55511, 55512, 56966, 56967, 57086, 57087, 57222, 57256, 57286, 57287, 57302, 57303, 59978, 59979, 60102, 60103, 60151, 60192, 60193, 60208, 60209, 61394, 61395, 61522, 61523, 61625, 61655, 61656, 61671, 61672, 63071, 63072, 63207, 63208, 63352, 63382, 63383, 63398, 63399, 64911, 64912, 64949, 64950, 64971, 65009, 65010, 65048, 65092, 65093, 65108, 65109, 66046, 66047, 66086, 66087, 66140, 66240, 66241, 66256, 66257, 67327, 67328, 67425, 67426, 67621, 67676, 67677, 67692, 67693, 68044, 68045, 68166, 68167, 68276, 68326, 68327, 68342, 68343 ], "line_end_idx": [ 13, 14, 53, 54, 76, 202, 203, 286, 314, 315, 330, 331, 1792, 1793, 1872, 1873, 1956, 1985, 1986, 2001, 2002, 3521, 3522, 3676, 3677, 3773, 3803, 3804, 3819, 3820, 5011, 5012, 5113, 5114, 5194, 5222, 5223, 5238, 5239, 6851, 6852, 7038, 7039, 7180, 7227, 7228, 7243, 7244, 9414, 9415, 9534, 9535, 9692, 9723, 9724, 9739, 9740, 11007, 11008, 11137, 11138, 11245, 11280, 11324, 11325, 11340, 11341, 12770, 12771, 12880, 12881, 12976, 13004, 13005, 13020, 13021, 14148, 14149, 14240, 14241, 14294, 14328, 14329, 14344, 14345, 16075, 16076, 16142, 16143, 16176, 16177, 16192, 16193, 17789, 17790, 17961, 17962, 18048, 18085, 18086, 18101, 18102, 19811, 19812, 19924, 19925, 20054, 20105, 20106, 20121, 20122, 21572, 21573, 21718, 21719, 21858, 21886, 21932, 21933, 21948, 21949, 23628, 23629, 23764, 23765, 23907, 23935, 23961, 23962, 23977, 23978, 25570, 25571, 25742, 25743, 25858, 25894, 25895, 25910, 25911, 27641, 27642, 27713, 27714, 28071, 28101, 28102, 28117, 28118, 30198, 30199, 30234, 30235, 30274, 30313, 30314, 30329, 30330, 30924, 30925, 30983, 30984, 31752, 31789, 31832, 31833, 31848, 31849, 32931, 32932, 33038, 33039, 33119, 33160, 33161, 33176, 33177, 34715, 34716, 34805, 34806, 34943, 34982, 34983, 34998, 34999, 36599, 36600, 36700, 36701, 36784, 36824, 36825, 36840, 36841, 38718, 38719, 38797, 38798, 38881, 38914, 38915, 38930, 38931, 40194, 40195, 40308, 40309, 40379, 40410, 40411, 40426, 40427, 42631, 42632, 42709, 42710, 42742, 42775, 42776, 42791, 42792, 43841, 43842, 43947, 43948, 44105, 44138, 44139, 44154, 44155, 46585, 46586, 46705, 46706, 46796, 46825, 46826, 46841, 46842, 49235, 49236, 49333, 49334, 49427, 49460, 49461, 49476, 49477, 51805, 51806, 51908, 51909, 51986, 52023, 52024, 52039, 52040, 53783, 53784, 53885, 53886, 54028, 54058, 54098, 54099, 54114, 54115, 55234, 55235, 55361, 55362, 55454, 55495, 55496, 55511, 55512, 56966, 56967, 57086, 57087, 57222, 57256, 57286, 57287, 57302, 57303, 59978, 59979, 60102, 60103, 60151, 60192, 60193, 60208, 60209, 61394, 61395, 61522, 61523, 61625, 61655, 61656, 61671, 61672, 63071, 63072, 63207, 63208, 63352, 63382, 63383, 63398, 63399, 64911, 64912, 64949, 64950, 64971, 65009, 65010, 65048, 65092, 65093, 65108, 65109, 66046, 66047, 66086, 66087, 66140, 66240, 66241, 66256, 66257, 67327, 67328, 67425, 67426, 67621, 67676, 67677, 67692, 67693, 68044, 68045, 68166, 68167, 68276, 68326, 68327, 68342, 68343, 68691 ] }
{ "red_pajama_v2": { "ccnet_original_length": 68691, "ccnet_original_nlines": 353, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 7, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.2831476330757141, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.051826901733875275, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1696467101573944, "rps_doc_frac_unique_words": 0.29488930106163025, "rps_doc_mean_word_length": 5.923706531524658, "rps_doc_num_sentences": 425, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 6.739892482757568, "rps_doc_word_count": 9529, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.011904969811439514, "rps_doc_frac_chars_dupe_6grams": 0.006962279789149761, "rps_doc_frac_chars_dupe_7grams": 0.0021967499051243067, "rps_doc_frac_chars_dupe_8grams": 0.0010275100357830524, "rps_doc_frac_chars_dupe_9grams": 0.0010275100357830524, "rps_doc_frac_chars_top_2gram": 0.006554820109158754, "rps_doc_frac_chars_top_3gram": 0.0039860401302576065, "rps_doc_frac_chars_top_4gram": 0.001169239985756576, "rps_doc_books_importance": -4893.5009765625, "rps_doc_books_importance_length_correction": -4893.5009765625, "rps_doc_openwebtext_importance": -2996.763916015625, "rps_doc_openwebtext_importance_length_correction": -2996.763916015625, "rps_doc_wikipedia_importance": -2113.110107421875, "rps_doc_wikipedia_importance_length_correction": -2113.110107421875 }, "fasttext": { "dclm": 0.08378291130065918, "english": 0.8858810663223267, "fineweb_edu_approx": 2.815565347671509, "eai_general_math": 0.4086448550224304, "eai_open_web_math": 0.3049166202545166, "eai_web_code": 0.021875619888305664 } }
{ "free_decimal_correspondence": { "primary": { "code": "579.1", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Biological specimens" } }, "secondary": { "code": "579.12", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Biological specimens" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "6", "label": "Content Listing" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
2,948,035,631,991,320,000
0 I'm moving to a pure as3 environment into flex and I have a question about preloaders. For one of my apps in particular when the swf loaded I would add a screen with an animated preloader. Then at a particular point in my code when I know all of my xml has been parsed, UI built and all initiliztion done I dispatch a "done" event which removes the preloader. How can I achieve this is flex? I've only ever really seen flex preloaders that are percentage based which I believe represent the actual loading of the swf itself? 1 Please read the flex cookbook for preloaders, they have some demo applications, that could help u out actually there is a preloader property in the application tag, that could be wht u might help u out tc Ankur Sharma 0 Flex has a ProgressBar control that you can use for similar purposes. If you want to continue to use your own custom animated progress bar, you can add that Sprite to the rawChildren of a Container (preferably Canvas) and show it as a modal pop-up using the PopUpManager - remove the pop-up from the done event's handler. The overriden addChild method of the Container class will throw an error if you pass a child that doesn't extend UIComponent - that's why you should use rawChildren.addChild. 0 Yep default flex preloader represents the loading of the swf itself. If I were you, I would use the Task library from the Cairngorm 3 Libs, works perfectly with a preloader : http://opensource.adobe.com/svn/opensource/cairngorm3/trunk/libraries/TaskTest/src/samples/TaskFlowPreloader.as Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
{ "url": "https://stackoverflow.com/questions/2927844/a-question-about-flex-preloaders", "source_domain": "stackoverflow.com", "snapshot_id": "crawl=CC-MAIN-2019-30", "warc_metadata": { "Content-Length": "133572", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:FI3HJKQE5LDXAB7QAJFNFS7HYNEOQHOZ", "WARC-Concurrent-To": "<urn:uuid:0cac5e03-0bfd-41c3-baac-6788cbf428ae>", "WARC-Date": "2019-07-20T00:43:42Z", "WARC-IP-Address": "151.101.193.69", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:3MSF5R3ZFMNETXVO4MH5FTQMR25VM2GS", "WARC-Record-ID": "<urn:uuid:2993ce52-b859-4605-8364-b80114216262>", "WARC-Target-URI": "https://stackoverflow.com/questions/2927844/a-question-about-flex-preloaders", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:5291a5f4-f87a-4afb-a9e9-d4829668e263>" }, "warc_info": "isPartOf: CC-MAIN-2019-30\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-99-166-38.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 2, 3, 90, 91, 364, 365, 530, 531, 533, 534, 636, 637, 700, 701, 741, 742, 755, 756, 758, 759, 1081, 1082, 1257, 1258, 1260, 1261, 1330, 1331, 1437, 1438, 1550, 1551, 1563, 1564, 1664, 1665 ], "line_end_idx": [ 2, 3, 90, 91, 364, 365, 530, 531, 533, 534, 636, 637, 700, 701, 741, 742, 755, 756, 758, 759, 1081, 1082, 1257, 1258, 1260, 1261, 1330, 1331, 1437, 1438, 1550, 1551, 1563, 1564, 1664, 1665, 1755 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1755, "ccnet_original_nlines": 36, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.4309392273426056, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03038674034178257, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1519336998462677, "rps_doc_frac_unique_words": 0.5965517163276672, "rps_doc_mean_word_length": 4.806896686553955, "rps_doc_num_sentences": 15, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.838399887084961, "rps_doc_word_count": 290, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.030129119753837585, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.012912480160593987, "rps_doc_frac_chars_top_3gram": 0.0172166395932436, "rps_doc_frac_chars_top_4gram": 0.02152080088853836, "rps_doc_books_importance": -183.28623962402344, "rps_doc_books_importance_length_correction": -174.61805725097656, "rps_doc_openwebtext_importance": -99.37107849121094, "rps_doc_openwebtext_importance_length_correction": -99.37107849121094, "rps_doc_wikipedia_importance": -80.58393859863281, "rps_doc_wikipedia_importance_length_correction": -76.32658386230469 }, "fasttext": { "dclm": 0.17678368091583252, "english": 0.9063482880592346, "fineweb_edu_approx": 1.1365646123886108, "eai_general_math": 0.00013816000137012452, "eai_open_web_math": 0.04129958152770996, "eai_web_code": 0.00009644000238040462 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.4", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "2", "label": "Click Here References" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
-848,532,264,569,556,200
Skip to content Instantly share code, notes, and snippets. View inside-export-ga.py #!/usr/bin/env python3 """ Exports group addresses from ETS Inside project. Usage: python3 inside-export-ga.py path/to/project """ import sys import json import xml.etree.ElementTree as ET @Cybso Cybso / sort-access-log Last active Mar 4, 2021 Sort apache access logs and convert 'common' into 'combined'. The output of this script can be used as input for awffull or webalizer. View sort-access-log #!/bin/bash ### # Sorts the rows of one or multiple apache access_log files # by date (ascending) and converts them from 'common' log format # into 'combined' (if you switched the log file format meanwhile). # # This is useful when you want to merge multiple log files, e.g. when # you have different files for HTTP and HTTPS. # # Usage: @Cybso Cybso / stamp-last-page.sh Created Apr 3, 2017 Put a stamp on the last page of a PDF document using PDFTK View stamp-last-page.sh #!/bin/bash if [ "$1" == "" -o "$2" == "" -o "$3" == "" -o "$4" != "" -o "$1" == "-h" -o "$1" == "--help" ]; then echo "Puts a stamp (as PDF file) onto the last page of the input" >&2 echo "file using PDFTK". >&2 echo "" >&2 echo "Usage: $0 INPUT.pdf STAMP.pdf OUTPUT.pdf" >&2 exit 1 fi @Cybso Cybso / suspend-on-idle.service Last active Mar 4, 2017 Suspend system on inactivity View suspend-on-idle.service # /etc/systemd/system/suspend-on-idle.service # call "systemctl daemon-reload" after creation / modification # call "systemctl status suspend-on-idle.service" to see last log line # call "journalctl -b0 -u suspend-on-idle" to see all log line [Unit] Description=Suspend on idle Wants=network-online.target After=network.target network-online.target [Service] @Cybso Cybso / verify_ssha_passwd.py Last active May 23, 2020 PAM helper script in python to allow migration of user accounts stored in LDAP (with SSHA hashed passwords) to regular unix system users. This script will be executed is pam_unix failed and will try to verify the user password stored in /etc/shadow using SSHA algorithm. View verify_ssha_passwd.py #!/usr/bin/env python ### # Takes a username from environment variable PAM_USER, a password from STDIN # and tries to verify the shadow's password using LDAP's SSHA algorithm: # # {SSHA}...base64encodedString... # # If used within PAM auth this provides a compatibility layer that allows # to migrate LDAP user into Unix user accounts. When the user's password View redmine-ldapsync.py #!/usr/bin/env python # syncldap.py - Sync user accounts from an LDAP or Active Directory to Redmine # # Usage: syncldap.py <database.yml> [environment] # # Where database.yml is the database configuration file for a redmine instance, # and environment is the rails environment that should be used (defaults to # 'production'). # # Author: View adblock.sh #!/bin/sh #Put in /etc/adblock.sh #Script to grab and sort a list of adservers and malware #Check proper DHCP config and, if necessary, update it uci get dhcp.@dnsmasq[0].addnhosts > /dev/null 2>&1 || uci add_list dhcp.@dnsmasq[0].addnhosts=/etc/block.hosts && uci commit #Leave crontab alone, or add to it grep -q "/etc/adblock.sh" /etc/crontabs/root || echo "0 4 * * 0,3 sh /etc/adblock.sh" >> /etc/crontabs/root
{ "url": "https://gist.github.com/Cybso", "source_domain": "gist.github.com", "snapshot_id": "crawl=CC-MAIN-2021-21", "warc_metadata": { "Content-Length": "107767", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:VN7UYKDYRODZXYVJE7K4VGDPMTRGJYTW", "WARC-Concurrent-To": "<urn:uuid:3a3e0c23-4d9f-4cd6-9b07-33a7fcf15e55>", "WARC-Date": "2021-05-09T20:50:40Z", "WARC-IP-Address": "140.82.113.3", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:HKK24PMYHTZB25VIBP5NJ3RX4ZIYITNT", "WARC-Record-ID": "<urn:uuid:55fad63b-0029-434a-a064-6fce49afe468>", "WARC-Target-URI": "https://gist.github.com/Cybso", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:5219fd5d-ab1b-48b0-be0a-bf3b90a1fcc4>" }, "warc_info": "isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-193.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 16, 17, 60, 61, 86, 109, 113, 169, 213, 217, 228, 240, 275, 282, 306, 330, 465, 486, 498, 502, 562, 627, 694, 696, 766, 813, 815, 824, 831, 858, 878, 937, 961, 973, 1075, 1145, 1174, 1186, 1238, 1245, 1248, 1255, 1287, 1311, 1340, 1369, 1415, 1478, 1549, 1612, 1619, 1647, 1675, 1718, 1728, 1735, 1765, 1790, 2061, 2088, 2110, 2114, 2191, 2264, 2266, 2300, 2302, 2376, 2449, 2474, 2496, 2575, 2577, 2627, 2629, 2709, 2785, 2802, 2804, 2814, 2830, 2840, 2864, 2921, 2976, 3102, 3137 ], "line_end_idx": [ 16, 17, 60, 61, 86, 109, 113, 169, 213, 217, 228, 240, 275, 282, 306, 330, 465, 486, 498, 502, 562, 627, 694, 696, 766, 813, 815, 824, 831, 858, 878, 937, 961, 973, 1075, 1145, 1174, 1186, 1238, 1245, 1248, 1255, 1287, 1311, 1340, 1369, 1415, 1478, 1549, 1612, 1619, 1647, 1675, 1718, 1728, 1735, 1765, 1790, 2061, 2088, 2110, 2114, 2191, 2264, 2266, 2300, 2302, 2376, 2449, 2474, 2496, 2575, 2577, 2627, 2629, 2709, 2785, 2802, 2804, 2814, 2830, 2840, 2864, 2921, 2976, 3102, 3137, 3244 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3244, "ccnet_original_nlines": 87, "rps_doc_curly_bracket": 0.0006165200029499829, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.20049504935741425, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.029702970758080482, "rps_doc_frac_lines_end_with_ellipsis": 0.011363640427589417, "rps_doc_frac_no_alph_words": 0.3737623691558838, "rps_doc_frac_unique_words": 0.5353075265884399, "rps_doc_mean_word_length": 5.462414741516113, "rps_doc_num_sentences": 55, "rps_doc_symbol_to_word_ratio": 0.05693069100379944, "rps_doc_unigram_entropy": 5.187591552734375, "rps_doc_word_count": 439, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.01668057031929493, "rps_doc_frac_chars_top_3gram": 0.010842369869351387, "rps_doc_frac_chars_top_4gram": 0.01167639996856451, "rps_doc_books_importance": -344.7013854980469, "rps_doc_books_importance_length_correction": -344.7013854980469, "rps_doc_openwebtext_importance": -191.5957794189453, "rps_doc_openwebtext_importance_length_correction": -191.5957794189453, "rps_doc_wikipedia_importance": -124.6558837890625, "rps_doc_wikipedia_importance_length_correction": -124.6558837890625 }, "fasttext": { "dclm": 0.020035209134221077, "english": 0.6746217608451843, "fineweb_edu_approx": 1.9275747537612915, "eai_general_math": 0.621424674987793, "eai_open_web_math": 0.11183922737836838, "eai_web_code": 0.10825216770172119 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.02", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "4", "label": "Code/Software" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "1", "label": "Leftover HTML" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "6", "label": "Content Listing" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
7,804,341,887,101,659,000
keylifejourneys Click here for a special video from Key Life Journeys   Welcome  |  A Soul Journey  |  Caregiver Resources  |  Products  |  Keynotes  |  Blog  |  Articles  |  Testimonials 1 Join Key Life News Get A Free Caregiver Resource! Name: Email: 1 Towards effective communication Towards effective communication with those cognitively impaired by Alzheimer’s disease or other dementias. By Susan M. Ellis 1.    Gain Attention No information will be retained if the individual is not attentive or concentrating on the person giving instructions. Gain eye contact, call out the individual’s name, touch her and do not begin to talk until you are sure you have her attention. If hearing is a problem, never call out instructions when the back is turned, when a distance away or calling from another room. The sound will be a jumble of noise, which has no clarity. 2.    Break down task into stages Those with memory problems have difficulty retaining a multistage command such as “After you have finished shaving put on your blue shirt and gray trousers, and don’t forget to comb your hair.” With all this information the person with a dementia does not know where to begin. Recall will be confused and the individual will become frustrated, afraid of failing and may refuse to attempt the task. You must decide on the sequence needed to complete the task. 3.    Give instructions one step at a time Give only the information that is relevant at that time. Let all the clues in the conversation be geared to the fulfillment of that one step. Only when it has been completed should you move on to the next instruction. 4.    Avoid ambiguity Language is lost in dementia. It is not just the forgotten word, but the language becomes more concrete and is interpreted more literally. Ambiguity therefore leads to misinterpretation.  Humour, which depends so much on a play on words, the double entendre, is not understood. The individual may be able to use long-term memory to tell a joke, but may not get it when told one.  Euphemisms must be avoided. We must explain precisely what we mean. To “Make a bed” literally means to get out the hammer and nails; “do you need a washroom” does not literally mean, “do you have to pee?” The question “how many children do you have” may be met with the answer “I don’t have any children.” Whereas the correct answer may be produced by asking “how many sons/daughters do you have?”. In the mind of the concrete thinker, children are youngsters and have not grown up. Our words must be more literal, have less flowery descriptions and be to the point. 5.    Limit distractions Those with a dementia have difficulty interpreting the stimuli that bombard them. We may hear the siren from a fire truck in the distance, recognize what it is, assess that it is not coming to our house and then tune it out. For the person who is cognitively impaired that sound is of unknown origin and will distract her from the task at hand. It will occupy her thoughts and your words will be lost. The radio or TV playing in the background may not distract you, but it will certainly absorb the person who is having difficulty understanding and focusing on her environment. 6.    Speak slowly and clearly We must slow down our speech to the speed of the impaired person’s thinking. We must speak clearly to aid the hearing impaired and to ensure our words are not misinterpreted. When the mother tongue is not the one you are communicating in ensure your language is straightforward. Words from a second language are often lost and individuals may return to their mother tongue. 7.    Use visual clues, gestures, demonstrations, pictures Many who have dementia suffer from perceptual problems. That is, they have difficulty correctly interpreting the stimuli they receive from their environment. This may show itself through failing to understand verbal instructions, read warning signs, or recognize familiar objects and their use. If a blue shirt is placed on a blue bedspread, an impaired individual may not be able to differentiate the colours or textures and fail to locate the shirt. If the blue shirt is in a crowded closet, the individual may only see a jumbled mass of colour and not identify the shirt for its whole shape is not visible. He may face the closet, not recognize a shirt and say that there isn’t one there. Or in frustration will just keep putting back on the one taken off the previous evening. Sometimes understanding where the body is in space maybe impaired, dressing and undressing may become difficult. The individual may choose not to undress at all. Some will have difficulty initiating an action or plan a series of actions. Dressing and feeding will become more difficult. To compensate for these losses we must provide the individual with clues. Pictures and gestures may provide recognition when your words do not. Some may be able to mimic the action of another person while being unable to initiate the action. If you gesture with a toothbrush, he may be able to mimic the action. If you guide the spoon to his mouth, he may be able to carry on when the instruction “drink your soup” brought no response. What may be lost is the recognition of an objects use. Therefore the toothbrush may be used like a comb, the razor like a toothbrush. If this is the case we must ensure the safety of the individual and give clues, such as handing the person the correct object for the task. 8.    Repeat There are so many reasons why a person with a disease such as Alzheimer’s may have difficulty following instructions and performing tasks.  Therefore it is important to repeat the information over and over again. We may become angry and wish to shout “but I’ve told you a thousand times…..” but it is important to understand that they are hearing it as if for the first time. 9.    Limit Options “What do you want for lunch?” May be met with “I don’t want lunch” since the individual cannot conjure an answer out of nowhere. So you counter with “Would you like a ham and cheese sandwich or an egg salad sandwich?” and the reply is “I don’t know.” Most people with a dementia cannot make a decision and so often will reply “no.”  If given a menu in a restaurant she will order what the person before her ordered – even if she has never liked it. So you say “But you never order liver.” Now the person with dementia is embarrassed, anxious, uncomfortable and has really lost her appetite. Finally you say “How about an egg sandwich for your lunch, okay?”  The sandwich gets eaten. It is only by trial and error that we find out at what level the decision-making ability is. But by giving choice we can offer a sense of control and confidence. Sometimes that choice is purely agreeing with the decision we have made. We would not want to say “do you want your pills now?” because we don’t want her to say no. But we can offer the pills with apple juice or water. By providing limited options we give information that can be acted on. If we just ask, “What do you want?” we will be no further ahead. 10.    Avoid confrontation “I told you to meet me outside the post office.”  “No you didn’t.”  “Yes I did.”  This is a conversation that is going nowhere. There will be no resolution to the argument. There will be two angry people. Projecting fault onto others is a defense mechanism all of us use. An object which has been misplaced, must have been stolen. We can protect ourselves when we can blame someone else. It is important that we do not enter the argument. Change the subject till the anxiety has lessened. It is possible to think more clearly when less anxious. Avoid having the last word. 11.    Use residual skills An individual with a dementia such as Alzheimer’s disease is loosing the ability to perform past learned skills. We must recognize the skills that remain and provide opportunity to perform them. This way he will remain stimulated, involved and retain self respect. Activities of a repetitive nature are best because sequencing is often difficult. 12.    Reduce chance of failure Learn the limits of her performance and attempt to secure an environment where he can function within those limits. Maybe she used to like to watch TV but now gets agitated when the commercials come on. Pre-recording programs with the commercials removed can lead to hours of enjoyment. We can use the memory loss to advantage by re-playing the same program at intervals. Indeed the familiarity often relaxes the individual whose memory loss makes her feel as if everything is new. 13.    Avoid sensory overload A person with a cognitive impairment will often have difficulty interpreting the sights and sounds of the world around her. Too much sensory input will cause confusion, anxiety and fear. It is as if a fuse blows and there can be what is known as a catastrophic reaction. That is behaviour which, to us, is out of proportion to the events occurring. There may be displays of aggression, running away, shouting etc. It is often possible to recognize the signs of this building, but often we fail to see the warning signs. Often we do not realize the distracting stimuli present when we demand action. We may feel we do not have time to wait for him to calm down before proceeding. But time invested in preventing a catastrophic reaction will be well spent in the long term. 14.    Provide a calm familiar environment. Maintain routines in daily schedules. Don’t make major changes like rearranging the furniture. If the individual has to be moved to a new setting, then take some familiar objects to be there when she arrives. When complex task are performed such as dressing and eating, ensure that distractions are minimal. If she must follow verbal instructions, ensure your voice is the one that will be noticed. Turn off the TV; close the door to others etc. Caregivers, especially relatives, who have known an individual before the cognitive deficits changed him/her, have difficulty altering the way they relate.  It is hard to break well-established habits. But the impaired person is in fact no longer the person from yesterday. The person before you now has new needs; severe limitations and can no longer live up to past expectations. It is the caregiver who must let the past go and learn to communicate on a new level. This cannot be achieved alone. All caregivers need emotional support. They must build around them a support system, a network of friends and professionals as they fulfill this difficult role. 1 Aspects of Caring - A Video by Sue Ellis - SME Productions aspects_of_living_thumb.jpg Aspects of Everday Life - a video by Sue Ellis - SME Productions   Aspects of Hope - A video by Sue Ellis - SME Productions   zrii.gif   Welcome  |  A Soul Journey  |  Caregiver Resources  |  Products  |  Keynotes  |  Blog  |  Articles  |  Testimonials   Copyright © 2006–2013 by Key Life Journeys. All rights reserved. Strategy & Design by Conscious Commerce
{ "url": "http://www.keylifejourneys.com/effectivecommunication.html", "source_domain": "www.keylifejourneys.com", "snapshot_id": "crawl=CC-MAIN-2013-20", "warc_metadata": { "Content-Length": "24334", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:DN4T2PJVN3BBGYYY22VBFYO5H44RWJ44", "WARC-Concurrent-To": "<urn:uuid:5efacc40-7850-4262-8a5a-319c06d4b356>", "WARC-Date": "2013-05-25T10:51:30Z", "WARC-IP-Address": "208.109.140.174", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:YKVEQ6ZW4GGCD5COUTH6KAIBOCOAXV55", "WARC-Record-ID": "<urn:uuid:eeb9272e-e1b9-4bc8-9633-9175d9217cfc>", "WARC-Target-URI": "http://www.keylifejourneys.com/effectivecommunication.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2e461d48-5858-4842-a118-20fec72d67af>" }, "warc_info": "robots: classic\r\nhostname: ip-10-60-113-184.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-20\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Spring 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 16, 70, 188, 190, 191, 210, 211, 242, 243, 249, 256, 257, 259, 291, 292, 399, 400, 403, 404, 419, 420, 441, 442, 877, 878, 912, 913, 1372, 1373, 1416, 1417, 1635, 1636, 1658, 1659, 2606, 2607, 2632, 2633, 3211, 3212, 3243, 3244, 3618, 3619, 3678, 3679, 5457, 5458, 5471, 5472, 5848, 5849, 5869, 5870, 5999, 6461, 6553, 7070, 7071, 7098, 7099, 7672, 7673, 7700, 7701, 8048, 8049, 8081, 8082, 8564, 8565, 8595, 8596, 9368, 9369, 9413, 9414, 9860, 9861, 10521, 10522, 10524, 10525, 10584, 10585, 10613, 10614, 10679, 10681, 10739, 10740, 10750, 10751, 10869 ], "line_end_idx": [ 16, 70, 188, 190, 191, 210, 211, 242, 243, 249, 256, 257, 259, 291, 292, 399, 400, 403, 404, 419, 420, 441, 442, 877, 878, 912, 913, 1372, 1373, 1416, 1417, 1635, 1636, 1658, 1659, 2606, 2607, 2632, 2633, 3211, 3212, 3243, 3244, 3618, 3619, 3678, 3679, 5457, 5458, 5471, 5472, 5848, 5849, 5869, 5870, 5999, 6461, 6553, 7070, 7071, 7098, 7099, 7672, 7673, 7700, 7701, 8048, 8049, 8081, 8082, 8564, 8565, 8595, 8596, 9368, 9369, 9413, 9414, 9860, 9861, 10521, 10522, 10524, 10525, 10584, 10585, 10613, 10614, 10679, 10681, 10739, 10740, 10750, 10751, 10869, 10975 ] }
{ "red_pajama_v2": { "ccnet_original_length": 10975, "ccnet_original_nlines": 95, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.4641037583351135, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.008800369687378407, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1329319030046463, "rps_doc_frac_unique_words": 0.37132155895233154, "rps_doc_mean_word_length": 4.668272018432617, "rps_doc_num_sentences": 142, "rps_doc_symbol_to_word_ratio": 0.00046318001113831997, "rps_doc_unigram_entropy": 5.722356796264648, "rps_doc_word_count": 1869, "rps_doc_frac_chars_dupe_10grams": 0.017650429159402847, "rps_doc_frac_chars_dupe_5grams": 0.035415470600128174, "rps_doc_frac_chars_dupe_6grams": 0.03369627892971039, "rps_doc_frac_chars_dupe_7grams": 0.03369627892971039, "rps_doc_frac_chars_dupe_8grams": 0.017650429159402847, "rps_doc_frac_chars_dupe_9grams": 0.017650429159402847, "rps_doc_frac_chars_top_2gram": 0.005501430016011, "rps_doc_frac_chars_top_3gram": 0.0045845299027860165, "rps_doc_frac_chars_top_4gram": 0.005042979959398508, "rps_doc_books_importance": -1084.1092529296875, "rps_doc_books_importance_length_correction": -1084.1092529296875, "rps_doc_openwebtext_importance": -529.3995971679688, "rps_doc_openwebtext_importance_length_correction": -529.3995971679688, "rps_doc_wikipedia_importance": -431.1412353515625, "rps_doc_wikipedia_importance_length_correction": -431.1412353515625 }, "fasttext": { "dclm": 0.06129860877990723, "english": 0.9370911121368408, "fineweb_edu_approx": 2.52698016166687, "eai_general_math": 0.07275711745023727, "eai_open_web_math": 0.26110994815826416, "eai_web_code": 0.02924180030822754 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.85832", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.8583", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
5,221,279,007,843,889,000
Contributions to the hardness foundations of lattice-based cryptography The manuscript: pdf. Jury (November 6th, 2018 at Amphi Bio/SVT, ENS de Lyon) President: Philippe GABORIT Reviewers: Pierre-Alain FOUQUE Alexander MAY Daniele MICCIANCIO Examiners: Caroline FONTAINE Damien Stehlé (PhD supervisor) Absract Lattice-based cryptography is one of the most competitive candidates for protecting privacy, both in current applications and post quantum period. The central problem that serves as the hardness foundation of lattice-based cryptography is called the Learning with Errors (LWE). It asks to solve a noisy equation system, which is linear and over-determined modulo q. Normally, we call LWE problem as an average-case problem as all the coefficients in the equation system are randomly chosen modulo q. The LWE problem is conjectured to be hard even wtih a large scale quantum computer. It is at least as hard as standard problems defined in the lattices, such as Bounded Distance Decoding (BDD) and unique Shortest Vector Problem (uSVP). Finally, the best known algorithm for solving these problems is BKZ, which is very expensive. In this thesis, we study the quantum hardness of LWE, the hardness relations between the underlying problems BDD and uSVP, and the practical performance of the BKZ algorithm. First, we give a strong evidence of quantum hardness of LWE. Concretely, we consider a relaxed version of the quantum version of dihedral coset problem and show an computational equivalence between LWE and this problem. Second, we tighten the hardness relation between BDD and uSVP. More precisely, We improve the reduction from BDD to uSVP by a factor √ 2 , compared to the one by Lyubashevsky and Micciancio. Third, we propose a more precise simulator for BKZ. In the last work, we propose the first probabilistic simulotor for BKZ, which can pridict the practical behavior of BKZ very precisely. Chapter 1: Introduction. The backgroud and motivation of this thesis, as well as a brief description of our main contributions are given in this chapter. Chapter 2: Preliminaries. Some necessary prerequisite definitions, concepts and results are given in this chapter. Chapter 3: An improved reduction from BDD to uSVP. In this chapter, we first give a brief discussion of the Lyubashevsky-Micciancio reduction from BDD1/2γ to uSVPγ. Then we give our improved reduction from BDD1/√ 2 γ to uSVPγ. We refer the reader to the link: https://eprint.iacr.org/2016/753, for a publication corresponding to this chapter. Chapter 4: A Computational Equivalence between LWE and an Extrapolated Variant of DCP. In this chapter, we first give a brief discussion on Regev's uSVP to DCP reduction. Then we given our results on the computational equivalence between LWE and an extrapolated version of DCP. We refer the reader to the link: https://arxiv.org/abs/1710.08223, for a publication corresponding to this chapter. Chapter 5: A finer modelling of BKZ: understanding the head concavity. In this chapter, we first report some experiments providing more insight on the shorter-than-expected phenomenon, which denote the phenomenon that the first few Gram-Schmidt norms in experiments are smaller than the ones in the Chen--Nguyen BKZ simulator. Then, we present a refined BKZ simulator, and experimentally show that the new simulator can predict the behavior of BKZ more accurately. Finally, we further propose a new BKZ variant by exploiting the shorter-than-expected phenomenon, which can be used to solve the SVP-120 instance of the Darmstadt lattice challenge faster. Our BKZ experiments were run using the fplll (version 5.2.0) and fpylll (version 0.4.0dev) open-source libraries. Our simulator, coded in Python, and the BKZ variants, coded in C++ are all freely available online: https://github.com/BKZsimulator under the GNU Lesser General Public License (either version 2.1 of the License or any later version). Some data corresponding to the figures of this chapter: fig5.1-5.2, fig5.3, fig5.4, fig5.5, fig5.6, fig5.7, fig5.8 (a chain of block-sizes (movie)), fig5.9, fig5.10, fig5.11, fig5.12, fig5.13, fig5.14, fig5.15-5.16, fig5.17-5.18, fig5.19-5.20 (full GSO norms (movie), first GSO norm (movie)), fig5.21, fig5.22, fig5.23, fig5.24, fig5.25, fig5.26 (a process of pressed-BKZ60 (movie)), fig5.27, fig5.28, fig5.29, fig5.30-5.31, fig5.32-5.33, fig5.34, fig5.35. Homepage
{ "url": "https://people.irisa.fr/Weiqiang.Wen/thesis.html", "source_domain": "people.irisa.fr", "snapshot_id": "crawl=CC-MAIN-2021-25", "warc_metadata": { "Content-Length": "8192", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:LDUWXLXRBW2AJHIKD7GGZ5ZDLVELZTD3", "WARC-Concurrent-To": "<urn:uuid:2b284ff9-fb7f-473a-8a75-7b09f8646958>", "WARC-Date": "2021-06-20T10:22:09Z", "WARC-IP-Address": "131.254.254.107", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:JXN7NSMXLXFLYCRDJBUVELRLDUZZTPBS", "WARC-Record-ID": "<urn:uuid:e18ed8f1-65b4-4b3c-99c5-8eeb4eb4c131>", "WARC-Target-URI": "https://people.irisa.fr/Weiqiang.Wen/thesis.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e52e1de9-0ca5-4521-9d17-11e9bfb6ed3c>" }, "warc_info": "isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-19.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 72, 73, 74, 75, 96, 97, 153, 154, 182, 213, 227, 246, 275, 306, 307, 315, 316, 1146, 1147, 1921, 1922, 1947, 1948, 2077, 2078, 2104, 2105, 2194, 2195, 2246, 2247, 2539, 2540, 2627, 2628, 2935, 2936, 3007, 3008, 3591, 3592, 3940, 3941, 3997, 4009, 4143, 4279, 4398, 4399 ], "line_end_idx": [ 72, 73, 74, 75, 96, 97, 153, 154, 182, 213, 227, 246, 275, 306, 307, 315, 316, 1146, 1147, 1921, 1922, 1947, 1948, 2077, 2078, 2104, 2105, 2194, 2195, 2246, 2247, 2539, 2540, 2627, 2628, 2935, 2936, 3007, 3008, 3591, 3592, 3940, 3941, 3997, 4009, 4143, 4279, 4398, 4399, 4407 ] }
{ "red_pajama_v2": { "ccnet_original_length": 4407, "ccnet_original_nlines": 49, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.2819429934024811, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.04751848056912422, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.29144665598869324, "rps_doc_frac_unique_words": 0.4679878056049347, "rps_doc_mean_word_length": 5.33689022064209, "rps_doc_num_sentences": 80, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.144017219543457, "rps_doc_word_count": 656, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.1385318487882614, "rps_doc_frac_chars_dupe_6grams": 0.10968294739723206, "rps_doc_frac_chars_dupe_7grams": 0.0936875194311142, "rps_doc_frac_chars_dupe_8grams": 0.050271350890398026, "rps_doc_frac_chars_dupe_9grams": 0.022850610315799713, "rps_doc_frac_chars_top_2gram": 0.02513567917048931, "rps_doc_frac_chars_top_3gram": 0.01856612041592598, "rps_doc_frac_chars_top_4gram": 0.029134530574083328, "rps_doc_books_importance": -429.1106262207031, "rps_doc_books_importance_length_correction": -429.1106262207031, "rps_doc_openwebtext_importance": -226.71653747558594, "rps_doc_openwebtext_importance_length_correction": -226.71653747558594, "rps_doc_wikipedia_importance": -210.25094604492188, "rps_doc_wikipedia_importance_length_correction": -210.25094604492188 }, "fasttext": { "dclm": 0.040205538272857666, "english": 0.8999332189559937, "fineweb_edu_approx": 2.4793317317962646, "eai_general_math": 0.9977895617485046, "eai_open_web_math": 0.5859172344207764, "eai_web_code": 0.5421404838562012 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.82", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.0151", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-5,080,701,892,419,218,000
Childbirth - Post natal - emergancy caesarean Childbirth - Post natal - emergancy caesarean Emergency Caesarean A Caesarean section is a medical procedure that inlotches appearvolves cutting the abdomen and womb in order to deliver a baby. The WHO recognises that around 15% of babies are born through caesarean section. It is also known as a C-section, Caesar or CS. An emergency caesarean section is a caesarean performed once labour has commenced, where a planned or elective caesarean is scheduled to take place before your labour begins. What makes an emergency caesarean necessary? There are a few reasons why your doctor might suggest an emergency caesarean. Here are a couple of the most likely options: • Your baby’s heartbeat shows that he is not coping well with the birth, in other words, your baby is ‘distressed’. • Your cervix slows down dilating or stops altogether. • The placenta starts to come away from the wall of the womb and there is a risk of internal bleeding. • The baby does not move down into the pelvis, indicating that the pelvis is too small for the baby to get through. • You were planning a caesarean, but went into labour before the operation. Your caesarean can go ahead within a few hours of your labour starting, as long as you and your baby are well. • The labour process is going so slowly that it presents a risk to both mother and child. • Multiple babies, i. e. twins and triplets, are sometimes very difficult to deliver naturally and if multiple babies are not anticipated, an emergency caesarean might be the best option. • The baby is in the breech position, i. e. feet first, as opposed to the normal head-first positioning. Emergency caesarean risks An emergency caesarean is inherently riskier than vaginal delivery. Here are some of the risks that accompany it: • Infection of the womb or womb lining • Clots or thrombosis forming in the mother’s legs • Excessive bleeding • Damage to your womb, bladder or pelvic floor muscles • The baby may be more susceptible to breathing difficulties • Some babies are affected by the drugs given to the mother for anaesthesia during surgery What to expect during an emergency caesarean You may be given a pair of surgical stockings to wear, which will help prevent the formation of clots. Nail varnish and jewellery will be removed, and you will be shaved around your pubic area. In theatre, you’ll be given an anaesthetic or epidural. The anaesthetist will ensure you cannot feel anything before the caesarean begins. A screen is clipped up so you can’t see what is going on, a catheter will be inserted to drain your bladder, and a cut made just above your bikini line, giving the surgeon access to your womb for the caesarean. You may feel a tugging or rummaging sensation, but no pain. The baby will be delivered within around 3 - 5 minutes of the first cut, your new baby will be lifted out, checked, and the cord clamped and cut. If everything is OK, you will be able to hold your baby on your chest while the placenta is delivered and you are stitched up. You may prefer your partner to hold the baby while this is done. The whole caesarean takes around 30 minutes. You will then be moved to a recovery bay or room, and then onto a ward. A midwife will encourage you to breastfeed your baby as soon as possible. After the caesarean Your catheter will usually be left in place until the morning after the operation. You will also have an IV attached to a drip, administering medications, and if you are wearing surgical stockings they will be left on to prevent any clotting. You will be given painkillers, but your doctor, a nurse or midwife will encourage you to get out of bed to walk around as soon as possible to promote circulation and help prevent clots. Expect to stay in hospital for around 3 days and arrange to have extra help at home as you may find getting around difficult at first. This period after the caesarean is called the postpartum period and it can be really difficult for you and your family. During this period you are most vulnerable to any complications arising from the c-section and you really need to take it easy. Before leaving the hospital, talk to your doctor about pain medications that you can take at home; what doses, what frequencies, and any side effects of the drugs should be discussed. Your womb will start contracting shortly after the caesarean and this will entail a fair bit of vaginal bleeding, so make sure you have plenty of pads before you go home. You should be as inactive as possible, don’t lift anything heavier than your new baby. You should ensure you have a healthy diet, full of fibre, fresh fruit and vegetables. Hydration is also key, so try to have a water bottle with you for most of the day as this will encourage drinking. Set up your ‘baby station’ as close as possible to where you will be resting, so that you don’t have to get up that often. Notify your doctor immediately if you feel sore or feverish, as this can be a sign of infection, which needs to be treated. An emergency caesarean may also leave emotional scars, especially if you were expecting a nice, regular normal birth. Spend some time de-stressing and relaxing; you may also want to consider seeing a psychologist or psychiatrist if you have a really bad case of the blues. When to call your doctor There are a couple of instances after your caesarean where you should call your doctor immediately. What follows are a few things to keep an eye out for: • You have a very high temperature that persists • You develop a headache after the c-section and its severity doesn’t decrease • Pain that develops in the stomach or abdominal area • Vaginal discharge that has an unusual smell • Swollen and red areas on your legs • You find that passing urine (peeing) is painful or there is blood in your urine • Your breasts become very sensitive and red blotches appear If you notice any of these changes to your body occurring, especially if they happen together, then it’s time to give a medical professional a call. They say hope for the best and plan for the worst when it comes to birth, and this saying is apt. Plan for the possibility of a caesarean delivery, as well as a vaginal birth so that, no matter what happens, you will be better prepared, have fewer surprises and a greater sense of control and personal choice. Remember, your baby will be born from this experience. Be proud of yourself and the effort you are making. EmptyView
{ "url": "https://www.huggies.co.za/articles/new%20born/childbirth/emergency%20caesarean", "source_domain": "www.huggies.co.za", "snapshot_id": "crawl=CC-MAIN-2021-49", "warc_metadata": { "Content-Length": "79386", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:LPIXE4OXMX7NIEBZRRB6DZJWM7MOHZYP", "WARC-Concurrent-To": "<urn:uuid:5561bf79-cd43-4299-80e0-8a75a76eff24>", "WARC-Date": "2021-11-26T23:11:29Z", "WARC-IP-Address": "104.18.184.227", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:CICCQ6QPRTDSIVDVVFHYSIGW2WE5BSMR", "WARC-Record-ID": "<urn:uuid:c31a3171-bc9f-464b-a86d-9796739bc75e>", "WARC-Target-URI": "https://www.huggies.co.za/articles/new%20born/childbirth/emergency%20caesarean", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:19fb6d94-45fb-4d38-a0fe-710cd9fd97da>" }, "warc_info": "isPartOf: CC-MAIN-2021-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-99\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 92, 93, 113, 114, 545, 546, 591, 592, 716, 717, 835, 836, 893, 894, 999, 1000, 1118, 1119, 1308, 1309, 1401, 1402, 1592, 1593, 1700, 1701, 1727, 1728, 1842, 1843, 1884, 1885, 1938, 1939, 1962, 1963, 2020, 2021, 2084, 2085, 2178, 2179, 2224, 2225, 2475, 2476, 2770, 2771, 2977, 2978, 3170, 3171, 3362, 3363, 3383, 3384, 3813, 3814, 4197, 4198, 4553, 4554, 4842, 4843, 5363, 5364, 5389, 5390, 5544, 5545, 5596, 5597, 5678, 5679, 5735, 5736, 5784, 5785, 5824, 5825, 5909, 5910, 5973, 5974, 6123, 6124, 6541, 6542 ], "line_end_idx": [ 92, 93, 113, 114, 545, 546, 591, 592, 716, 717, 835, 836, 893, 894, 999, 1000, 1118, 1119, 1308, 1309, 1401, 1402, 1592, 1593, 1700, 1701, 1727, 1728, 1842, 1843, 1884, 1885, 1938, 1939, 1962, 1963, 2020, 2021, 2084, 2085, 2178, 2179, 2224, 2225, 2475, 2476, 2770, 2771, 2977, 2978, 3170, 3171, 3362, 3363, 3383, 3384, 3813, 3814, 4197, 4198, 4553, 4554, 4842, 4843, 5363, 5364, 5389, 5390, 5544, 5545, 5596, 5597, 5678, 5679, 5735, 5736, 5784, 5785, 5824, 5825, 5909, 5910, 5973, 5974, 6123, 6124, 6541, 6542, 6551 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6551, "ccnet_original_nlines": 88, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.48723897337913513, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.006187160033732653, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.12219644337892532, "rps_doc_frac_unique_words": 0.3911149799823761, "rps_doc_mean_word_length": 4.522647857666016, "rps_doc_num_sentences": 54, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.31553316116333, "rps_doc_word_count": 1148, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.023882899433374405, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.012711860239505768, "rps_doc_frac_chars_top_3gram": 0.02696456015110016, "rps_doc_frac_chars_top_4gram": 0.010785819962620735, "rps_doc_books_importance": -558.177001953125, "rps_doc_books_importance_length_correction": -558.177001953125, "rps_doc_openwebtext_importance": -274.7278137207031, "rps_doc_openwebtext_importance_length_correction": -274.7278137207031, "rps_doc_wikipedia_importance": -186.94447326660156, "rps_doc_wikipedia_importance_length_correction": -186.94447326660156 }, "fasttext": { "dclm": 0.021337570622563362, "english": 0.9561560750007629, "fineweb_edu_approx": 1.9355970621109009, "eai_general_math": 0.01506108045578003, "eai_open_web_math": 0.1797611117362976, "eai_web_code": 0.0009868700290098786 } }
{ "free_decimal_correspondence": { "primary": { "code": "617.62", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Surgery and Dentistry" } }, "secondary": { "code": "617.622", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Surgery and Dentistry" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-4,304,414,438,094,661,600
Is the Ferrari 458 Reliable? One of the main concerns anyone thinks about when potentially getting into supercar ownership is whether the thing is going to be reliable or not. It’s one thing saving up for years and years to be able to get yourself into a position where you might just be able to afford to buy (or finance) one. It’s another thing to be hit with a massive repair bill when something goes wrong! There are some things that you just know you have to add to the cost such as insurance, taxes and annual servicing – all of which you can have a pretty good idea about beforehand. The worry is the unexpected costs! What are the chances of something going wrong during ownership? All of a sudden, you’re hit with a $20k bill and you’re considering putting your kids on eBay. There are some cars that certainly have a better reputation for reliability than others (there’s a reason why many people used to think that Lotus stood for Lots Of Trouble Usually Serious) – however, that’s no longer the case. Indeed, it’s not the case for many supercars but what about the Ferrari 458? What can you expect to go wrong during your years of ownership? Is the Ferrari 458 reliable? The Ferrari 458 Italia is generally considered to be a reliable supercar. Despite a few problems being reported by its owners, they are not widespread and common enough for the car to be considered as unreliable. Ferrari 458 Overview The Ferrari 458 (also known as the 458 Italia) replaced the Ferrari 430 in 2009 and the model was available from this time until 2015. The 458 was powered by a 4.5 liter V8, generating over 560 hp married up with a dual-clutch 7-speed transmission. Performance wise, you won’t be surprised to hear (or I bet you probably already know) that the 458 is not slow. Capable of reaching 60 mph in just 3.4 seconds, the V8 behind you will keep pushing you along until it reaches its top-end at just over 200 mph. Is the Ferrari 458 Reliable? As you would expect, a few variants of the 458 would be available during its production. The 458 Spider became available the year after initial release, in 2010 and became very popular. The roof mechanism on the Spider takes 14 seconds to work, does not impact acceleration and only has a minor impact on top end (199 mph compared with 202 mph). In 2013, the much sought after 458 Speciale was shown-off at the 2013 Frankfurt Motor Show. Apart from quite a few changes to design and aero, the performance was increased also, reducing the 0-60 mph time to just 3 seconds. What Do We Consider Unreliable? For the purpose of this article, if we’re going to talk about how reliable a car is we need to define what we mean by ‘unreliable’. Firstly, there is no supercar out there that we could categorize as ‘unreliable’ these days. There’s just no place for them in the modern world with so much (good) competition. What we are looking for are: • Potential manufacturing defects that have required recalls and have affected the reliability of the car. • Known problems that are known in the owners’ community but haven’t been acknowledged formally by the manufacturer. • Problems with sourcing usually easy-to-get components, due to either lack of stock or the cost being prohibitive. In summary, what we want to highlight is any issues that could bite you during your ownership. These issues might happen unexpectedly, frequently, and can cause you some stress and/or financial challenges. For example, the Porsche 986 Boxster is known for Intermediate Shaft Bearing failures (otherwise known as IMS issues). If you were unfortunate enough to encounter this, it could destroy the engine and you’d be looking at a $20,000 replacement. However, this doesn’t make the car unreliable. It’s a known issue with a known fix. An example of an unreliable car would be (for instance) problems with it starting when cold or for another issue to occur so frequently you would never really know if you’re going to make it home after a long drive! What Are The Known Ferrari 458 Problems? Fortunately, with the Ferrari 458, it is fundamentally a solid car. Is there anything to watch out for? Sure, for instance: • Transmission failures – for cars built between 2010 and 2011 there have been widespread reports from owners that occasionally the gears just go ‘missing’ and a manual reset is required that can sometimes fix the issue. This has sometimes it seems been related to bearings and has a crippling $25,000 fix associated with it! • Crankshaft – there was a recall for a crankshaft problem that has the potential to cause engine failure. • Fender-related fire risk – 2010 Ferrari 458’s were part of a recall due to adhesive problems related to the rear fender. It was possible that during high temperatures the adhesive used can catch fire and spread to the engine and lead to total car destruction. • Roof problems in the spyder – part of the mechanism that controls the roof can jam (not good if it’s just started raining) and also some people have complained of water seeping in through the roof, causing related damage to the interior. • Airbag problems – Ferrari issued a recall (source) related to an urgent airbag problem in certain 458’s. The problem was related to the passenger airbag and due to a defective inflator can basically send dangerous metallic fragments inside the cabin if deployed. The above seems like quite a lot of things that can potentially go wrong but really it’s not. The above doesn’t exactly make the 458 Italia unreliable. These are known issues (although the transmission failures can seem to be a little random) and most can be fixed. The important thing to do is establish when you’re looking for your car whether any of these issues have already occurred and whether they have been fixed or not. This is an advantage of buying a second-hand 458 with over 15,000 or so miles on it. You’ll know there’s a good chance that these problems will most likely have already occurred by this point and will have already been fixed for you! How Much Will The Ferrari 458 Cost You Per Year? The 458 Italia can cost you quite a bit of money if something goes wrong but in fairness, major problems are rare and you’ll be unlucky if something major does fail. However, there are some costs that you can’t escape, such as: Ferrari 458 Steering Wheel • Tires – a set of 4 P Zero’s will cost you in the region of $2k – however, you can get 10,000 miles out of these unless you’re on the track every weekend so this is probably not that bad. • Servicing – expect (for regular services) around $1200-$1500 annually, although you can get them a lot lower if you look around. • Depreciation – tricky one this and depends on how much you spend on the 458 and what year you got as well as other things, such as mileage and options. However, I think if you expect to lose around $5k a year in depreciation then you won’t be far wrong. • The 458 Italia averages around 14 mpg, so errr that’s not a lot of miles. However, you don’t buy a supercar for its economy, right? How much it costs will, of course, depends on how many miles you do. Average around $500 a year though. • Unexpected problems – impossible to quantify but if you have an extra $2k left to one side in the event of problems you should be able to cover most (if not all) things. So, when you look at the above you may well come to the same conclusion as I, the Ferrari 458 Italia doesn’t cost that much to run. What can cost you the money is the initial purchase price and any unexpected surprises. What’s the current cost of a 458? Here are a few examples of current Ferrari 458 prices: • 2011 Ferrari 458 Coupe with 20,000 miles – $159k • 2010 Ferrari 458 Coupe with 14,000 miles – $169k • 2015 Ferrari 458 Spider with 20,000 miles – $209k • 2014 Ferrari 458 Coupe with 3,500 miles – $215k • 2015 Ferrari 458 Speciale with 1,000 miles – $650k Of course, there are many variables – particular service history records and what options the examples have but you can see how much more expensive the Speciale is! Ferrari 458 Conclusion The Ferrari 458 Italia can be described as a reliable car in general. Yes, it has been known for some problems in the past, particularly to do with its transmission. However, these are known and do not occur frequently enough to classify the car as ‘unreliable’. In fact, it’s difficult to think of any supercar that has been manufactured in the last decade that could really be classed as unreliable. There’s no reason for it these days and any manufacturer that suffered from this reputation would soon lose sales to numerous other competitors. We are spoilt for choice these days with supercars at this price point. Whether it’s Ferrari, Lamborghini, Porsche, McLaren or someone else – none of them are unreliable as such! If you’re wondering whether you can afford a supercar then check out my article. Many people are surprised to learn that after looking at the numbers they can actually buy one for themselves! Matt Pettitt Since I've been able to walk I think I've had a preference to be sitting between four wheels instead of standing on my two legs! I've owned many different cars in my life. A 1964 purple Beach Buggy, 1967 VW Baja Bug, 1973 V8 Land Rover, an S1 Lotus Elise, an S2 Lotus Elise and an S2 Lotus Elise Sport 190. A Porsche Boxster 3.5S and now a Lamborghini Gallardo. I've learned a lot in this time and this site is my outlet to share everything I know about my favorite subject...SUPERCARS! Recent Content © 2020 Copyright Supercar Pro
{ "url": "https://supercarpro.com/is-the-ferrari-458-reliable/", "source_domain": "supercarpro.com", "snapshot_id": "crawl=CC-MAIN-2020-29", "warc_metadata": { "Content-Length": "73260", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:MONVQTP3LGLTU4GP4WXQROYHHVY7KEW4", "WARC-Concurrent-To": "<urn:uuid:42d549b6-9381-4b5b-bea5-23a9fe3d5bf1>", "WARC-Date": "2020-07-08T13:00:08Z", "WARC-IP-Address": "194.1.147.60", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:R2FVZGGZURQTDO6V3YCBN6NC2VZDWU6U", "WARC-Record-ID": "<urn:uuid:34719851-0eca-480d-a2a6-042b37449934>", "WARC-Target-URI": "https://supercarpro.com/is-the-ferrari-458-reliable/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:8e6f1cef-f890-4ff1-b895-cb674d756e5d>" }, "warc_info": "isPartOf: CC-MAIN-2020-29\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-140.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 29, 30, 31, 413, 414, 788, 789, 1158, 1159, 1401, 1402, 1423, 1424, 1673, 1674, 1931, 1932, 1961, 1962, 2308, 2309, 2534, 2535, 2567, 2568, 2906, 2907, 3016, 3135, 3253, 3254, 3788, 3789, 4005, 4006, 4047, 4048, 4172, 4173, 4501, 4610, 4874, 5116, 5383, 5384, 5650, 5651, 6048, 6049, 6098, 6099, 6327, 6328, 6355, 6546, 6679, 6937, 7177, 7351, 7352, 7572, 7573, 7607, 7608, 7663, 7664, 7717, 7770, 7824, 7876, 7931, 7932, 8097, 8098, 8110, 8111, 8122, 8123, 8670, 8671, 8850, 8851, 9043, 9044, 9057, 9058, 9545, 9546, 9561, 9562 ], "line_end_idx": [ 29, 30, 31, 413, 414, 788, 789, 1158, 1159, 1401, 1402, 1423, 1424, 1673, 1674, 1931, 1932, 1961, 1962, 2308, 2309, 2534, 2535, 2567, 2568, 2906, 2907, 3016, 3135, 3253, 3254, 3788, 3789, 4005, 4006, 4047, 4048, 4172, 4173, 4501, 4610, 4874, 5116, 5383, 5384, 5650, 5651, 6048, 6049, 6098, 6099, 6327, 6328, 6355, 6546, 6679, 6937, 7177, 7351, 7352, 7572, 7573, 7607, 7608, 7663, 7664, 7717, 7770, 7824, 7876, 7931, 7932, 8097, 8098, 8110, 8111, 8122, 8123, 8670, 8671, 8850, 8851, 9043, 9044, 9057, 9058, 9545, 9546, 9561, 9562, 9591 ] }
{ "red_pajama_v2": { "ccnet_original_length": 9591, "ccnet_original_nlines": 90, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.46299055218696594, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.010928959585726261, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.18827620148658752, "rps_doc_frac_unique_words": 0.3499999940395355, "rps_doc_mean_word_length": 4.474705696105957, "rps_doc_num_sentences": 89, "rps_doc_symbol_to_word_ratio": 0.0004967700224369764, "rps_doc_unigram_entropy": 5.626312255859375, "rps_doc_word_count": 1700, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.009070590138435364, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.02629156969487667, "rps_doc_frac_chars_top_3gram": 0.017089519649744034, "rps_doc_frac_chars_top_4gram": 0.005915599875152111, "rps_doc_books_importance": -992.1023559570312, "rps_doc_books_importance_length_correction": -992.1023559570312, "rps_doc_openwebtext_importance": -518.7211303710938, "rps_doc_openwebtext_importance_length_correction": -518.7211303710938, "rps_doc_wikipedia_importance": -354.55352783203125, "rps_doc_wikipedia_importance_length_correction": -354.55352783203125 }, "fasttext": { "dclm": 0.02620619907975197, "english": 0.9670630693435669, "fineweb_edu_approx": 1.7022745609283447, "eai_general_math": 0.33599454164505005, "eai_open_web_math": 0.3187413811683655, "eai_web_code": 0.010161220096051693 } }
{ "free_decimal_correspondence": { "primary": { "code": "629.222", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "" } }, "secondary": { "code": "629.22", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "" } } }, "bloom_cognitive_process": { "primary": { "code": "5", "label": "Evaluate" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "14", "label": "Reviews/Critiques" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "16", "label": "Personal Blog" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
6,752,641,971,439,257,000
How Really does CBD Petroleum Make A person Fully feel? The actual Highly Effortless Truth Approximately This particular Restorative Plant Complete you’ve always wondered how must CBD oil have you feeling? It could be a mind-boggling detail take into consideration, notably if you didn’t over heard substantially about it. However similar to many other matters in their life, that product is in fact increasing for attractiveness found in the field of complementary healthcare in addition to medicinal treatments. As a result, what is a the idea? The cannabinoid, may be a natural and organic element through cannabis. It happens to be linked to THC, which is certainly the chief additive chargeable for marijuana’s psychoactive properties. Having said that, far apart from THC, CBD lacks the benefit over the mental performance in addition to is incredibly safe to use, and currently being non-addictive. Plenty of people, just who know about the use of cannabinoids similar to THC, have no need for a lot of simpler the fact that CBD is amazingly different. Different from THC, which often come with an volatile problem on the body, your CBD has no effect on serotonin levels or bring about particular fields such as aspect effects. CBD, having said that, is perfectly non-psychoactive in addition to creates a full coordinate of different, good negative effects which can truly enhance a lot of tasks of the user’s life. In order to understand this is how CBD petroleum cause you to feel, you must know a flower garden negative effects involving making use of marihuana, and also comprehending the way CBD will peaceful all the scared system. The foremost and most apparent, how can CBD lube make you feel, might be that it can offer you a wide array of completely different positive aspects that may can certainly make anybody truly feel a great deal superior, specifically after they are susceptible to certain clinical conditions. All of these ailments comprise of tension, uninterrupted sleep disorder, joint, swift changes in moods, together with sleeplessness. To know how must CBD acrylic make you feel, a person must understand ways cannabinoids work in typically the body. THC, which could provide a wide array of side effects consisting of euphory, paranoia, as well objectionable spirits differences, actually totally does far more than simply «great» you up. In actual fact, THC and then CBD simultaneously lead to the particular «excessive», which will is simply head additive this accounts for a real outcomes of pot, such as forgetfulness and then lessen inhibitions. Hence, check website how does CBD make you feel? It will also help you feel more desirable, settle back, possibly be a lesser amount of uneasy, get to sleep greater, together with past experiences far better moods. Categorías: Main 0 commentarios Deja un comentario Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *
{ "url": "http://psicologacastillodelgado.com/2020/02/03/how-really-does-cbd-petroleum-make-a-person-fully/", "source_domain": "psicologacastillodelgado.com", "snapshot_id": "crawl=CC-MAIN-2021-17", "warc_metadata": { "Content-Length": "53539", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:F3OIZZZJBOAOFWGNZRHGXHRCT7AQJLLB", "WARC-Concurrent-To": "<urn:uuid:d9046985-c00b-409b-8271-6a88866b2381>", "WARC-Date": "2021-04-22T03:36:28Z", "WARC-IP-Address": "147.124.221.138", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:V7ZLPI44FFU3763SEUDWA7SHFP2MCSPJ", "WARC-Record-ID": "<urn:uuid:c497b16d-05a2-4d92-9c07-4313e8d6d069>", "WARC-Target-URI": "http://psicologacastillodelgado.com/2020/02/03/how-really-does-cbd-petroleum-make-a-person-fully/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2b32e81e-7180-4466-88e5-3521b00ed9bd>" }, "warc_info": "isPartOf: CC-MAIN-2021-17\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-253.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 139, 140, 515, 516, 908, 909, 1238, 1239, 1650, 1651, 2075, 2076, 2592, 2593, 2808, 2809, 2826, 2827, 2842, 2843, 2862, 2863 ], "line_end_idx": [ 139, 140, 515, 516, 908, 909, 1238, 1239, 1650, 1651, 2075, 2076, 2592, 2593, 2808, 2809, 2826, 2827, 2842, 2843, 2862, 2863, 2961 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2961, "ccnet_original_nlines": 22, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.42314645648002625, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03435805067420006, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1265822798013687, "rps_doc_frac_unique_words": 0.5639412999153137, "rps_doc_mean_word_length": 5.0649895668029785, "rps_doc_num_sentences": 21, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.200953006744385, "rps_doc_word_count": 477, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.01158939953893423, "rps_doc_frac_chars_top_3gram": 0.014900660142302513, "rps_doc_frac_chars_top_4gram": 0.009933769702911377, "rps_doc_books_importance": -279.6964416503906, "rps_doc_books_importance_length_correction": -279.6964416503906, "rps_doc_openwebtext_importance": -162.4134979248047, "rps_doc_openwebtext_importance_length_correction": -162.4134979248047, "rps_doc_wikipedia_importance": -114.35851287841797, "rps_doc_wikipedia_importance_length_correction": -114.35851287841797 }, "fasttext": { "dclm": 0.12123274803161621, "english": 0.943084716796875, "fineweb_edu_approx": 1.5612378120422363, "eai_general_math": 0.03268009051680565, "eai_open_web_math": 0.1555948257446289, "eai_web_code": 0.0009099200251512229 } }
{ "free_decimal_correspondence": { "primary": { "code": "615.3", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Materia medica, Drugs, and Pharmacy" } }, "secondary": { "code": "615.857", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Materia medica, Drugs, and Pharmacy" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "6", "label": "Promotional/Advertisement" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "2", "label": "Click Here References" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "1", "label": "No Reasoning" } }, "technical_correctness": { "primary": { "code": "2", "label": "Partially Correct" }, "secondary": { "code": "6", "label": "Not Applicable/Indeterminate" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-807,445,090,072,905,000
Question: How Do I Create A PR In Bitbucket? How do I create a PR in Jira? To create a pull request, you need to have made your code changes on a separate branch or forked repository.From the open repository, click + in the global sidebar and select Create a pull request under Get to work.Fill out the rest of the pull request form. Click Create pull request.. Why is it called pull request? Pull requests are a feature specific to GitHub. They provide a simple, web-based way to submit your work (often called “patches”) to a project. It’s called a pull request because you’re asking the project to pull changes from your fork. … You might also find GitHub’s article about pull requests helpful. Is pull request a git feature? While pull requests are not a core feature of Git, they are commonplace when it comes to collaborating with Git hosting services. They are especially necessary when working with open-source projects. … Most open-source projects have a maintainer who can control which changes are approved and merged into the project. What is PR in bitbucket? Pull requests are a feature that makes it easier for developers to collaborate using Bitbucket. … Once their feature branch is ready, the developer files a pull request via their Bitbucket account. This lets everybody involved know that they need to review the code and merge it into the master branch. How do I make a PR request? In summary, if you want to contribute to a project, the simplest way is to:Find a project you want to contribute to.Fork it.Clone it to your local system.Make a new branch.Make your changes.Push it back to your repo.Click the Compare & pull request button.Click Create pull request to open a new pull request.
{ "url": "https://hotmailentrarlogin.info/qa/question-how-do-i-create-a-pr-in-bitbucket.html", "source_domain": "hotmailentrarlogin.info", "snapshot_id": "crawl=CC-MAIN-2021-04", "warc_metadata": { "Content-Length": "24481", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:3UX5LY5XMUPLKF3KRI4XZZ5QWLIKLLPQ", "WARC-Concurrent-To": "<urn:uuid:6165590f-27ef-4e85-801d-be850d03c243>", "WARC-Date": "2021-01-27T16:46:04Z", "WARC-IP-Address": "87.236.16.33", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:CWICKVZHTVZYN3NZZQVOYTQCJZ5J2F3M", "WARC-Record-ID": "<urn:uuid:b6d908c4-72e0-4a36-98ef-bfc5c778955c>", "WARC-Target-URI": "https://hotmailentrarlogin.info/qa/question-how-do-i-create-a-pr-in-bitbucket.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:74515182-216a-460a-a88a-76accb4cc851>" }, "warc_info": "isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-12.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 45, 46, 76, 77, 336, 337, 365, 366, 397, 398, 703, 704, 735, 736, 1054, 1055, 1080, 1081, 1384, 1385, 1413, 1414 ], "line_end_idx": [ 45, 46, 76, 77, 336, 337, 365, 366, 397, 398, 703, 704, 735, 736, 1054, 1055, 1080, 1081, 1384, 1385, 1413, 1414, 1723 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1723, "ccnet_original_nlines": 22, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.37883007526397705, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.022284120321273804, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1420612782239914, "rps_doc_frac_unique_words": 0.47457626461982727, "rps_doc_mean_word_length": 4.647457599639893, "rps_doc_num_sentences": 28, "rps_doc_symbol_to_word_ratio": 0.00835654977709055, "rps_doc_unigram_entropy": 4.476774215698242, "rps_doc_word_count": 295, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.05835156887769699, "rps_doc_frac_chars_dupe_6grams": 0.024799419566988945, "rps_doc_frac_chars_dupe_7grams": 0.024799419566988945, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.08825674653053284, "rps_doc_frac_chars_top_3gram": 0.035010941326618195, "rps_doc_frac_chars_top_4gram": 0.017505470663309097, "rps_doc_books_importance": -143.0393524169922, "rps_doc_books_importance_length_correction": -132.18504333496094, "rps_doc_openwebtext_importance": -97.56370544433594, "rps_doc_openwebtext_importance_length_correction": -97.56370544433594, "rps_doc_wikipedia_importance": -58.046451568603516, "rps_doc_wikipedia_importance_length_correction": -50.69445037841797 }, "fasttext": { "dclm": 0.967678964138031, "english": 0.9109309315681458, "fineweb_edu_approx": 1.7659401893615723, "eai_general_math": 0.01696931943297386, "eai_open_web_math": 0.015868190675973892, "eai_web_code": 0.9251622557640076 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.135", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.776", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "18", "label": "Q&A Forum" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-5,950,322,666,609,734,000
Shuffle App Creation in Python Documentation for app development with Python (as opposed to creating them with the app editor, e.g. with an OpenAPI specification). Table of contents App development process This page is about how to develop a new Shuffle app. Want to know how to decide whether to make something new? Checkout the process document and then come back here. Prerequisites • App creator: Understanding of HTTP • Python app: Base understanding of Python 3.x Introduction Apps are how work is done in Shuffle. They receive a piece of data, whether JSON or string, performs some action, then returns data back to the user. Apps are mostly community-made, and we aim to support that the best way we can. We allow apps to be made as Swagger/OpenAPI specifications using the app creator OR directly with Python. Each app contains multiple actions, which again can have multiple parameters. More about apps and how they work here. The premise behind all apps that run in Shuffle, is that they each run in an isolated Docker container, for control, security and scalability. You provide arguments to an app in a Shuffle workflow, and when the workflow is run, your app is reached in the control flow, it will be launched as a new container. Shuffle then sends the apps argument data, and the container destroyed when the app's work is completed. The underlying design of Apps in Shuffle are based on WALKOFF with minor differences. Most of the documentation below will therefore be close to their approach. PS: There is no way of creating a Python app easily for the cloud yet. Apps released on Github will eventually be available on https://shuffler.io too. More about apps Why create a custom app? There are many prebuilt apps in Shuffle, all performing unique actions. There may however be an integration you need that doesn't exist yet. You may either make this yourself or commision this to be made through Shuffle - we're always looking to expand our repository of apps! Python or the App Creator A normal question we get asked all the time - should I use the app creator or Python directly? Find out by answering these questions (will be expanded): 1. Is the app a HTTP API? Use the App Creator. 2. Does the app need to perform custom actions? Use Python. How apps are built When you build an app in Shuffle, it goes through a validation process before building the app. This process ends in a fully working Docker Image containing your apps, pointing to the original app specification to ensure users can use it in the front-end as well. App Creator Instructions The app creator in Shuffle is built to handle any integration for HTTP apps you may think of. It's based on OpenAPI, and will generate the app using the Python SDK in the background. Here's an example from a workshop Getting started If you have an OpenAPI config already • Click the "Generate from OpenAPI", paste the URL or data for your OpenAPI specification, then validate, before submitting. This should show you the app creator. ... If you want to create an app UI overview Creating or editing an app in Shuffle is made to be as simple and fast as possible. These are a few of the main main things in the UI. Apps view 6 • Name: The app's name. Visible to everyone. • Description: A description for the app. • Image: An image for the app - should be square. • Base URL: The BASE URL for the app. Example: https://shuffler.io. Should NOT end with a / • Authentication: Authentication for the REST API. - No authentication: Means no authentication for the user - API key: An API-key to be put in a header or query - Bearer Auth: Wants a "Bearer token" from the user. Uses the "Authorization" header field. - Basic Auth: Uses Basic auth. Requires username and password from a user. - Oauth2: TBD • Extra configuration items: These are extra headers or queries the user HAS to provide when using the app. • Actions: Where you add the paths for each endpoint. • Categories: The category the app belongs to. Nothing fitting? Set it to "Other" • Tags: Add 1-5 tags that seem to fit. Authentication #There are many ways to authenticate Shuffle apps. The most important thing is to understand how authentication is reflected in a Workflow. Let's use "GreyNoise" as an example. GreyNoise uses the URL "https://api.greynoise.io" and authentication type of "API key" with the header "key". Apps view 8 When authenticating this app in a workflow, we will therefore see two fields - "API key" and "URL". As you can see, the URL is auto-filled, but editable, as some services have configurable URL's. Apps view 12 If you want extra variables added to the required authentication, you can add them with the "Extra configuration items". The defined header or query will then be added to every request from the user. Apps view 14 Actions Actions are the meat of how apps actually work. The action part of the app creator provides the ability to control each individual endpoint very specifically. Action List information: • Click an existing action to edit it • Click "Copy" on the right side to duplicate the action • Click "Delete" on the right side to delete the action • If there is an error mark in the action, it won't be built into the app. Here's what it entails: • Name: The name you want the user to see. We recommend using a VERB at the start of it, e.g. "Get tickets" • Description: Further explain what the action is for. • Request - Dropdown: GET, POST, PUT, PATCH, DELETE, HEAD, CONNECT. Choose what kind of request to make. • URL path: The path to use with the base URL. - Must EITHER start with / (path) or be a full URL to have a custom endpoint. - Use {variable} to make a REQUIRED variable - TIP: If you have a CURL example, paste it in here and we'll try to autofill everything • New query button: Add a query to the request. The user can add more queries from the workflow. - Can be set to be required/not required • Headers: Add headers for the request. - Editable by users from the workflow view • Request body: the body to send - Only available in POST, PUT, PATCH - The data you put here is used as a placeholder for the user to edit - Add ${variable_name} to it to add a variable. This makes it so the user CANT see the whole body, JUST the variables • Example response: An example response from the endpoint. This is important to ensure usability of the action is easy. - Used by autocompletion methods in Shuffle. Also shown as example to the user Apps view 13 File upload You can add a file upload parameter to POST requests Apps view 15 Building Building the app is as straight forward as clicking the "Save" button. This builds the Docker image, and makes the app available in the App and Workflow UI for your organization to use. We recommend building often to ensure you avoid losing any progress. PS: The first time you build an app, it may take up to a few minutes. Do NOT update the app while it's building, as your progress will may be lost. Testing When building is done, you may want to test the app that you've built. This can currently be done by creating or editing a workflow, before finding the app in the left sidebar as you've always used apps. PS: We are adding functionality for testing each app directly within the app creator Editing an app You may want to change an app later. This can be done by using the /apps UI to find the app, selecting the app, then clicking the "Edit" button. Apps view 7 Python Instructions Apps using Python can do pretty much anything you can do on a computer. As an example, most utility functions of Shuffle itself are written with as functions of Python in the app "Shuffle-Tools" In our example, we are going to develop an app that connects to an API for Office365, pulls some log data and returns it as a JSON data structure. We first think about the 3 primary elements: • What actions / functions will we create? We will have a function to poll the last 10 minutes of audit logs from the Office API. We will have a function to poll the last 23 hours of audit logs from the Office API -- testing only purposes. • What arguments are needed for the app to run? We need some arguments for authentication (based on Office365 authentication, we have planType, tenantID, clientID, clientSecret). Note that your app may also receive json_data structure arg as part of a prior app action -- you are not limited here. • What is the output data? * The app outputs a JSON data structure that contains one audit log entry per JSON object. With our 3 elements in mind, you can build the script on your own. This example is Python3, but some additional work would allow any app type/language. For now, the expectation is that you would build this in Python3. Build your Python functions with the expected arguments, and ensure they return the expected output. Once the code works in your environment, you can then integrate it into Shuffle's apps directory to integrate as an app. Don't forget to document your app in the docs.md file in each version's directory (see below)! Utility functions The Python SDK has a couple of utility functions and data you can utilize. These are as follows: # Basic data self.url # The URL to interact with for file and cache control self.base_url # The URL to send results to. MAY point to a Worker. self.action # The current action being executed self.authorization # The authorization key for current execution self.current_execution_id # The current execution ID self.full_execution # All data for current execution self.start_time # The start time for this function # Utility functions self.get_file(file_id) # Get a file from the backend (v0.8.60+) self.set_files(file_id) # SETS multiple files, returns ids (v0.8.60+) self.get_file_namespace(namespace) # Get ALL files for a namespace (v0.9.11+) self.get_cache(key, value) # Get an item from key:value store (v0.8.97+) self.set_cache(key, value) # SETS cache in the key:value store (v0.8.97+) Example file API usage: filedata = [{"filename": "test.txt", "data": "this is the data in the file"}] fileret = self.set_files(filedata) file_id = "" if len(fileret) > 0: file_id = fileret[0] filedata = self.get_file(file_id) print(filedata) # > [{"filename": "test.txt", "data": "this is the data in the file"}] Example cache API usage: value = "THIS IS SOME DATA I WANT TO CACHE" key = "cache_key" cacheret = self.set_cache(key, value) if cacheret["success"] == True: cache_get_ret = self.get_cache(key) print(cache_get_ret) # > { # "key": "cache_key", # "value": "THIS IS SOME DATA I WANT TO CACHE" # } Directory structure With your Python script built, we must build a directory structure, some metadata files and modify a base app.py file to run your code from Shuffle. In your shuffle server, there is a shuffle-apps directory, typically under the top level dir where you cloned the github repo. /Shuffle/shuffle-apps/ This directory contains a list of folders, one per app in Shuffle. The minimal directory structure for a Shuffle app is as follows: Shuffle +-- shuffle-apps +-- app_name (virustotal) +-- version_number (1.0.0) |-- api.yml # Has the full app configuration - must match app.py |-- Dockerfile # Contains Shuffle build instructions |-- docs.md # Your documentation of this app in markdown format |-- requirements.txt # Extra packages to be used by the app +-- src +-- app.py # The base python file for everything related to your application +-- yourcustom_app.py # More complex apps can have an entire directory stucture, imported and called by app.py +-- another_app_1 +-- another_app_2 There is a template app called python-playground that we will clone and edit. First make your app folder. Note: This folder should not contain spaces. cd /Shuffle/shuffle-apps mkdir office365mgmt cd office365mgmt cp -R /Shuffle/shuffle-apps/python-playground/* . The above will make your app folder and copy the template files from python-playground to your app. Upload your python code files to the /src/ directory of your app's folder. Now that your app's .py script is uploaded under /Shuffle/shuffle-apps/office365mgmt/src, you'll tell Shuffle how to use it. We will modify 4 files: • api.yaml • docs.md • requirements.txt -- Specify any modules that your app uses, which will be installed via pip • src/app.py -- The base app that is called by Shuffle, which in turn will call your python script's functions api.yaml api.yaml is what provides Shuffle information about your app. Here we define your app's name, description, author info, actions (functions available) and the parameters that each function takes. This example shows the office365mgmt app settings, but feel free to explore other app's api.yaml to see other obscure options. • name: Office365 Mgt API -- This is your app's display name as seen in Shuffle GUI. You can put whitespace here, but _ may be better • description: Some description -- Your app's description that will display in the Shuffle GUI • contact_info: If you are maintaining this, please share your details with users app_version: 1.0.0 name: Office365 Mgt API description: Collect AzureActiveDirectory,Exchange,Sharepoint,General, DLP audit logs contact_info: name: "@RobertEvans" url: https://shuffler.io email: [email protected] Authentication Not all apps need this step, but if yours requires a key, secret, or password, it is recommended to use a specialized "authentication" declaration in api.yaml, so those credentials are stored safely and not displayed in cleartext in your Shuffle workflow. Here I define that my app requires authentication and a list of parameters, which is a list of arguments specified by -name. The name value can be anything you want, but note this is the name of the argument when passed to app.py and ultimately to your app. My app expects 4 arguments that should be stored as an authentication object. When this app is run, this credential object once configured in Shuffle will be sent to the app to use. My first argument is a string called "planType". When the app is used in a workflow, this would be populated by workflow parameters and it would get sent to the app to use (e.g. "Enterprise"). • name: case sensitive authentication argument name • description: The description should display common values for this argument • example: The example is a placeholder syntax in absence of a value in user interface. • required: specifies whether it is mandatory to run the app • schema: The type of variable can be specified, string is the only one tested but ideally any type could be used here. You can also do type casting in your app from string later. authentication: required: true parameters: - name: planType description: Enterprise, GCC , GCCHigh, DoD example: "Enterprise" required: true schema: type: string - name: tenantID description: xxxx-xxxx-xxxx-xxxx example: "xxxx-xxxx-xxxx-xxxx" required: true schema: type: string - name: clientID description: xxxx-xxxx-xxxx-xxxx example: "xxxx-xxxx-xxxx-xxxx" required: true schema: type: string - name: clientSecret description: xxxx-xxxx-xxxx-xxxx example: "*****" required: true schema: type: string Actions Actions define the functions of your app, the args it accepts and the options available (static list of values for a given arg). • name: the python function name • description: string description of the function • parameters: The args the function accepts, note this is in addition to the authentication args specified above. Note that one value, json_data, seems to be sent even if I don't need it, so I account for it, although it is unused at this time. You could send a JSON object here. This app has 1 function (action) called run_o365poller. This app only pulls logs, so it is limited. The app's single function takes 2 args (besides the 4 from the authentication included above for every function), which are a string json_data arg and string PollInterval. The PollInterval string arg has a dropdown selection in GUI, listed by options, of poll_10min or poll_23hours. This is one method to give clients a limited set of options for arg values. The json_data structure, although unused, can insert any value from a prior app or input. actions: - name: run_o365poller description: Run Office365 audit poller for defined interval parameters: - name: json_data description: The JSON to handle required: false multiline: true example: 'No args for now, insert credentials and get returned data' schema: type: string - name: PollInterval description: The selected Python function to run required: true multiline: true example: '1' options: - poll_10min - poll_23hours schema: type: string returns: schema: type: string Logos The app's logo can be encoded here using a base64 encoded representation of the image, listed after large_image, see example below, but omitted for brevity: large_image: data:image/jpg;base64,/9j/4AAQSkZJR docs.md Use this file to document your app. This includes any prerequisites for using it as well as what the actions are for and how specific data objects are handled. Until we have created a nice documentation template, here's an example you can use. requirements.txt This is your standard python module list that will get installed on Docker container launch src/app.py Now that your api.yaml file is modified, there is a base app.py script that is called from Shuffle when your app is run. This script will receive the configured arguments and options configured in your Shuffle workflow for the given app. You must handle this appropriately and pass the arguments to the appropriate function. Note that we can handle this many ways. You can: • Build your entire app into app.py, and expand with logic to run the right function requested • Put minimal code in app.py to call your python script app.py calls office365poller.py (imported into app.py) When our Office365 app is called, Shuffle assumes that app.py has an inherited class object containing a function matching the ones in our api.yaml file: 1. Shuffle workflow starts 2. Your configured app is called 3. app.py's PythonPlayground.run() function is called. This then runs the selected function name and supplies the arguments. 4. We then parse the arguments, and run the appropriate function calling our script. This is where many things are possible, I'll post the code below, but will describe it in detail. class PythonPlayground(AppBase): __version__ = "1.0.0" app_name = "Office365_Mgt_API" # this needs to match "name" in api.yaml def __init__(self, redis, logger, console_logger=None): """ Each app should have this __init__ to set up Redis and logging. :param redis: :param logger: :param console_logger: """ super().__init__(redis, logger, console_logger) def run_me_1(self, planType,tenantID,clientID,clientSecret): #Poll last 10 min Office365 #Parse json_data with key value data #planType = json_data['planType'] #tenantID = json_data['tenantID'] #clientID = json_data['clientID'] #clientSecret = json_data['clientSecret'] pollInterval = 10 #Assume minutes return office365poller.pollOffice(planType,tenantID,clientID,clientSecret,pollInterval) def run_me_2(self,planType,tenantID,clientID,clientSecret): #Poll last 23 horus or 1380 min Office365 #Parse json_data with key value data #planType = json_data['planType'] #tenantID = json_data['tenantID'] #clientID = json_data['clientID'] #clientSecret = json_data['clientSecret'] pollInterval = 1380 #Assume minutes return office365poller.pollOffice(planType,tenantID,clientID,clientSecret,pollInterval) def run_me_3(self, json_data): return "Ran function 3" # Write your data inside this function async def run_o365poller(self, planType,tenantID,clientID,clientSecret, PollInterval,json_data): # It comes in as a string, so needs to be set to JSON try: #json_data = json.loads(json_data) #We are not using json_data structure at this time, getting creds directly pass except json.decoder.JSONDecodeError as e: return "Couldn't decode json: %s" % e # These are functions switcher = { "poll_10min" : self.run_me_1, "poll_23hours" : self.run_me_2, } func = switcher.get(PollInterval, lambda: "Invalid function") return func(planType,tenantID,clientID,clientSecret) if __name__ == "__main__": asyncio.run(PythonPlayground.run(), debug=True) Our app's api.yaml specifies we have a function called "run_o365poller" that accepts our 4 authentication args + 2 additional args (unused json_data and PollInterval), all string values. In order for the app to run, app.py must have an async function the same name as each function in api.yaml. We only have one above. Note that I intentionally left some commented json handling in place to show other ways to get args, you could send a json structure into the function for parsing, but should only be done for non-privileged info. The authentication data comes in as separate args. Lastly, ensure your script returns the data you require, after mine is processed, I return a singular JSON array, with one JSON object per log entry. Another app will be written to parse this and take some action on this data, or it could simply be expanded on this app. I have the function below, as specified in my api.yaml, that accepts the args I expect. From this script, I run my poll script, with different args based on the value of arg PollInterval. # Write your data inside this function async def run_o365poller(self, planType,tenantID,clientID,clientSecret, PollInterval,json_data): Hotloading your app Once your app has been tested, you've created the necessary metadata files and directory structure under your shuffle-apps folder, there is no need to restart your containers! Shuffle has an app hot reloading feature in the GUI. Go to Apps on the top left hand tool bar of the GUI, and then look for a Double Arrow refresh. Give the system 20 or so seconds, and you'll see a pop up saying it was successful. Once complete, any workflows you have that use the existing app, you'll have to delete old versions of the app and re-add them in the workflow. Publishing your app Just made an app and want others to get access to it? Here's how to get it in the hands of everyone: OpenAPI: OpenAPI apps are by design very easy to build and share - both inside and outside the Shuffle ecosystem. 1. Go to /apps in your instance (cloud/onprem) 2. Find the app you've just made! 3. Click publish. App Creator Python: After making an app in Python, here's the steps to get it to everyone 1. Fork the Shuffle-apps repo: https://github.com/frikky/shuffle-apps 2. Download your forked repo 3. Copy your new app to the folder 4. Make a pull request to the original repo! Both of these methods makes your app highlighted on https://shuffler.io to be used by hundreds if not thousands of organizations. Debugging As Shuffle has a lot of individual parts, debugging can be quite tricky. To get started, here's a list of the different parts, with the latter three being modular / location-independent. TypeContainer nameTechnologyNote Frontendshuffle-frontendReactJSCytoscape graphs & Material design Backendshuffle-backendGolangRest API that connects all the different parts Databaseshuffle-databaseGoogle DatastoreHas all non-volatile information. Will probably move to elastic or similar. Orborusshuffle-orborusGolangRuns workers in a specific environment to connect locations. Defaults to the environment "Shuffle" onprem. Workerworker-idGolang Deploys Apps to run Actions defined in a workflow app sdkappname_appversion_idPythonUsed by Apps to talk to the backend worker-8a666e4f-e544-440e-bf0f-4220e7cc9e25 Execution debugging Execution debugging might be the most notable issue you might explain. This is because there are a ton of reasons that it might crash. Before going into techniques to find what's going on, you'll need to understand what exactly happens when you click the big execution button. Frontend click -> Backend verifies and deploys executions -> (based on environments) orborus deploys a new worker -> worker finds actions to execute -> your app is executed. 1. A workflow is executed 2. The backend verifies whether you can execute and deploys to environment 3. Orborus is listening to environment and deploys worker if it's the correct one 4. Worker deploys actions if they have the right environment 5. App executes and returns data back to the execution As previously stated, a lot can go wrong. Here's the most common issues: • Networking (firewalls / proxies) • Badly formed apps. • Bad environment General debugging This part is mean to describe how to go about finding the issue you're having with executions. In most cases, you should start from the top of the list previously described in the following way: 1. Find out what environment your action(s) are running under by clicking the App and seeing "Environment" dropdown. In this case (and default) is "Shuffle". Environments can be specified / changed under the path /admin Check execution 3 2. Check if the workflow executed at all by finding the execution line in the shuffle-backend container. Take note that it mentions environment "Shuffle", as found in the previous step. docker logs -f shuffle-backend Check execution 1 1. If it executed, check whether Orborus is running, before checking it's logs for "Container \<container_id> is created. The container_id is the worker it has deployed. Take not of the environment again at the end of the line. If you don't see this line, it's most likely because it's running in the wrong environment. Check if shuffle-orborus is running docker ps # Check if shuffle-orborus is running Find whether it was deployed or not docker logs -f shuffle-orborus # Get logs from shuffle-orborus Check execution 2 Check environment of running shuffle-orborus container. docker inspect shuffle-orborus | grep -i "ENV" Expected env result where "Shuffle" corresponds to the environment Check execution 4 1. Check whether the worker executed your app. Remember that we found \<container_id> previously by checking the logs of shuffle-orborus? Now we need that one. Workers are and will always be verbose, specifically for the reason of potential debugging. Find logs from a docker container docker logs -f CONTAINER_ID Check execution 5 As can be seen in the image above, is shows the exact execution order it takes. It starts by finding the parents, before executing the child process after it's finished. Take note of the specific apps being executed as well. It says "Time to execute \<app_id> with app \<app_name:app_version>. This indicates the app THAT WILL be executed. The following lines saying "Container \<container_id> is the container created with this app. 1. App debugging in itself might be the trickiest. There are a lot of factors like branches, bad workflow building etc that might come into play. This builds on the same concept as the worker, where you pass the container ID it specified. Get the app logs docker logs -f CONTAINER_ID # The CONTAINER_ID found in the previous worker logs As you will notice, app logs can be quite verbose (optional in a later build). In essence, if you see "RUNNING NORMAL EXECUTION" in the end, there's a 99.9% chance that it worked, otherwise some issue might have occurred. Please notify me if you need help debugging app executions ASAP, as I've done a lot of it, but it's more tricky than the other steps. FAQ Q: What is multiline? how is that represented when filling out the values? A: Multiline means the field will be larger and easier to use in the UI. E.g. you can use newlines. Q: Are there different schema types other than string? A: The only schema type is currently string, but we'll migrate to at least have number, list, bool and object later. You can put whatever there - it's not used. Q: How do the options function? does defining it automatically prevent user input? or can there be both? A: The first option is always chosen (at least that's the point). Make an empty entry if it should be blank by default Q: Would it be possible to alter the yaml format to be able to group actions into sections? this could also provide a way to section stuff in the UI presentation so it's not one giant list of actions A: Yep, categorization will come. Not possible right now, but if you add a field like "category" to each action, we could incorporate that right away in the backend Q: What are the possible return schema types? A: Return schema: You can return it pretty much however you want and we'll make it into a string. Follows same as #2: We'll start using specific casting later Q: What's the difference in using the UI app + action creation process vs manually creating the files? A: UI App creator can only make Rest API's with specific actions. It generates the python code and api.yaml in the backend / docker image Q: In app creation UI, what's a query? A: Query = parameter = whatever is at the end of urls after ?: https://shuffler.io/?query=this Q: In app creation UI, what are the extra configuration items used for? examples? also, middle input box has example text cut off partway through. A: Extra config was added recently (last 2 weeks) and was added to make it possible to e.g. add headers to all actions at once, as well as extra "required" parameters. It's not finished - this is just the start stage. If you add a name in there, it will be required to fill out as authentication mechanism from the user Q: In app creation UI, in the "New action" popup, what are queries? A: Fixed the links for new releases! The documentation is generally not very good for the app creator yet (lots todo here: https://github.com/frikky/shuffle-docs/issues) Q: How does Shuffle handle refresh tokens? A: We don't yet (June 2021). The best way around this is to refresh every time.
{ "url": "https://shuffler.io/docs/app_creation", "source_domain": "shuffler.io", "snapshot_id": "crawl=CC-MAIN-2021-39", "warc_metadata": { "Content-Length": "76060", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:JYZQUDIWHM5D5OF3HZGCISBLCFKW23HX", "WARC-Concurrent-To": "<urn:uuid:f1184da4-f6fc-4bc2-9e8b-932d28e934bc>", "WARC-Date": "2021-09-18T20:29:04Z", "WARC-IP-Address": "216.239.38.21", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:XOUMT3NTMBO7Z5OVJTOZRPIM3TH7VDMI", "WARC-Record-ID": "<urn:uuid:a71b62cc-f876-49d1-bc7b-b4e7724ac8c4>", "WARC-Target-URI": "https://shuffler.io/docs/app_creation", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a3c49c6e-d5b3-4b74-809b-08e3e460c685>" }, "warc_info": "isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-43\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 31, 32, 165, 166, 167, 185, 186, 187, 211, 212, 378, 379, 380, 394, 395, 434, 483, 484, 485, 498, 499, 953, 954, 1368, 1369, 1530, 1531, 1683, 1684, 1700, 1701, 1702, 1727, 1728, 2005, 2006, 2007, 2033, 2034, 2187, 2188, 2236, 2296, 2297, 2298, 2317, 2318, 2582, 2583, 2584, 2609, 2610, 2793, 2794, 2828, 2829, 2830, 2846, 2847, 2885, 2886, 3055, 3056, 3085, 3086, 3087, 3099, 3100, 3235, 3236, 3248, 3249, 3296, 3340, 3392, 3486, 3831, 3941, 3997, 4081, 4122, 4123, 4124, 4139, 4140, 4317, 4318, 4440, 4441, 4637, 4638, 4651, 4652, 4852, 4853, 4866, 4867, 4868, 4876, 4877, 5036, 5037, 5062, 5063, 5103, 5162, 5220, 5297, 5298, 5322, 5323, 5433, 5490, 5597, 5858, 5998, 6083, 6343, 6544, 6545, 6558, 6559, 6560, 6572, 6573, 6626, 6627, 6640, 6641, 6642, 6651, 6652, 6907, 6908, 7056, 7057, 7058, 7066, 7067, 7271, 7272, 7357, 7358, 7359, 7374, 7375, 7532, 7533, 7534, 7554, 7555, 7750, 7751, 7943, 7944, 8186, 8486, 8606, 8607, 8825, 8826, 9048, 9049, 9144, 9145, 9146, 9164, 9165, 9262, 9263, 9277, 9348, 9421, 9476, 9544, 9597, 9653, 9709, 9710, 9730, 9804, 9880, 9961, 10039, 10117, 10118, 10142, 10143, 10221, 10256, 10257, 10270, 10291, 10313, 10348, 10365, 10437, 10438, 10463, 10464, 10508, 10526, 10527, 10565, 10597, 10634, 10656, 10663, 10688, 10737, 10742, 10743, 10744, 10764, 10765, 11041, 11042, 11065, 11066, 11198, 11199, 11207, 11224, 11252, 11283, 11364, 11430, 11510, 11577, 11599, 11693, 11813, 11833, 11853, 11854, 12005, 12006, 12031, 12051, 12068, 12118, 12119, 12294, 12295, 12420, 12421, 12445, 12446, 12459, 12471, 12567, 12680, 12681, 12682, 12691, 12692, 12887, 12888, 13015, 13016, 13152, 13249, 13333, 13352, 13376, 13462, 13476, 13499, 13526, 13558, 13559, 13560, 13575, 13576, 13832, 13833, 14091, 14092, 14274, 14275, 14468, 14469, 14523, 14603, 14693, 14756, 14938, 14954, 14971, 14985, 15006, 15056, 15084, 15105, 15119, 15140, 15161, 15200, 15237, 15258, 15272, 15293, 15314, 15353, 15390, 15411, 15425, 15446, 15471, 15510, 15533, 15554, 15568, 15589, 15590, 15591, 15599, 15600, 15729, 15730, 15765, 15817, 15933, 15934, 16200, 16201, 16650, 16651, 16660, 16685, 16750, 16766, 16790, 16830, 16854, 16878, 16955, 16971, 16994, 17021, 17078, 17101, 17125, 17146, 17163, 17186, 17211, 17227, 17250, 17263, 17277, 17298, 17299, 17300, 17306, 17307, 17464, 17465, 17514, 17515, 17516, 17524, 17525, 17769, 17770, 17771, 17788, 17789, 17881, 17882, 17883, 17894, 17895, 18133, 18134, 18270, 18271, 18368, 18481, 18482, 18636, 18637, 18666, 18701, 18828, 18915, 18916, 19014, 19015, 19048, 19074, 19151, 19152, 19212, 19224, 19296, 19318, 19341, 19372, 19384, 19440, 19441, 19506, 19542, 19587, 19629, 19671, 19713, 19763, 19805, 19901, 19902, 19966, 20016, 20061, 20103, 20145, 20187, 20237, 20281, 20377, 20378, 20379, 20414, 20446, 20447, 20490, 20591, 20653, 20666, 20713, 20800, 20817, 20867, 20917, 20918, 20948, 20969, 21011, 21055, 21065, 21066, 21136, 21197, 21198, 21225, 21277, 21278, 21465, 21466, 21862, 21863, 22134, 22135, 22323, 22324, 22366, 22467, 22468, 22469, 22489, 22490, 22666, 22667, 22899, 22900, 23044, 23045, 23046, 23066, 23067, 23168, 23169, 23364, 23382, 23383, 23395, 23396, 23653, 23654, 23784, 23785, 23786, 23796, 23797, 23984, 23985, 24018, 24084, 24159, 24275, 24410, 24482, 24552, 24553, 24597, 24598, 24599, 24619, 24620, 24897, 24898, 25072, 25073, 25101, 25178, 25262, 25325, 25382, 25383, 25456, 25457, 25494, 25517, 25537, 25538, 25539, 25557, 25558, 25753, 25754, 25994, 25995, 26183, 26184, 26215, 26216, 26234, 26235, 26557, 26558, 26594, 26595, 26643, 26644, 26680, 26681, 26745, 26746, 26764, 26765, 26821, 26822, 26869, 26870, 26955, 26956, 27210, 27211, 27245, 27246, 27274, 27275, 27293, 27294, 27728, 27729, 27970, 27971, 27988, 27989, 28070, 28071, 28293, 28294, 28428, 28429, 28430, 28434, 28435, 28511, 28611, 28668, 28829, 28936, 29055, 29256, 29421, 29469, 29628, 29733, 29871, 29912, 30007, 30155, 30475, 30545, 30715, 30759 ], "line_end_idx": [ 31, 32, 165, 166, 167, 185, 186, 187, 211, 212, 378, 379, 380, 394, 395, 434, 483, 484, 485, 498, 499, 953, 954, 1368, 1369, 1530, 1531, 1683, 1684, 1700, 1701, 1702, 1727, 1728, 2005, 2006, 2007, 2033, 2034, 2187, 2188, 2236, 2296, 2297, 2298, 2317, 2318, 2582, 2583, 2584, 2609, 2610, 2793, 2794, 2828, 2829, 2830, 2846, 2847, 2885, 2886, 3055, 3056, 3085, 3086, 3087, 3099, 3100, 3235, 3236, 3248, 3249, 3296, 3340, 3392, 3486, 3831, 3941, 3997, 4081, 4122, 4123, 4124, 4139, 4140, 4317, 4318, 4440, 4441, 4637, 4638, 4651, 4652, 4852, 4853, 4866, 4867, 4868, 4876, 4877, 5036, 5037, 5062, 5063, 5103, 5162, 5220, 5297, 5298, 5322, 5323, 5433, 5490, 5597, 5858, 5998, 6083, 6343, 6544, 6545, 6558, 6559, 6560, 6572, 6573, 6626, 6627, 6640, 6641, 6642, 6651, 6652, 6907, 6908, 7056, 7057, 7058, 7066, 7067, 7271, 7272, 7357, 7358, 7359, 7374, 7375, 7532, 7533, 7534, 7554, 7555, 7750, 7751, 7943, 7944, 8186, 8486, 8606, 8607, 8825, 8826, 9048, 9049, 9144, 9145, 9146, 9164, 9165, 9262, 9263, 9277, 9348, 9421, 9476, 9544, 9597, 9653, 9709, 9710, 9730, 9804, 9880, 9961, 10039, 10117, 10118, 10142, 10143, 10221, 10256, 10257, 10270, 10291, 10313, 10348, 10365, 10437, 10438, 10463, 10464, 10508, 10526, 10527, 10565, 10597, 10634, 10656, 10663, 10688, 10737, 10742, 10743, 10744, 10764, 10765, 11041, 11042, 11065, 11066, 11198, 11199, 11207, 11224, 11252, 11283, 11364, 11430, 11510, 11577, 11599, 11693, 11813, 11833, 11853, 11854, 12005, 12006, 12031, 12051, 12068, 12118, 12119, 12294, 12295, 12420, 12421, 12445, 12446, 12459, 12471, 12567, 12680, 12681, 12682, 12691, 12692, 12887, 12888, 13015, 13016, 13152, 13249, 13333, 13352, 13376, 13462, 13476, 13499, 13526, 13558, 13559, 13560, 13575, 13576, 13832, 13833, 14091, 14092, 14274, 14275, 14468, 14469, 14523, 14603, 14693, 14756, 14938, 14954, 14971, 14985, 15006, 15056, 15084, 15105, 15119, 15140, 15161, 15200, 15237, 15258, 15272, 15293, 15314, 15353, 15390, 15411, 15425, 15446, 15471, 15510, 15533, 15554, 15568, 15589, 15590, 15591, 15599, 15600, 15729, 15730, 15765, 15817, 15933, 15934, 16200, 16201, 16650, 16651, 16660, 16685, 16750, 16766, 16790, 16830, 16854, 16878, 16955, 16971, 16994, 17021, 17078, 17101, 17125, 17146, 17163, 17186, 17211, 17227, 17250, 17263, 17277, 17298, 17299, 17300, 17306, 17307, 17464, 17465, 17514, 17515, 17516, 17524, 17525, 17769, 17770, 17771, 17788, 17789, 17881, 17882, 17883, 17894, 17895, 18133, 18134, 18270, 18271, 18368, 18481, 18482, 18636, 18637, 18666, 18701, 18828, 18915, 18916, 19014, 19015, 19048, 19074, 19151, 19152, 19212, 19224, 19296, 19318, 19341, 19372, 19384, 19440, 19441, 19506, 19542, 19587, 19629, 19671, 19713, 19763, 19805, 19901, 19902, 19966, 20016, 20061, 20103, 20145, 20187, 20237, 20281, 20377, 20378, 20379, 20414, 20446, 20447, 20490, 20591, 20653, 20666, 20713, 20800, 20817, 20867, 20917, 20918, 20948, 20969, 21011, 21055, 21065, 21066, 21136, 21197, 21198, 21225, 21277, 21278, 21465, 21466, 21862, 21863, 22134, 22135, 22323, 22324, 22366, 22467, 22468, 22469, 22489, 22490, 22666, 22667, 22899, 22900, 23044, 23045, 23046, 23066, 23067, 23168, 23169, 23364, 23382, 23383, 23395, 23396, 23653, 23654, 23784, 23785, 23786, 23796, 23797, 23984, 23985, 24018, 24084, 24159, 24275, 24410, 24482, 24552, 24553, 24597, 24598, 24599, 24619, 24620, 24897, 24898, 25072, 25073, 25101, 25178, 25262, 25325, 25382, 25383, 25456, 25457, 25494, 25517, 25537, 25538, 25539, 25557, 25558, 25753, 25754, 25994, 25995, 26183, 26184, 26215, 26216, 26234, 26235, 26557, 26558, 26594, 26595, 26643, 26644, 26680, 26681, 26745, 26746, 26764, 26765, 26821, 26822, 26869, 26870, 26955, 26956, 27210, 27211, 27245, 27246, 27274, 27275, 27293, 27294, 27728, 27729, 27970, 27971, 27988, 27989, 28070, 28071, 28293, 28294, 28428, 28429, 28430, 28434, 28435, 28511, 28611, 28668, 28829, 28936, 29055, 29256, 29421, 29469, 29628, 29733, 29871, 29912, 30007, 30155, 30475, 30545, 30715, 30759, 30838 ] }
{ "red_pajama_v2": { "ccnet_original_length": 30838, "ccnet_original_nlines": 589, "rps_doc_curly_bracket": 0.0003891300002578646, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.33938437700271606, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.024782950058579445, "rps_doc_frac_lines_end_with_ellipsis": 0.0016949200071394444, "rps_doc_frac_no_alph_words": 0.2282557189464569, "rps_doc_frac_unique_words": 0.22591644525527954, "rps_doc_mean_word_length": 4.943307876586914, "rps_doc_num_sentences": 366, "rps_doc_symbol_to_word_ratio": 0.008208369836211205, "rps_doc_unigram_entropy": 5.881161689758301, "rps_doc_word_count": 4692, "rps_doc_frac_chars_dupe_10grams": 0.0338018499314785, "rps_doc_frac_chars_dupe_5grams": 0.06424075365066528, "rps_doc_frac_chars_dupe_6grams": 0.04440803825855255, "rps_doc_frac_chars_dupe_7grams": 0.04156247153878212, "rps_doc_frac_chars_dupe_8grams": 0.039234280586242676, "rps_doc_frac_chars_dupe_9grams": 0.039234280586242676, "rps_doc_frac_chars_top_2gram": 0.010864879935979843, "rps_doc_frac_chars_top_3gram": 0.00504441000521183, "rps_doc_frac_chars_top_4gram": 0.00379408011212945, "rps_doc_books_importance": -3214.765380859375, "rps_doc_books_importance_length_correction": -3214.765380859375, "rps_doc_openwebtext_importance": -1772.04345703125, "rps_doc_openwebtext_importance_length_correction": -1772.04345703125, "rps_doc_wikipedia_importance": -1229.9483642578125, "rps_doc_wikipedia_importance_length_correction": -1229.9483642578125 }, "fasttext": { "dclm": 0.38891881704330444, "english": 0.8631647825241089, "fineweb_edu_approx": 2.0647964477539062, "eai_general_math": 0.44347041845321655, "eai_open_web_math": 0.08823829889297485, "eai_web_code": 0.973980724811554 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.02", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
-7,747,384,255,438,026,000
Categories Uncategorized When It Comes To Psychiatry Providers, the Seven Typical Stereotypes There are actually various types of psychiatric solutions on call in a lot of countries. Generally, however, psychiatry services involve a mix of social companies, psychological services and clinical solutions for people that have mental illnesses. Specialists, psychologists and also psychiatrists are all involved in the procedure. The psychoanalysts may either provide services for one specific range or even in a number of. click now Commonly, psychotherapists work in hospitals or in private centers as psychotherapists. They are often hired constant to supply psychiatric solutions, while some opt to function as professionals. The main function of these professionals is to help clients with mild to intense mental disorders including mental illness, clinical depression, bipolar illness, post upsetting tension problem and alcohol and drug misuse. A lot of psychotherapists additionally execute other tasks associated with the treatment of mental wellness ailments. A psychiatrist may likewise suggest medicine for the individual, relying on the intensity of the client’s illness. The main target of any kind of kind of psychological wellness condition is actually to deliver the individuals with efficient coping mechanisms and the tools they need to lead ordinary lives. Psychotherapy refers to the guidance of patients, as well as involvement in group or private therapy treatments. The kinds of psychiatric therapy that take place in the course of psychiatry feature Cognitive behavioural treatment, social treatment, person-focused psychotherapy, concern dealing with, tension monitoring and also sleep problems. A psychotherapist can easily additionally recommend medicines in instances where the patients experience any form of frenzy or even clinical depression. The range of psychiatry today deals with a wide range of methods. For example, there are a variety of psychoanalysts that are experts in certain psychological wellness disorders. They deal with individuals along with various type of psychological troubles. Some mental health experts are actually educated as experts, and some are qualified as psychotherapists that administer exclusive consultations for their private clients. Personal consulting can easily happen in a wide array of ways, such as with using telephone psychopharmacology. There are actually several mental health experts who additionally are experts in telepsychiatry. Telepsychiatry includes using a telephonic communication system to detect as well as deal with mental disorders. There are various other kinds of telepsychiatry that feature telecounseling, in which the psychotherapist consult with the patient utilizing a headset and video camera. On top of that, there are actually mental health experts who carry out team psychotherapy sessions that are composed of 30 or even even more folks. While lots of psychoanalysts may perform telepsychiatry, just a select couple of are trained to suggest and conduct electroconvulsive therapy. One of the most well-known among these is actually the psychoanalyst that is licensed in both fields, and also for that reason is certified by the Canadian Mental Wellness Association (CMHA). It is vital to call a specialist psychoanalyst who is actually accredited if you have a concern with your mental wellness. The CMHA uses instruction to brand new medical doctors on the prognosis and also therapy of mental disorders, featuring psychotherapy. When obtaining in-person solutions coming from a psychoanalyst, it is vital to possess relevant information readily available such as his get in touch with, title and also address amount. These medicines should be actually suggested according to the instructions provided through the mental health expert. People need to make sure that they update their loved ones physician concerning the prescription and any type of adjustment in medication. It is actually necessary to keep track of all visits along with the psychoanalyst. A psychiatrist with psychiatric prognosis should be actually capable to refer a patient to a proper professional for further consequence appointments. Some doctors like to leave all consultations along with their recommending doctors; others prefer to leave appointment sessions along with the recommending medical doctor and after that refer their patients to psychotherapists. Psychiatrists as well as mental health and wellness registered nurses likewise deliver psychiatric therapy or even therapy sessions to their patients. The timeframe of therapy sessions depends upon the individual’s need. Some psychoanalysts prefer one-to-one therapy, while various other psychiatrists like team treatment. Some psychiatrists like to use a combo of these different strategies If you or a family member needs concentrated psychiatric companies, contact psychiatry team for an on-site or off-site examination. They provide tailored psychological analyses and treatment for trauma, bipolar and also stress and anxiety disorders, unbalanced problems, and also substance abuse disorders. The on-site center is actually often situated in a treatment center such as an armed forces center or mental wellness clinic. Off internet site analysis is actually readily available at the individual’s property or in a local health center. In case of inpatient assessment, the individual will certainly be actually given assistance and guidance during the period of the examination. The wide array of psychological solutions supplied by a psychotherapist or even mental health and wellness expert is actually vast. Lots of mental health experts focus on a certain sort of mental illnesses, like mental illness or bipolar disorder. However, there are mental health experts that provide services for all forms of mental disorders featuring anxiety, stress, bipolar disorder, craziness, phobias, alcoholism, drug abuse, sex substance addiction, violence, self-destructive habits, and many other mental disorders. A psychoanalyst can identify these disorders as well as recommend drugs for their therapy. Furthermore, there are psychiatric nurses and social workers who work with psychotherapists to supply complete psychiatric services to clients. They generally have a background in health care as well as have proficiented in situation treatment. Dilemma assistance is a procedure utilized through mental health experts and other mental wellness specialists to ensure that the client has the ability to obtain the care she or he needs within the quickest achievable period. Individuals along with psychological solutions require to possess a large range of focused knowledge in order to manage their people. Some psychiatrists focus on managing individuals with a single particular illness such as mental illness or even bipolar affective disorder; whereas other psychoanalysts focus on handling clients along with a variety of emotional or bodily health problem including stress, clinical depression, bipolar illness, and dependency to drugs and alcohol. Psychologists and also psychotherapists additionally work together so as to create personalized procedure plans for their clients. Leave a Reply Your email address will not be published. Required fields are marked *
{ "url": "https://6magazineonline.com/2021/02/22/when-it-comes-to-psychiatry-providers-the-seven-typical-stereotypes/", "source_domain": "6magazineonline.com", "snapshot_id": "crawl=CC-MAIN-2021-39", "warc_metadata": { "Content-Length": "46590", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:WLWAC2SHZEH5SGLTDJ55UYRQRMHZK5O6", "WARC-Concurrent-To": "<urn:uuid:007d2ec8-99ed-43ba-8ab3-1958880f4bc8>", "WARC-Date": "2021-09-16T19:03:58Z", "WARC-IP-Address": "104.171.113.54", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:DS5C63MPKXPIIDKMIH2MPALAMU2QKZ3Y", "WARC-Record-ID": "<urn:uuid:fe90c538-2588-4cf7-9302-618d3c13bed3>", "WARC-Target-URI": "https://6magazineonline.com/2021/02/22/when-it-comes-to-psychiatry-providers-the-seven-typical-stereotypes/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:72546df4-ccd3-498c-aee3-c52554d79bc9>" }, "warc_info": "isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-40\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 11, 25, 26, 95, 96, 534, 535, 953, 954, 1187, 1188, 1493, 1494, 1879, 1880, 2308, 2309, 2948, 2949, 3542, 3543, 3988, 3989, 4223, 4224, 4844, 4845, 5536, 5537, 6155, 6156, 6628, 6629, 7242, 7243, 7257, 7258 ], "line_end_idx": [ 11, 25, 26, 95, 96, 534, 535, 953, 954, 1187, 1188, 1493, 1494, 1879, 1880, 2308, 2309, 2948, 2949, 3542, 3543, 3988, 3989, 4223, 4224, 4844, 4845, 5536, 5537, 6155, 6156, 6628, 6629, 7242, 7243, 7257, 7258, 7328 ] }
{ "red_pajama_v2": { "ccnet_original_length": 7328, "ccnet_original_nlines": 37, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.40251046419143677, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.0058577400632202625, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.09707113355398178, "rps_doc_frac_unique_words": 0.3848314583301544, "rps_doc_mean_word_length": 5.738763809204102, "rps_doc_num_sentences": 52, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.36334753036499, "rps_doc_word_count": 1068, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.017621150240302086, "rps_doc_frac_chars_top_3gram": 0.0186001006513834, "rps_doc_frac_chars_top_4gram": 0.010442160069942474, "rps_doc_books_importance": -479.04364013671875, "rps_doc_books_importance_length_correction": -479.04364013671875, "rps_doc_openwebtext_importance": -288.650146484375, "rps_doc_openwebtext_importance_length_correction": -288.650146484375, "rps_doc_wikipedia_importance": -159.0642852783203, "rps_doc_wikipedia_importance_length_correction": -159.0642852783203 }, "fasttext": { "dclm": 0.038665059953927994, "english": 0.9557788968086243, "fineweb_edu_approx": 2.0345561504364014, "eai_general_math": 0.009758410044014454, "eai_open_web_math": 0.07906866073608398, "eai_web_code": 0.0005424600094556808 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.89", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.891", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "2", "label": "Click Here References" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "12", "label": "Listicle" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
780,014,411,406,438,800
Tags: grunt 1 sparkline Inlining critical CSS for first-time visits After listening to Scott rave on about how much of a perceived-performance benefit he got from inlining critical CSS on first load, I thought I’d give it a shot over at The Session. On the chance that this might be useful for others, I figured I’d document what I did. The idea here is that you can give a massive boost to the perceived performance of the first page load on a site by putting the most important CSS in the head of the page. Then you cache the full stylesheet. For subsequent visits you only ever use the external stylesheet. So if you’re squeamish at the thought of munging your CSS into your HTML (and that’s a perfectly reasonable reaction), don’t worry—this is a temporary workaround just for initial visits. My particular technology stack here is using Grunt, Apache, and PHP with Twig templates. But I’m sure you can adapt this for other technology stacks: what’s important here isn’t the technology, it’s the thinking behind it. And anyway, the end user never sees any of those technologies: the end user gets HTML, CSS, and JavaScript. As long as that’s what you’re outputting, the specifics of the technology stack really don’t matter. Generating the critical CSS Okay. First question: how do you figure out which CSS is critical and which CSS can be deferred? To help answer that, and automate the task of generating the critical CSS, Filament Group have made a Grunt task called grunt-criticalcss. I added that to my project and updated my Gruntfile accordingly: grunt.initConfig({ // All my existing Grunt configuration goes here. criticalcss: { dist: { options: { url: 'http://thesession.dev', width: 1024, height: 800, filename: '/path/to/main.css', outputfile: '/path/to/critical.css' } } } }); I’m giving it the name of my locally-hosted version of the site and some parameters to judge which CSS to prioritise. Those parameters are viewport width and height. Now, that’s not a perfect way of judging which CSS matters most, but it’ll do. Then I add it to the list of Grunt tasks: // All my existing Grunt tasks go here. grunt.loadNpmTasks('grunt-criticalcss'); grunt.registerTask('default', ['sass', etc., 'criticalcss']); The end result is that I’ve got two CSS files: the full stylesheet (called something like main.css) and a stylesheet that only contains the critical styles (called critical.css). Cache-busting CSS Okay, this is a bit of a tangent but trust me, it’s going to be relevant… Most of the time it’s a very good thing that browsers cache external CSS files. But if you’ve made a change to that CSS file, then that feature becomes a bug: you need some way of telling the browser that the CSS file has been updated. The simplest way to do this is to change the name of the file so that the browser sees it as a whole new asset to be cached. You could use query strings to do this cache-busting but that has some issues. I use a little bit of Apache rewriting to get a similar effect. I point browsers to CSS files like this: <link rel="stylesheet" href="/css/main.20150310.css"> Now, there isn’t actually a file named main.20150310.css, it’s just called main.css. To tell the server where the actual file is, I use this rewrite rule: RewriteCond %{REQUEST_FILENAME} !-f RewriteRule ^(.+).(d+).(js|css)$ $1.$3 [L] That tells the server to ignore those numbers in JavaScript and CSS file names, but the browser will still interpret it as a new file whenever I update that number. You can do that in a .htaccess file or directly in the Apache configuration. Right. With that little detour out of the way, let’s get back to the issue of inlining critical CSS. Differentiating repeat visits That number that I’m putting into the filenames of my CSS is something I update in my Twig template, like this (although this is really something that a Grunt task could do, I guess): {% set cssupdate = '20150310' %} Then I can use it like this: <link rel="stylesheet" href="/css/main.{{ cssupdate }}.css"> I can also use JavaScript to store that number in a cookie called csscached so I’ll know if the user has a cached version of this revision of the stylesheet: <script> document.cookie = 'csscached={{ cssupdate }};expires="Tue, 19 Jan 2038 03:14:07 GMT";path=/'; </script> The absence or presence of that cookie is going to be what determines whether the user gets inlined critical CSS (a first-time visitor, or a visitor with an out-of-date cached stylesheet) or whether the user gets a good ol’ fashioned external stylesheet (a repeat visitor with an up-to-date version of the stylesheet in their cache). Here are the steps I’m going through: First of all, set the Twig cssupdate variable to the last revision of the CSS: {% set cssupdate = '20150310' %} Next, check to see if there’s a cookie called csscached that matches the value of the latest revision. If there is, great! This is a repeat visitor with an up-to-date cache. Give ‘em the external stylesheet: {% if _cookie.csscached == cssupdate %} <link rel="stylesheet" href="/css/main.{{ cssupdate }}.css"> If not, then dump the critical CSS straight into the head of the document: {% else %} <style> {% include '/css/critical.css' %} </style> Now I still want to load the full stylesheet but I don’t want it to be a blocking request. I can do this using JavaScript. Once again it’s Filament Group to the rescue with their loadCSS script: <script> // include loadCSS here... loadCSS('/css/main.{{ cssupdate }}.css'); While I’m at it, I store the value of cssupdate in the csscached cookie: document.cookie = 'csscached={{ cssupdate }};expires="Tue, 19 Jan 2038 03:14:07 GMT";path=/'; </script> Finally, consider the possibility that JavaScript isn’t available and link to the full CSS file inside a noscript element: <noscript> <link rel="stylesheet" href="/css/main.{{ cssupdate }}.css"> </noscript> {% endif %} And we’re done. Phew! Here’s how it looks all together in my Twig template: {% set cssupdate = '20150310' %} {% if _cookie.csscached == cssupdate %} <link rel="stylesheet" href="/css/main.{{ cssupdate }}.css"> {% else %} <style> {% include '/css/critical.css' %} </style> <script> // include loadCSS here... loadCSS('/css/main.{{ cssupdate }}.css'); document.cookie = 'csscached={{ cssupdate }};expires="Tue, 19 Jan 2038 03:14:07 GMT";path=/'; </script> <noscript> <link rel="stylesheet" href="/css/main.{{ cssupdate }}.css"> </noscript> {% endif %} You can see the production code from The Session in this gist. I’ve tweaked the loadCSS script slightly to match my preferred JavaScript style but otherwise, it’s doing exactly what I’ve outlined here. The result According to Google’s PageSpeed Insights, I done good. Optimising https://thesession.org/
{ "url": "https://adactio.com/journal/tags/grunt", "source_domain": "adactio.com", "snapshot_id": "crawl=CC-MAIN-2017-30", "warc_metadata": { "Content-Length": "20006", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:RJ654P4I7LKXXPD73HNMFGC4AISR24LJ", "WARC-Concurrent-To": "<urn:uuid:4e23009b-772b-4143-830d-029cae1abee5>", "WARC-Date": "2017-07-20T20:44:52Z", "WARC-IP-Address": "162.243.219.12", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:CNPQQSOZPXR7OTNSDREEJ3UTMXAE5W2E", "WARC-Record-ID": "<urn:uuid:e4479b2b-c1b5-4d4e-8c21-493c446e0367>", "WARC-Target-URI": "https://adactio.com/journal/tags/grunt", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c715f9c8-67e1-4577-8ff9-a9581dfba446>" }, "warc_info": "robots: classic\r\nhostname: ip-10-166-40-146.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 12, 13, 15, 16, 26, 27, 71, 72, 341, 342, 802, 803, 1235, 1236, 1264, 1265, 1362, 1363, 1567, 1568, 1587, 1641, 1660, 1676, 1699, 1745, 1774, 1803, 1850, 1902, 1916, 1926, 1932, 1936, 1937, 2182, 2183, 2225, 2226, 2266, 2307, 2308, 2370, 2371, 2550, 2551, 2569, 2570, 2644, 2645, 3006, 3007, 3191, 3192, 3246, 3247, 3402, 3403, 3439, 3482, 3483, 3725, 3726, 3827, 3828, 3858, 3859, 4043, 4044, 4077, 4078, 4107, 4108, 4169, 4170, 4328, 4329, 4338, 4432, 4442, 4443, 4777, 4778, 4816, 4817, 4896, 4897, 4930, 4931, 5139, 5140, 5180, 5241, 5242, 5317, 5318, 5329, 5337, 5371, 5380, 5381, 5576, 5577, 5587, 5618, 5664, 5665, 5738, 5739, 5837, 5847, 5848, 5971, 5972, 5983, 6044, 6056, 6068, 6069, 6091, 6092, 6146, 6147, 6180, 6220, 6281, 6292, 6300, 6334, 6343, 6352, 6379, 6421, 6515, 6525, 6536, 6597, 6609, 6621, 6622, 6824, 6825, 6836, 6837, 6892, 6893 ], "line_end_idx": [ 12, 13, 15, 16, 26, 27, 71, 72, 341, 342, 802, 803, 1235, 1236, 1264, 1265, 1362, 1363, 1567, 1568, 1587, 1641, 1660, 1676, 1699, 1745, 1774, 1803, 1850, 1902, 1916, 1926, 1932, 1936, 1937, 2182, 2183, 2225, 2226, 2266, 2307, 2308, 2370, 2371, 2550, 2551, 2569, 2570, 2644, 2645, 3006, 3007, 3191, 3192, 3246, 3247, 3402, 3403, 3439, 3482, 3483, 3725, 3726, 3827, 3828, 3858, 3859, 4043, 4044, 4077, 4078, 4107, 4108, 4169, 4170, 4328, 4329, 4338, 4432, 4442, 4443, 4777, 4778, 4816, 4817, 4896, 4897, 4930, 4931, 5139, 5140, 5180, 5241, 5242, 5317, 5318, 5329, 5337, 5371, 5380, 5381, 5576, 5577, 5587, 5618, 5664, 5665, 5738, 5739, 5837, 5847, 5848, 5971, 5972, 5983, 6044, 6056, 6068, 6069, 6091, 6092, 6146, 6147, 6180, 6220, 6281, 6292, 6300, 6334, 6343, 6352, 6379, 6421, 6515, 6525, 6536, 6597, 6609, 6621, 6622, 6824, 6825, 6836, 6837, 6892, 6893, 6927 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6927, "ccnet_original_nlines": 146, "rps_doc_curly_bracket": 0.010394110344350338, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.33398059010505676, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.039482198655605316, "rps_doc_frac_lines_end_with_ellipsis": 0.020408159121870995, "rps_doc_frac_no_alph_words": 0.2673139274120331, "rps_doc_frac_unique_words": 0.36512523889541626, "rps_doc_mean_word_length": 4.94605016708374, "rps_doc_num_sentences": 84, "rps_doc_symbol_to_word_ratio": 0.0019417499424889684, "rps_doc_unigram_entropy": 5.296728610992432, "rps_doc_word_count": 1038, "rps_doc_frac_chars_dupe_10grams": 0.04090378060936928, "rps_doc_frac_chars_dupe_5grams": 0.14218932390213013, "rps_doc_frac_chars_dupe_6grams": 0.12076354026794434, "rps_doc_frac_chars_dupe_7grams": 0.10985586047172546, "rps_doc_frac_chars_dupe_8grams": 0.09037786722183228, "rps_doc_frac_chars_dupe_9grams": 0.04090378060936928, "rps_doc_frac_chars_top_2gram": 0.01168678980320692, "rps_doc_frac_chars_top_3gram": 0.027269190177321434, "rps_doc_frac_chars_top_4gram": 0.03603427857160568, "rps_doc_books_importance": -658.0693359375, "rps_doc_books_importance_length_correction": -658.0693359375, "rps_doc_openwebtext_importance": -387.68963623046875, "rps_doc_openwebtext_importance_length_correction": -387.68963623046875, "rps_doc_wikipedia_importance": -266.8314514160156, "rps_doc_wikipedia_importance_length_correction": -266.8314514160156 }, "fasttext": { "dclm": 0.08518987894058228, "english": 0.7825486660003662, "fineweb_edu_approx": 1.7522038221359253, "eai_general_math": 0.8062050938606262, "eai_open_web_math": 0.2681758403778076, "eai_web_code": 0.7997491955757141 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.678", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-5,769,671,324,977,079,000
Reverse osmosis filters... is pure water filters... technology from the submarines... for production of pure water Reverse osmosis filters involve fine porous membrane and is effective in removing substances larger than water molecules, such as dirt, rust and sand particles, and other sediments. Most minerals like calcium and magnesium, including salt, lead and iron, are washed out in the drain, when going through the pure water filters, only allowing relatively pure water to pass through. This pure water filter will also remove some chemical components of drinking water, such as chloride and the dangerous fluoride. The purewater will go through a final stage of carbon filters to improve the color, taste and properties of the water. Pure water is collected on the low pressure side of the filter membrane. Pure water filters are mostly designed to be installed beneath the kitchen sink, with storage of the pure drinking water in a small reservoir tank, waiting to be dispensed directly through a faucet for drinking and cooking. Pure water filter wastes three gallons of water to produce one gallon of pure water. Action must be taken to replace the filters (membrane replacement) every six months or whatever the specification required, to prevent accumulation of impurities and disease causing viruses. Most premium bottle company uses this pure drinking water which are basically reverse osmosis water. Make sure your bodies are properly hydrated to stay healthy Fluids from beverages and foods make up our body's primary source of water Fluids are needed to control body temperature and transport oxygen and other essential nutrients to our cells The body is constantly losing water through breathing, perspiring and urinating The body needs to replace these fluids to stay hydrated and healthy Reverse osmosis filters need regular maintenance for optimal operation, to ensure the quality of the pure water Looking to SHOP ! or looking to make extra CASH ! FINANCING AVAILABLE Phone : 403-397-3833 Site Build It! Contact Us Please note that all fields followed by an asterisk must be filled in. Please enter the word that you see below.    Share this page: Enjoy this page? Please pay it forward. Here's how... Would you prefer to share this page with others by linking to it? 1. Click on the HTML link code below. 2. Copy and paste it, adding a note of your own, into your blog, a Web page, forums, a blog comment, your Facebook account, or anywhere that someone would find this page valuable.
{ "url": "https://www.alkaline-water-site.com/reverse-osmosis-filters.html", "source_domain": "www.alkaline-water-site.com", "snapshot_id": "crawl=CC-MAIN-2022-49", "warc_metadata": { "Content-Length": "43026", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:FCPR6H4UP6XZ3L3RVQGHMZGKOTCZDB6I", "WARC-Concurrent-To": "<urn:uuid:6c0521eb-b477-45f1-980a-35a2950c9218>", "WARC-Date": "2022-11-29T14:18:30Z", "WARC-IP-Address": "173.247.218.167", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:LRAPNY4P27UQ74TTRRK6QZ43OARS2GUG", "WARC-Record-ID": "<urn:uuid:34d05aa1-68d1-4954-b36a-e498632cca3f>", "WARC-Target-URI": "https://www.alkaline-water-site.com/reverse-osmosis-filters.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a2093d58-00c0-4589-b4bf-54a6ed96f192>" }, "warc_info": "isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-77\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 115, 116, 117, 149, 150, 300, 301, 499, 500, 629, 630, 749, 750, 823, 824, 1048, 1049, 1134, 1135, 1326, 1327, 1428, 1429, 1489, 1490, 1565, 1566, 1676, 1677, 1757, 1758, 1826, 1827, 1939, 1940, 1941, 1942, 2033, 2034, 2035, 2036, 2037, 2038, 2053, 2054, 2065, 2066, 2137, 2138, 2180, 2181, 2184, 2185, 2202, 2256, 2257, 2323, 2324, 2364 ], "line_end_idx": [ 115, 116, 117, 149, 150, 300, 301, 499, 500, 629, 630, 749, 750, 823, 824, 1048, 1049, 1134, 1135, 1326, 1327, 1428, 1429, 1489, 1490, 1565, 1566, 1676, 1677, 1757, 1758, 1826, 1827, 1939, 1940, 1941, 1942, 2033, 2034, 2035, 2036, 2037, 2038, 2053, 2054, 2065, 2066, 2137, 2138, 2180, 2181, 2184, 2185, 2202, 2256, 2257, 2323, 2324, 2364, 2545 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2545, "ccnet_original_nlines": 59, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.36616700887680054, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.010706639848649502, "rps_doc_frac_lines_end_with_ellipsis": 0.01666666939854622, "rps_doc_frac_no_alph_words": 0.12847965955734253, "rps_doc_frac_unique_words": 0.5563725233078003, "rps_doc_mean_word_length": 4.982842922210693, "rps_doc_num_sentences": 25, "rps_doc_symbol_to_word_ratio": 0.008565310388803482, "rps_doc_unigram_entropy": 4.964422702789307, "rps_doc_word_count": 408, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.04426955059170723, "rps_doc_frac_chars_top_3gram": 0.03098868951201439, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -212.11341857910156, "rps_doc_books_importance_length_correction": -212.11341857910156, "rps_doc_openwebtext_importance": -147.92849731445312, "rps_doc_openwebtext_importance_length_correction": -147.92849731445312, "rps_doc_wikipedia_importance": -87.66964721679688, "rps_doc_wikipedia_importance_length_correction": -87.66964721679688 }, "fasttext": { "dclm": 0.2116202712059021, "english": 0.9229574799537659, "fineweb_edu_approx": 2.8007946014404297, "eai_general_math": 0.014785530045628548, "eai_open_web_math": 0.10534214973449707, "eai_web_code": 0.00020318999304436147 } }
{ "free_decimal_correspondence": { "primary": { "code": "628.1", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Sanitary engineering, Sanitation, and Water-supply" } }, "secondary": { "code": "613.69", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Health and Hygiene" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "1", "label": "Factual" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "6", "label": "Promotional/Advertisement" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "2", "label": "Click Here References" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "1", "label": "No Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "2", "label": "Partially Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
8,708,205,909,836,265,000
Daerah Asal Fungsi F Dari X Ke 4x 3 Adalah Pengantar Apakah kamu pernah mendengar tentang fungsi matematika F(x) = 4x^3? Fungsi ini termasuk dalam kategori fungsi polinomial tingkat tiga atau kubik. Fungsi kubik memiliki bentuk umum seperti F(x) = ax^3 + bx^2 + cx + d, di mana a, b, c, dan d adalah konstanta.Namun, pada artikel ini, kita akan membahas daerah asal atau domain dari fungsi F(x) = 4x^3. Daerah asal atau domain adalah himpunan semua nilai x yang dapat diterima dalam fungsi matematika. Fungsi Kubik Sebelum membahas daerah asal dari fungsi F(x) = 4x^3, kita perlu memahami terlebih dahulu apa itu fungsi kubik. Fungsi kubik adalah fungsi matematika yang memiliki suatu variabel dalam pangkat tiga. Bentuk umum dari fungsi kubik adalah F(x) = ax^3 + bx^2 + cx + d, di mana a, b, c, dan d adalah konstanta.Fungsi kubik dapat memiliki satu, dua, atau tiga akar atau titik stasioner. Titik stasioner adalah titik di mana turunan pertama fungsi sama dengan nol. Daerah Asal Fungsi F Dari X Ke 4x 3 Adalah… Kembali ke topik utama, daerah asal fungsi F(x) = 4x^3. Untuk mengetahui daerah asal dari suatu fungsi, kita perlu mempertimbangkan dua hal: pembilang dan penyebut.Dalam fungsi F(x) = 4x^3, pembilangnya adalah 4x^3. Pembilang ini dapat mengambil nilai apa saja dalam bilangan real. Namun, kita perlu mempertimbangkan penyebutnya.Penyebut dalam fungsi F(x) = 4x^3 adalah 1. Sehingga, daerah asal dari fungsi ini adalah semua bilangan real. Dalam bentuk matematisnya, daerah asal fungsi F(x) = 4x^3 adalah (-∞, ∞). Contoh Soal Berikut adalah contoh soal untuk memperjelas konsep daerah asal fungsi F(x) = 4x^3.Jika F(x) = 4x^3 – 3x^2 + 2x – 1, tentukanlah daerah asal dari F(x).Jawab:Pembilang dari F(x) adalah 4x^3 – 3x^2 + 2x – 1 dan penyebutnya adalah 1. Sehingga, daerah asal dari F(x) adalah semua bilangan real. Dalam bentuk matematisnya, daerah asal fungsi F(x) = 4x^3 – 3x^2 + 2x – 1 adalah (-∞, ∞). Kesimpulan Dalam artikel ini, kita membahas tentang daerah asal atau domain dari fungsi matematika F(x) = 4x^3. Daerah asal dari suatu fungsi tergantung pada pembilang dan penyebutnya. Untuk fungsi F(x) = 4x^3, daerah asalnya adalah semua bilangan real atau (-∞, ∞).Terima kasih telah membaca artikel ini dan sampai jumpa kembali di artikel menarik lainnya. Tinggalkan komentar
{ "url": "https://kuissoal.com/daerah-asal-fungsi-f-dari-x-ke-4x-3-adalah", "source_domain": "kuissoal.com", "snapshot_id": "CC-MAIN-2023-23", "warc_metadata": { "Content-Length": "153697", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:U4CYAYJWRPCUX4W5BDEYTT4L2BE7R4QB", "WARC-Concurrent-To": "<urn:uuid:d840808d-01ad-4c76-b759-1b558afb6b8b>", "WARC-Date": "2023-06-09T05:16:01Z", "WARC-IP-Address": "104.21.83.228", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:GWFFXOCZLOZN3JB2Y52LRSTAYAGPXLJS", "WARC-Record-ID": "<urn:uuid:2689e95a-4522-43d0-ae64-25373b315466>", "WARC-Target-URI": "https://kuissoal.com/daerah-asal-fungsi-f-dari-x-ke-4x-3-adalah", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d350a5d4-2327-4318-a672-6e6a6b3c41d6>" }, "warc_info": "isPartOf: CC-MAIN-2023-23\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-37\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 43, 44, 54, 55, 504, 505, 518, 519, 977, 978, 1022, 1023, 1536, 1537, 1549, 1550, 1931, 1932, 1943, 1944, 2291, 2292 ], "line_end_idx": [ 43, 44, 54, 55, 504, 505, 518, 519, 977, 978, 1022, 1023, 1536, 1537, 1549, 1550, 1931, 1932, 1943, 1944, 2291, 2292, 2311 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2311, "ccnet_original_nlines": 22, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.05303030088543892, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03977273032069206, "rps_doc_frac_lines_end_with_ellipsis": 0.043478261679410934, "rps_doc_frac_no_alph_words": 0.3181818127632141, "rps_doc_frac_unique_words": 0.3446327745914459, "rps_doc_mean_word_length": 5.031073570251465, "rps_doc_num_sentences": 28, "rps_doc_symbol_to_word_ratio": 0.0018939400324597955, "rps_doc_unigram_entropy": 4.307930946350098, "rps_doc_word_count": 354, "rps_doc_frac_chars_dupe_10grams": 0.10892757028341293, "rps_doc_frac_chars_dupe_5grams": 0.2633351981639862, "rps_doc_frac_chars_dupe_6grams": 0.22346995770931244, "rps_doc_frac_chars_dupe_7grams": 0.1510387361049652, "rps_doc_frac_chars_dupe_8grams": 0.1392476111650467, "rps_doc_frac_chars_dupe_9grams": 0.1392476111650467, "rps_doc_frac_chars_top_2gram": 0.08422234654426575, "rps_doc_frac_chars_top_3gram": 0.049410440027713776, "rps_doc_frac_chars_top_4gram": 0.04042673110961914, "rps_doc_books_importance": -280.4424133300781, "rps_doc_books_importance_length_correction": -280.4424133300781, "rps_doc_openwebtext_importance": -154.0999755859375, "rps_doc_openwebtext_importance_length_correction": -154.0999755859375, "rps_doc_wikipedia_importance": -206.61929321289062, "rps_doc_wikipedia_importance_length_correction": -206.61929321289062 }, "fasttext": { "dclm": 0.9243447780609131, "english": 0.0015164499636739492, "fineweb_edu_approx": 2.5377652645111084, "eai_general_math": 0.0006759199895896018, "eai_open_web_math": 0.926631510257721, "eai_web_code": 0.4914451837539673 } }
{ "free_decimal_correspondence": { "primary": { "code": "512.9", "labels": { "level_1": "Science and Natural history", "level_2": "Mathematics", "level_3": "Algebra" } }, "secondary": { "code": "512", "labels": { "level_1": "Science and Natural history", "level_2": "Mathematics", "level_3": "Algebra" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
6,326,653,991,481,450,000
University College London Browse deposit.zip (2.72 MB) Cholesteryl Ester Transfer Protein (CETP) as a Drug Target for Cardiovascular Disease Download (2.72 MB) Version 3 2021-07-30, 12:19 Version 2 2021-05-04, 15:15 Version 1 2021-02-23, 14:55 dataset posted on 2021-07-30, 11:18 authored by Floriaan SchmidtFloriaan Schmidt Contains data and computer scripts to generate the figures underlying the manuscript: Cholesteryl Ester Transfer Protein (CETP) as a Drug Target for Cardiovascular Disease. The README.md: # Scripts and deposited data This directory contains R and python scripts along with the data necessary to generate the results described in the manuscript: 'cholesteryl ester transfer protein (CETP) as a drug target for cardiovascular disease'. ## Directory content . ├── README.md ├── scripts ├── figures ├── MR_data ├── TRIAL_data └── PICKLED_data The `scripts` directory contains the computer codes necessary to generate the figures which get saved to the `figures` directory. The scripts source data from the `MR_data` and `TRIAL_data` directories. The `PICKLED_data` directory contains the python pickled files from which we extracted the .csv files in `MR_data` -- these files can be ignored. ## Computer scripts The directory root contains various R (.R) and python (.py) scripts that will process the data files. It also contains a `cetp_conda_env.yml` file to conda install the necessary R and python modules: ``` cd scripts conda env create -f cetp_conda_env.yml ``` This creates the `cetp` conda environment. To generate the figures, please run the following `bash` script: ``` # run from the scripts directory ./run_scripts.sh ``` ### Input and output * scripts/MR_heatmap.py : Takes the MR_data .tsv files and returns Figures 2 and 5. * scripts/MR_metabolites.R : Takes the MR_data .tsv/csv files and returns Figure 4. * scripts/MR_forestplots.R : Takes the MR_data .tsv files and returns Figure 3. * scripts/RCT_forestplots.R : Takes the TRIAL_data .xlsx files and returns Figure 1. ## Contact Please contact Floriaan Schmidt for any queries: [email protected] . Funding BHF grant PG/18/5033837 and the UCL BHF Research Accelerator AA/18/6/34223 History I confirm that I am not uploading any: personal data as defined by data protection legislation, including information that may identify a living individual; information provided in confidence; or information that would contravene a third-party agreement • Yes I have considered whether the data to be published may be licensed commercially before deciding to freely release it to the public. Further information and advice may be sought from UCL Business https://www.uclb.com/about/our-people/ • Yes
{ "url": "https://rdr.ucl.ac.uk/articles/dataset/Cholesteryl_Ester_Transfer_Protein_CETP_as_a_Drug_Target_for_Cardiovascular_Disease/13686247/3", "source_domain": "rdr.ucl.ac.uk", "snapshot_id": "CC-MAIN-2024-10", "warc_metadata": { "Content-Length": "142522", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:DIJNGDOHWZSSR4U6FK6V2RT3KAEUD7OI", "WARC-Concurrent-To": "<urn:uuid:a51bf3ff-480d-4b1c-818d-6720b075d4fd>", "WARC-Date": "2024-02-28T06:22:58Z", "WARC-IP-Address": "52.30.40.166", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:ZUA27LJULWZ32ZZIVRX22STFNRJX422U", "WARC-Record-ID": "<urn:uuid:34550bb0-dc03-4ed5-ad8b-0217776a581b>", "WARC-Target-URI": "https://rdr.ucl.ac.uk/articles/dataset/Cholesteryl_Ester_Transfer_Protein_CETP_as_a_Drug_Target_for_Cardiovascular_Disease/13686247/3", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:acf2fded-ba0f-4d08-9e7b-6bc9fb81b1c0>" }, "warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-145\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 26, 33, 55, 56, 142, 143, 162, 190, 218, 246, 254, 327, 500, 501, 516, 545, 546, 624, 702, 763, 764, 785, 786, 788, 802, 814, 826, 838, 853, 870, 871, 936, 1001, 1002, 1075, 1143, 1221, 1222, 1242, 1243, 1316, 1345, 1346, 1412, 1444, 1445, 1449, 1460, 1499, 1503, 1504, 1547, 1548, 1613, 1614, 1618, 1651, 1668, 1672, 1673, 1694, 1695, 1719, 1779, 1806, 1863, 1890, 1943, 1971, 2028, 2029, 2030, 2041, 2042, 2117, 2118, 2126, 2127, 2202, 2203, 2211, 2212, 2466, 2467, 2475, 2476, 2710, 2711 ], "line_end_idx": [ 26, 33, 55, 56, 142, 143, 162, 190, 218, 246, 254, 327, 500, 501, 516, 545, 546, 624, 702, 763, 764, 785, 786, 788, 802, 814, 826, 838, 853, 870, 871, 936, 1001, 1002, 1075, 1143, 1221, 1222, 1242, 1243, 1316, 1345, 1346, 1412, 1444, 1445, 1449, 1460, 1499, 1503, 1504, 1547, 1548, 1613, 1614, 1618, 1651, 1668, 1672, 1673, 1694, 1695, 1719, 1779, 1806, 1863, 1890, 1943, 1971, 2028, 2029, 2030, 2041, 2042, 2117, 2118, 2126, 2127, 2202, 2203, 2211, 2212, 2466, 2467, 2475, 2476, 2710, 2711, 2718 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2718, "ccnet_original_nlines": 88, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.21557970345020294, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.0416666716337204, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3242753744125366, "rps_doc_frac_unique_words": 0.47184985876083374, "rps_doc_mean_word_length": 5.683646202087402, "rps_doc_num_sentences": 40, "rps_doc_symbol_to_word_ratio": 0.01992754079401493, "rps_doc_unigram_entropy": 4.761873722076416, "rps_doc_word_count": 373, "rps_doc_frac_chars_dupe_10grams": 0.11415094137191772, "rps_doc_frac_chars_dupe_5grams": 0.14433962106704712, "rps_doc_frac_chars_dupe_6grams": 0.14433962106704712, "rps_doc_frac_chars_dupe_7grams": 0.14433962106704712, "rps_doc_frac_chars_dupe_8grams": 0.11415094137191772, "rps_doc_frac_chars_dupe_9grams": 0.11415094137191772, "rps_doc_frac_chars_top_2gram": 0.018867919221520424, "rps_doc_frac_chars_top_3gram": 0.024528300389647484, "rps_doc_frac_chars_top_4gram": 0.043867919594049454, "rps_doc_books_importance": -182.84339904785156, "rps_doc_books_importance_length_correction": -182.84339904785156, "rps_doc_openwebtext_importance": -87.15579986572266, "rps_doc_openwebtext_importance_length_correction": -87.15579986572266, "rps_doc_wikipedia_importance": -55.562923431396484, "rps_doc_wikipedia_importance_length_correction": -55.562923431396484 }, "fasttext": { "dclm": 0.31561726331710815, "english": 0.7065727114677429, "fineweb_edu_approx": 1.864195704460144, "eai_general_math": 0.8030434250831604, "eai_open_web_math": 0.07991158962249756, "eai_web_code": 0.9646642208099365 } }
{ "free_decimal_correspondence": { "primary": { "code": "615.1", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Materia medica, Drugs, and Pharmacy" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "3", "label": "Academic Writing" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-6,299,612,732,765,883,000
Permalink Switch branches/tags Nothing to show Find file Copy path Fetching contributors… Cannot retrieve contributors at this time 39 lines (32 sloc) 359 Bytes tags title date normal Bitwise and 2015-10-14 var ENUM = { A: 0, B: 1, C: 2, D: 4, E: 8, F: 16, G: 32 } var c = ENUM.B + ENUM.D; c & ENUM.C === 0 c & ENUM.B === ENUM.B c & ENUM.D === ENUM.D function b (n) { return n.toString(2); } b(1) == 1 b(2) == 10 b(4) == 100 b(8) == 1000 b(16) == 10000 ...
{ "url": "https://github.com/towry/towry.me/blob/master/content/post/2015/10-14-Bitwise-and.md", "source_domain": "github.com", "snapshot_id": "crawl=CC-MAIN-2018-43", "warc_metadata": { "Content-Length": "44804", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:GADCWPOXI36B75YKHFVGXUEYRNH6QDYQ", "WARC-Concurrent-To": "<urn:uuid:8dde9789-2c71-46a8-98a0-a7d99ec4e009>", "WARC-Date": "2018-10-16T12:35:54Z", "WARC-IP-Address": "192.30.253.112", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:LH4XTCLPENFB4LNOLNTOFFL3WCQWOECH", "WARC-Record-ID": "<urn:uuid:e1bd8c6c-d6ca-48e0-8aec-6317da0eb199>", "WARC-Target-URI": "https://github.com/towry/towry.me/blob/master/content/post/2015/10-14-Bitwise-and.md", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:334ab2fc-2a64-4d52-ace9-866cd50b5c21>" }, "warc_info": "isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-93-236-233.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 10, 31, 47, 67, 90, 132, 161, 177, 184, 196, 207, 220, 228, 236, 244, 252, 260, 269, 277, 279, 280, 305, 306, 323, 345, 367, 384, 408, 410, 411, 421, 432, 444, 457, 472 ], "line_end_idx": [ 10, 31, 47, 67, 90, 132, 161, 177, 184, 196, 207, 220, 228, 236, 244, 252, 260, 269, 277, 279, 280, 305, 306, 323, 345, 367, 384, 408, 410, 411, 421, 432, 444, 457, 472, 475 ] }
{ "red_pajama_v2": { "ccnet_original_length": 475, "ccnet_original_nlines": 35, "rps_doc_curly_bracket": 0.008421050384640694, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.10457515716552734, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.1437908560037613, "rps_doc_frac_lines_end_with_ellipsis": 0.055555559694767, "rps_doc_frac_no_alph_words": 0.5620915293693542, "rps_doc_frac_unique_words": 0.8266666531562805, "rps_doc_mean_word_length": 3.8533332347869873, "rps_doc_num_sentences": 9, "rps_doc_symbol_to_word_ratio": 0.013071900233626366, "rps_doc_unigram_entropy": 4.029883861541748, "rps_doc_word_count": 75, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.041522491723299026, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -73.4761962890625, "rps_doc_books_importance_length_correction": -78.67243194580078, "rps_doc_openwebtext_importance": -34.44853591918945, "rps_doc_openwebtext_importance_length_correction": -39.644771575927734, "rps_doc_wikipedia_importance": -19.559389114379883, "rps_doc_wikipedia_importance_length_correction": -24.755624771118164 }, "fasttext": { "dclm": 0.9863317012786865, "english": 0.32733166217803955, "fineweb_edu_approx": 0.975499153137207, "eai_general_math": 0.44455116987228394, "eai_open_web_math": 0.08983355760574341, "eai_web_code": 0.024871349334716797 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.0151", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "4", "label": "Code/Software" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "1", "label": "Leftover HTML" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "1", "label": "Truncated Snippets" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
8,621,513,835,256,629,000
Setting Up Bacula, the Modular Backup Solution 0 3568 Bacula is an open source, enterprise-level computer backup system for heterogeneous networks, which is distributed and highly customisable. It is designed to automate backup tasks that often require intervention from a systems administrator or computer operator. This article introduces readers to the basics of Bacula. Figure 1: Bacula’s components Let me begin with sharing a real-life example of my use of Bacula. One of our projects involved using virtual machines installed on our workstation. This allowed us to quickly spin up different environments that were needed for development and testing. However, we needed a robust backup solution that allowed us to save the information not only on our VMs but also on our other machines that were running different operating systems. VMs come with the ability to take snapshots of the current state and we experimented with this feature, as well as exporting an image of the current state of the virtual machine as a backup solution. However, this proved time consuming and didn’t provide a solution for our Windows and Linux hosts. So we searched for a more robust backup solution, which ultimately turned out to be Bacula. Architecture Bacula comprises the following five major components or services —director, console, client, storage and catalogue. It is a completely modular backup solution, allowing us to scale quickly by moving the individual components onto their own computers, or even hosting multiple computers – each running their own file, storage or database servers. Even with multiple database servers, or multiple file servers, we can still manage everything from one director instance. For example, we can add new file, database and storage servers to the director’s configuration file, thus expanding the capabilities of the backup solution. However, the capabilities of Bacula are far too many to list here. In fact, this article aims to provide just enough information to get readers started. The setup for this article is very simplistic — it consists of one client and one server. In this example, the server hosts all the components — the file, storage, database and director. Though simplistic, the setup serves the purpose of getting Bacula up and running with minimum effort. Installing the Bacula server Let us configure the Bacula server on an Ubuntu 18.04 server. To do so, issue the following command: sudo apt install bacula The apt process will ask whether you want to install the Bacula server package and any other necessary requirements. Go ahead and answer ‘Yes’ to that. This should start the downloading, installation and configuration process for the Bacula server and any packages it relies on. During the installation process you’ll be asked several configuration questions, starting with the setup of Postfix. (This is Wietse Venema’s mail server that started life at IBM Research as an alternative to the widely-used Sendmail program. It attempts to be fast, easy to administer and secure.) Postfix is the package that you can configure to send you email updates. Select the Internet site and press ‘Okay’. For the mail name, we’ll just use the hostname. Bacula works with both Postgres and MySQL. I have chosen Postgres as it was already installed on my system. Now that we have all the packages installed for the server, we’ll move to the client and install the bacula-client package. Figure 2: Postfix configuration Installing Bacula on the client To install Bacula on the client, use the following command: sudo apt install bacula-client Confirm that you want to install the client package and then wait until all the packages have been downloaded and installed. Once done, ensure that you have all the configuration files in /etc/bacula. Inside that directory, you should see bacula-fd.conf, common_passwords, bconsole and a scripts directory. That is it for the Bacula installation and the initial setup. Why Bacula is more popular than other solutions There are many advantages Bacula offers that other backup solutions do not. These include the following: 1. There is a client for each machine, so you can back up and recover client data of any type, ensuring that all attributes of files are properly saved and restored. 2. Bacula uses well-defined (IANA registered) TCP/IP ports — with no rpcs or shared memory. 3. Any SQL database engine can be used, making Bacula very flexible. Currently, there are drivers for MySQL, PostgreSQL and SQLite. 4. It handles multi-volume backups and has a built-in job scheduler. 5. Bacula is four times as fast as any other commercial application, probably because those applications store their catalogue information in a large number of individual files rather than in an SQL database as Bacula does. Figure 3: The next step in the Postfix configuration Figure 4: Configuring Bacula with Postgres When and where Bacula should be used For programs such as tar, dump, or bru that are used to back up your computer data, you would like a network solution, more flexibility, or catalogue services. In such cases, Bacula will most likely provide the additional features you want. If you would like a backup program that can write to multiple volumes (i.e., which is not limited by your tape drive’s capacity), Bacula can most likely fill your needs. In addition, quite a number of Bacula users report that it is simpler to set up and use than other equivalent programs. Figure 5: Bacula on the client If you are currently using a sophisticated commercial package such as Legato Networker, ARCserveIT, Arkeia, or PerfectBackup+, you may be interested in Bacula, which provides many of the same features and is free software available under the Affero GPL Version 3 software licence. This article gives you a brief introduction to Bacula configuration. If you get stuck, the Bacula website has an excellent manual that you can read. LEAVE A REPLY Please enter your comment! Please enter your name here
{ "url": "https://www.opensourceforu.com/2020/01/setting-up-bacula-the-modular-backup-solution/", "source_domain": "www.opensourceforu.com", "snapshot_id": "crawl=CC-MAIN-2022-05", "warc_metadata": { "Content-Length": "283966", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:ZU5V2UZ64S4R2XDA6BDPTUSGHJOQHXBZ", "WARC-Concurrent-To": "<urn:uuid:6d7a28ec-279f-43f5-84ba-be0a1677fb73>", "WARC-Date": "2022-01-24T11:26:50Z", "WARC-IP-Address": "69.163.247.134", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:LWP4CZJWQCGC4PPOCTQK2TZXF5FXHKGW", "WARC-Record-ID": "<urn:uuid:db2a9676-6243-4a2a-842d-fc30403ea7bb>", "WARC-Target-URI": "https://www.opensourceforu.com/2020/01/setting-up-bacula-the-modular-backup-solution/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c829135c-264b-4e32-bfca-5f4d46c2c691>" }, "warc_info": "isPartOf: CC-MAIN-2022-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-24\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 47, 48, 50, 55, 56, 376, 377, 407, 408, 1234, 1235, 1248, 1364, 1365, 2027, 2028, 2317, 2318, 2347, 2448, 2449, 2473, 2474, 2753, 2754, 3126, 3127, 3170, 3326, 3327, 3451, 3452, 3484, 3485, 3517, 3577, 3578, 3609, 3610, 3917, 3918, 3980, 3981, 4029, 4134, 4135, 4303, 4397, 4531, 4602, 4828, 4881, 4924, 4925, 4962, 5203, 5204, 5494, 5495, 5526, 5527, 5808, 5809, 5958, 5959, 5973, 5974, 6001 ], "line_end_idx": [ 47, 48, 50, 55, 56, 376, 377, 407, 408, 1234, 1235, 1248, 1364, 1365, 2027, 2028, 2317, 2318, 2347, 2448, 2449, 2473, 2474, 2753, 2754, 3126, 3127, 3170, 3326, 3327, 3451, 3452, 3484, 3485, 3517, 3577, 3578, 3609, 3610, 3917, 3918, 3980, 3981, 4029, 4134, 4135, 4303, 4397, 4531, 4602, 4828, 4881, 4924, 4925, 4962, 5203, 5204, 5494, 5495, 5526, 5527, 5808, 5809, 5958, 5959, 5973, 5974, 6001, 6028 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6028, "ccnet_original_nlines": 68, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.408733606338501, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.009606990031898022, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1484716236591339, "rps_doc_frac_unique_words": 0.42283952236175537, "rps_doc_mean_word_length": 5.01646089553833, "rps_doc_num_sentences": 61, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.417938709259033, "rps_doc_word_count": 972, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.021328959614038467, "rps_doc_frac_chars_dupe_6grams": 0.013535680249333382, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.017227239906787872, "rps_doc_frac_chars_top_3gram": 0.01230517029762268, "rps_doc_frac_chars_top_4gram": 0.01045938953757286, "rps_doc_books_importance": -562.0213012695312, "rps_doc_books_importance_length_correction": -562.0213012695312, "rps_doc_openwebtext_importance": -225.33041381835938, "rps_doc_openwebtext_importance_length_correction": -225.33041381835938, "rps_doc_wikipedia_importance": -129.6350860595703, "rps_doc_wikipedia_importance_length_correction": -129.6350860595703 }, "fasttext": { "dclm": 0.11857622861862183, "english": 0.9253497123718262, "fineweb_edu_approx": 2.164144515991211, "eai_general_math": 0.7072134017944336, "eai_open_web_math": 0.17455554008483887, "eai_web_code": 0.6147013902664185 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.467", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.67", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-4,433,014,852,366,661,000
Advertisement Browse Subject Areas ? Click through the PLOS taxonomy to find articles in your field. For more information about PLOS Subject Areas, click here. • Loading metrics De Novo Assembly and Transcriptome Analysis of the Rubber Tree (Hevea brasiliensis) and SNP Markers Development for Rubber Biosynthesis Pathways • Camila Campos Mantello , [email protected] (APS); [email protected] (CCM) Affiliation Centro de Biologia Molecular e Engenharia Genética (CBMEG) - Universidade Estadual de Campinas (UNICAMP), Cidade Universitária Zeferino Vaz, Campinas, São Paulo, Brazil • Claudio Benicio Cardoso-Silva, Affiliation Centro de Biologia Molecular e Engenharia Genética (CBMEG) - Universidade Estadual de Campinas (UNICAMP), Cidade Universitária Zeferino Vaz, Campinas, São Paulo, Brazil • Carla Cristina da Silva, Affiliation Centro de Biologia Molecular e Engenharia Genética (CBMEG) - Universidade Estadual de Campinas (UNICAMP), Cidade Universitária Zeferino Vaz, Campinas, São Paulo, Brazil • Livia Moura de Souza, Affiliation Centro de Biologia Molecular e Engenharia Genética (CBMEG) - Universidade Estadual de Campinas (UNICAMP), Cidade Universitária Zeferino Vaz, Campinas, São Paulo, Brazil • Erivaldo José Scaloppi Junior, Affiliation Agência Paulista de Tecnologia dos Agronegócios, Pólo Regional Noroeste Paulista, Votuporanga, São Paulo, Brazil • Paulo de Souza Gonçalves, Affiliation Instituto Agronômico de Campinas (IAC), Campinas, São Paulo, Brazil • Renato Vicentini, Affiliation Centro de Biologia Molecular e Engenharia Genética (CBMEG) - Universidade Estadual de Campinas (UNICAMP), Cidade Universitária Zeferino Vaz, Campinas, São Paulo, Brazil • Anete Pereira de Souza [email protected] (APS); [email protected] (CCM) Affiliations Centro de Biologia Molecular e Engenharia Genética (CBMEG) - Universidade Estadual de Campinas (UNICAMP), Cidade Universitária Zeferino Vaz, Campinas, São Paulo, Brazil, Departamento de Biologia Vegetal, Instituto de Biologia, Universidade Estadual de Campinas (UNICAMP), Cidade Universitária Zeferino Vaz, Campinas, São Paulo, Brazil De Novo Assembly and Transcriptome Analysis of the Rubber Tree (Hevea brasiliensis) and SNP Markers Development for Rubber Biosynthesis Pathways • Camila Campos Mantello,  • Claudio Benicio Cardoso-Silva,  • Carla Cristina da Silva,  • Livia Moura de Souza,  • Erivaldo José Scaloppi Junior,  • Paulo de Souza Gonçalves,  • Renato Vicentini,  • Anete Pereira de Souza PLOS x Abstract Hevea brasiliensis (Willd. Ex Adr. Juss.) Muell.-Arg. is the primary source of natural rubber that is native to the Amazon rainforest. The singular properties of natural rubber make it superior to and competitive with synthetic rubber for use in several applications. Here, we performed RNA sequencing (RNA-seq) of H. brasiliensis bark on the Illumina GAIIx platform, which generated 179,326,804 raw reads on the Illumina GAIIx platform. A total of 50,384 contigs that were over 400 bp in size were obtained and subjected to further analyses. A similarity search against the non-redundant (nr) protein database returned 32,018 (63%) positive BLASTx hits. The transcriptome analysis was annotated using the clusters of orthologous groups (COG), gene ontology (GO), Kyoto Encyclopedia of Genes and Genomes (KEGG), and Pfam databases. A search for putative molecular marker was performed to identify simple sequence repeats (SSRs) and single nucleotide polymorphisms (SNPs). In total, 17,927 SSRs and 404,114 SNPs were detected. Finally, we selected sequences that were identified as belonging to the mevalonate (MVA) and 2-C-methyl-D-erythritol 4-phosphate (MEP) pathways, which are involved in rubber biosynthesis, to validate the SNP markers. A total of 78 SNPs were validated in 36 genotypes of H. brasiliensis. This new dataset represents a powerful information source for rubber tree bark genes and will be an important tool for the development of microsatellites and SNP markers for use in future genetic analyses such as genetic linkage mapping, quantitative trait loci identification, investigations of linkage disequilibrium and marker-assisted selection. Background Natural rubber is one of the most important polymers that is produced by plants. Rubber is composed of 94% cis-1,4- polyisoprene and 6% proteins and fatty acids [1] and exhibits unique properties including flexibility, impermeability to liquids and abrasion resistance. These singular properties make natural rubber superior to synthetic rubber for use in various applications [2]. Natural rubber is used in more than 40,000 products, including over 400 medical devices, and is of great importance in the tire industry [2]. Approximately 2,500 plant species are known to synthesize natural rubber, but only a few plants, such as Hevea brasiliensis (rubber tree), Parthenium argentatum (guayule) and Taraxacum koksaghyz (Russian dandelion), can produce high-quality natural rubber with molecular weights of greater than 1 million Daltons [3]. Among these species, H. brasiliensis (Willd. ex Adr. de Juss.) Muell. –Arg., which is commonly referred to as the rubber tree, is the major source of natural rubber [2] and is planted on a large scale in fields encompassing approximately 11.33 million hectares [4]. H. brasiliensis, which is native to Amazon rainforests, is a diploid (2n = 36, n = 18), perennial, monoecious, cross-pollinated tree species [5], with an estimated haploid genome estimated of 2.15 Gb [6]. The genus Hevea belongs to the Euphorbiaceae family, which is comprised of 11 inter-crossable species [7]. Although the Amazon rainforest offers optimal conditions for growth and high rubber yields due to its warm and humid climate, this region also provides optimal conditions for South American leaf blight (SALB) disease, which is caused by the fungus Microcyclus ulei (P. Henn.) v. Arx. and was responsible for devastating plantations in northern Brazil in the 1930s. SALB remains a permanent threat to the rubber industry [8]. Because of this disease, rubber tree plantations have expanded throughout the world, in locations such as northeastern India, the highlands and coastal areas of Vietnam, southern China and the southern plateau of Brazil [9]. These areas are colder and drier than the Amazon rainforest and are not favorable for the growth of this fungus. However, they are associated with other types of stresses, such as low temperatures, strong winds and drought, that are limiting factors for rubber production [5]. Thus, rubber tree breeding programs have focused not only on genotypes that are resistant to SALB disease but also on those that are tolerant to the stress conditions found in these areas and are producers of high quality rubber. Similar to many perennial trees, rubber tree breeding is time consuming and expensive. An average of 25 to 30 years of field experiments in large areas is generally required to obtain a new cultivar. Thus, molecular biological techniques could optimize field evaluations, thereby reducing the time and area that are required for these experiments. Over the past two decades, there has been an exponential increase in data acquisition pertaining to the rubber tree, including with regard to genomic microsatellite markers [10], [11], expressed sequence tag-simples sequence reapeats (EST-SSRs) [12][14], linkage maps [15], [16] and gene expression profiles [17], [18]. More recently, a draft genome of the rubber tree was published [19]. High-throughput genomic techniques are associated with innovative bioinformatics tools that can be important to rubber tree breeding and facilitate the development of superior clones that are suited to different agroclimatic conditions [4]. With the reduction in the cost of next generation sequencing (NGS) technologies, RNA sequencing (RNA-seq) has become wide spread because it enables the high-resolution characterization of transcriptomes. This method provides many advantages, including a single-base resolution, enabling the detection of thousands of single nucleotide polymorphisms (SNPs) for further SNP marker development. These markers can be useful for the functional saturation of linkage maps and the identification of markers that are directly related to economic traits for marker assisted selection (MAS). In addition, RNA-seq can be employed to provide information about alternative splicing, to detect rare transcripts and to quantify different levels of expression of individual genes rather than total gene expression, in contrast with microarrays [20]. RNA-seq has become a valuable tool that has been used in the investiagation of many species, such as Arabidopsis [21], rice [22] and maize [23]. This technology has also been widely used in non-model species such as the rubber tree [24]. A search for H. brasiliensis in the National Center of Biotechnology Information (NCBI) revealed that approximately 40,000 EST sequences had been deposited (as of August 2013). Recently, a transcriptome profile for a mixture of leaves and latex was described [25] in addition to, a bark transcriptome and EST-SSRs markers have been developed [14]. Both of these studies used Illumina HiSeq 2000 technology. RNA-seq employing 454 pyrosequencing technology has also been applied to evaluate the apical meristem transcriptome to facilitate the development of EST-SSR markers and the construction of a genetic linkage map [13]. In the current study, a total of 166,731,798 high-quality reads from bark samples from the GT1 and PR255 clones were obtained through paired-end sequencing using Illumina GAIIx platform to generate a de novo assembly. The GT 1 clone, which is male-sterile, and PR 255 are good latex producers in São Paulo State and are parental to two mapping populations. These clones high yielding and cold and wind tolerant, which are important characteristics for rubber tree breeding. The obtained transcripts were submitted for functional annotations, through which it was possible to identify new genes in the H. brasiliensis database. The transcripts were also submitted for putative SSR and SNP discovery. A total of 78 SNP markers were validated in the mevalonate (MVA) and 2-C-methyl-D-erythritol 4-phosphate (MEP) pathways, which are two important pathways that are involved in rubber biosynthesis. Materials and Methods Ethics statement We confirm that no specific permits were required for the present study. This work was a collaborative research project that was developed by researchers from the University of Campinas (UNICAMP) and the Agronomic Institute of Campinas (IAC). In addition, we confirm that the field study did not involve endangered or protected species. Plant materials, and DNA and RNA extractions Bark samples from the GT1 and PR255 clones were collected at the Agência Paulista de Tecnologia dos Agronegócios/SAA, Votuporanga, São Paulo, Brazil. The selected clones were 18 years old and were tapped once every 4 days. The bark samples were frozen on dry ice and stored at −80°C until use. Total RNA was extracted according to Changet et al. [26]. RNA quality and integrity were evaluated using an Agilent 2100 Bioanalyzer (Agilent Technologies, Palo Alto, CA). To validate the SNP markers, genomic DNA from 36 genotypes of H. brasiliensis (Table S1) was extracted from lyophilized leaf tissues using the modified CTAB method as described by Doyle JJ and Doyle JL [27], and the quality and quantity of the obtained DNA were measured by electrophoresis using a 1% agarose gel and spectophotometrically using the NanoDrop ND-1000 (NanoDrop Technologies, Wilmington, DE). cDNA library construction and sequencing Paired-end Illumina mRNA libraries were generated from 4 µg of total RNA following the manufacturer's instructions for mRNA-Seq Sample Preparation (Illumina Inc., San Diego, CA). Library quality was assessed with the 2100 Bioanalyzer (Agilent Technologies, Palo Alto, CA). Cluster amplification was performed using the TruSeq PE Cluster Kit with the cBot automated system (Illumina Inc., San Diego, CA), and each sample was sequenced in separate GAIIx lanes using the TruSeq SBS 36 Cycle Kit (Illumina, San Diego, CA). Read lengths were 72 bp. Data filtering and de novo assembly The raw data, which were generated via Illumina sequencing in the BCL format, were converted to qSeq using the Off-Line Basecaller v.1.9.4 (OLB) software. The qSeq files were transformed into FastQ files containing the 72 bp reads using a custom script. The raw reads that were less than 60 bp in length with quality scores of Q<20 were trimmed using the CLC Genomics Workbench (v4.9; CLC Bio, Cambridge, MA). For the de novo assembly, we employed the CLC Genomics Workbench with the following parameters: the maximum gap and mismatch count were set to 2, the insertion and deletion costs were set to 3, the minimum contig length was set to 200 bp, the length fraction and similarity parameters were set to 0.5 and 0.9, respectively and the word size (k-mer) was set to 29. All of the short reads were deposited in the NCBI Short Read Archive (SRA) under accession number SRX371361. Characterization through similarity searches and annotations The contigs were searched against the NCBI non-redundant (nr) and the UniProtKB/Swiss-Prot protein databases using BLASTx with a cut-off e-value of 1e-10. The Blast2GO program [28] was used to obtain gene ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) annotations. The software WEGO [29] was then employed to perform GO classifications of the annotated contigs to obtain the gene function distributions. A GO enrichment analysis was conducted to identify the functional categories that were enriched in the bark transcripts. To perform this analysis, we used the Blast2GO program with Fisher's exact test (p-value <0.001). The contigs were also searched against the STRING database v. 9.05 (http://string-db.org) to predict clusters of orthologous groups (COGs) and classify possible functions at a cut-off e-value of 1e-10. To identify the protein domains, all of the translated sequences were matched against the Pfam database using the InterProScan tool [30]. An H. brasiliensis database was constructed using public RNA-seq data [13], [14], [19], [25], the EST database at NCBI (as of August 2013) and data that were provided by Silva et al. (2014) [31] to perform a BLASTn search with a cut-off e-value of 1e-10 for the assessment of the transcriptomic contributions to the publicly available H. brasiliensis data and partial and complete open reading frames (ORFs) were predicted using the TransDecoder package (http://transdecoder.sourceforge.net/). Digital gene expression analysis Each genotype was mapped separately to the contigs that were obtained in the de novo assembly with a minimum number of reads of 10 and a maximum number of mismatches equal to 2. The data were normalized by calculating the reads per kilobase per million mapped reads (RPKM) for each contig. For the statistical analyses, Kal's Z test on proportions was used to determine the significantly differentially expressed genes. Genes showing false discovery rates (FDR) <0.05 and fold changes >2 were considered to be differentially expressed. All of the analyses were performed with the CLC Genomics Workbench. Variant detection To identify putative SSRs, the MISA program (http://pgrc.ipk-gatersleben.de/misa/) was used. As a criterion for SSR detection, sequences that showed at least 5 dinucleotide repeats; 4 trinucleotide repeats; and 3 tetra-, penta- and hexanucleotide repeats were considered. The CLC Genomics Workbench software was first used to map the reads to the transcriptome obtained by de novo assembly with length fractions of 0.5 and similarities of 0.9. Then, putative SNP detection was performed using the following criteria: minimum coverage of 10, minimum frequency of 10%, quality value from the central base of Q>30 and quality value from the average base of Q>20. SNP validation Primer pairs were designed using the Primer 3 program [32] for at least one putative SNP. PCR amplifications were performed in 20 µl reactions containing 25 ng of genomic DNA, 0.5 µM of each primer, 100 µM of each dNTP, 3 mM MgCl2, 20 mM Tris–HCl, 50 mM KCl and 0.5 U of Pfu Taq DNA Polymerase (recombinant) (Thermo Scientific Inc., San Jose, CA) using the following steps: an initial denaturation at 95°C for 3 min, followed by 35 amplification cycles (30 s at 95°C, 30 s at the specific annealing temperature and 2 min at 72°C), and a final extension at 72°C for 10 min. The PCR products were purified using a solution of 20% (w/v) PEG8000 and 2.5 M NaCl in a 1∶1 proportion with the sample volume. The amplification products were resolved via electrophoresis in 1.5% agarose gels prior to the sequencing reaction. Each amplicon was bidirectionally sequenced (forward and reverse) using the BigDye Terminator v3.1 Kit (Applied Biosystems, Foster City, CA) according to the manufacturer's instructions in an ABI 3500 xL Genetic Analyzer (Applied Biosystems, Foster City, CA). The sequencing chromatograms were visually inspected with the ChromasPro 1.5 software, and SNPs were identified as overlapping nucleotide peaks. The allelic polymorphic information content of each SNP was calculated using the formula, PIC  =  where n is the number of alleles of the marker among the set of genotypes that were used for characterizing the SNP polymorphism, and pi and pj are the frequencies of alleles i and j, respectively. The observed and expected heterozygosities were calculated using the TFPGA program [33]. Results and Discussion Transcriptome sequencing and de novo assembly In total, 179,326,804 raw reads were generated and trimmed to exclude low-quality reads (Table 1). To perform the de novo assembly 166,731,798 high-quality reads were used, generating 152,416 contigs. The contigs lengths ranged from 97 to 13,266 bp, with a mean length of 536 bp, an N50 of 720 bp and a GC content of 41.8% (Table 2). thumbnail Table 2. Statistical summary of the de novo assembly for H. brasiliensis bark. https://doi.org/10.1371/journal.pone.0102665.t002 A total of 58,992 contigs longer than 400 bp were selected. Of these, 8,608 shared high identities with non-plant sequences suggesting that 17% of these contigs were contaminant sequences. After removal of these contaminant sequences, a total of 50,384 contigs were used for further analyses (Table S2). Of the 50,384 contigs, 12,761(25.3%) ranged in size from 1 to 2 kb and 4,515 (8.9%) were longer than 2 kb (Figure 1). thumbnail Figure 1. Length distribution of the 50,384 contigs. Histogram of the sequence-length distribution of these transcripts and the transcripts showing BLASTx hits in the nr database with a cut-off e-value of 1e−10. https://doi.org/10.1371/journal.pone.0102665.g001 Partial and complete ORFs were predicted from the 50,384 contigs. In total, 23,977 contigs contained ORFs (47.5%), of which 9,247 (18%) were classified as possessing complete ORFs. Characterization via similarity searches The 50,384 contigs were searched against the NCBI nr protein and UniProtKB/Swiss-Prot databases using BLASTx employing a cut-off e-value of 1e-10 as the criterion for defining a significant hit. Of these contigs, 32,018 (63%) showed significant BLASTx matches in the nr database and 23,620 (47%) in the UniProtKB/Swiss-Prot database (Table 3). All of the contigs that were annotated using UniProtKB/Swiss-Prot were also annotated with the nr database. The proportion of the contigs with BLASTx hits significantly increased for longer contigs (Figure 1). The BLASTx searches yielded hits for 16,383 (49%) contigs that were 400 bp to 1 kb in length, while 4,391 (97%) of the contigs that were longer than 2 kb were annotated in the BLASTx searches. Of the 10 largest contigs, 9 returned BLASTx hits (Table S3). The top 5 species showing BLASTx hits were Ricinus communis (20,522 contigs; 64%), Populus trichocarpa (6,310 contigs; 19.7%), Vitis vinifera (2,471 contigs; 7.7%), Glycine max (535 contigs; 1.7%) and Hevea brasiliensis (414 contigs; 1.3%) (Figure 2). thumbnail Figure 2. Top-hit species distribution in the BLASTx analysis against the nr database. https://doi.org/10.1371/journal.pone.0102665.g002 To investigate the contributions of novel transcripts to the rubber tree database, a BLASTn search (cut-off e-value of 1e-10) was performed against an H. brasiliensis database. Of the 32,018 contigs showing similarity in the nr database, 1,089 (3.4%) non-redundant contigs presented with no hits against the H. brasiliensis database (Figure S1). These results indicate that novel uncataloged genes have been identified for the rubber tree database. Moreover, the 18,866 contigs with no hit that were subjected to BLASTn revealed significant hits for 10,821 (59%), whereas 7,545 (41%) had no hits. A search for putative ORFs was performed with the contigs with no hits (7,545) in BLASTn. We detected 479 contigs with ORFs, of which 83 were classified as complete ORFs (Figure S1). Future analyses may reveal potential unknown genes in this dataset. Gene ontology (GO) analysis The 32,018 contigs showing positive BLAST hits in the nr database were annotated using GO terms. The GO terms allow for the definition and standardization of the properties of gene products in any organism. Of the 32,018 contigs, 21,725 were annotated with 37,781 GO terms (Table 3). Of the three main subontologies, molecular function was the highly represented, with 19,498 contigs followed by biological process with 13,729 contigs and finally, cellular component with 8,686 contigs (Figure 3). thumbnail Figure 3. GO classification for the H. brasiliensis bark transcriptome. https://doi.org/10.1371/journal.pone.0102665.g003 For molecular function, binding (13,547 contigs) and catalytic activity (12,135 contigs) were the highly represented categories. For biological process, metabolic processes (10,528 contigs) and cellular processes (9,953 contigs) figured prominently. Interestingly, 252 contigs were assigned to the category of biological quality regulation, suggesting that they may be related to processes that modulate qualitative or quantitative traits that are associated with biological qualities such as size, mass or shape, which are important characteristics for bark. In addition, 85 contigs were assigned to the category of cell wall organization and thus play roles in the assembly, arrangement of constituent parts or the disassembly of the cell wall. For the cellular component subontology, cells (8,600 contigs) and organelles (4,196 contigs) were the most highly represented. A GO enrichment analysis was performed to identify the functional categories that were enriched in the bark-exclusive transcripts. These suggested bark-exclusive transcripts were identified using a BLASTn search (cut-off e-value of 1e-10) against an H. brasiliensis database that did not contain bark transcripts. A total of 36 GO terms were enriched (Figure 4) among these transcripts, including the following categories: cell wall organization or biogenesis (GO: 0071554) and cell wall organization (GO: 00771555), which are responsible for the assembly, arrangement of constituent parts or disassembly of cell walls, and cytokinin metabolic (GO: 0009690) processes which are related to plant growth. Categories that are involved in the prevention and/or recovery from an infection that is caused by an attack, such as the defense response (GO: 0006952) and pectinesterase activity (GO: 0030599) were also enriched. Clusters of orthologous groups (COGs) The clusters of orthologous groups (COGs) of protein database is used to phylogenetically classify the proteins that are encoded in complete genomes. Each COG includes proteins that are inferred to be orthologs i.e., they are direct evolutionary counterparts [34]. Among the 50,384 contigs, 9,720 were annotated (Table 3) and classified into 23 COG categories (Figure 5). General function prediction was the most highly represented category with 1,732 contigs, followed by replication, recombination and repair with 1,480 contigs and posttranslational modification, protein turnover, and chaperones with 843 contigs. thumbnail Figure 5. COG functional distribution of the H. brasiliensis bark transcriptome. https://doi.org/10.1371/journal.pone.0102665.g005 The smallest groups that were observed in the COG annotation analysis were cell motility, chromatin structure and dynamics and RNA processing and modification (7, 69 and 77 annotated contigs, respectively). Additionally, the category of secondary metabolite biosynthesis, transport and catabolism was represented by 270 contigs. Protein domain analysis A comparison of the 50,384 contigs against the Pfam domain database with a cut-off e-value of 1e-10 resulted in 16,277 contigs matching at least one protein domain model (Table 3). The distribution of the domains ranged from a minimum of one to a maximum of 34 domains per contig. The 3 most abundant domains that were identified included pentatricopeptide repeat-containing proteins (PPRs) with 3,058 contigs, followed by leucine-rich repeats (LRRs) with 1,479 contigs and WD40 with 967 contigs. The WD40 domain functions as a site of protein-protein interaction, and proteins containing WD40 repeats are known to serve as platforms for the assembly of protein complexes or mediators of transient interplay among other proteins [35] (Figure 6). Furthermore, 112 contigs were associated with WRKY domains which is a DNA-binding transcription factors tnat are found almost exclusively in plants [36] (Figure 6). WRKY containing proteins are thought to play important roles in plant defense responses, plant hormone signaling, secondary metabolism and plant responses to abiotic stress [37]. thumbnail Figure 6. Distribution of the top 30 Pfam domains identified in translated H. brasiliensis transcripts. https://doi.org/10.1371/journal.pone.0102665.g006 Moreover, 95 contigs were annotated to the sugar transporter family (Figure 6), 49 to the cellulase synthase family and 11 to cellulase domains (data not shown). KEGG classification The KEGG pathways represent collections of manually drawn pathway maps and that are helpful for the understanding if the biological functions and interactions of genes [38], [39]. Of the 21,725 contigs that were annotated with GO terms, 8,626 were assigned to 10,355 EC numbers (Table 3). These EC numbers were mapped to the 137 KEGG Pathways (Table S4). Of the 5 main categories, metabolism was the main category represented, with 92% followed by organismal systems, environmental information and genetic information processing with 5%, 2% and 1% respectively. In the metabolism category, carbohydrate metabolism (1,988 contigs) and amino acid metabolism (1,262 contigs) were the most prominent classes (Figure 7). thumbnail Figure 7. KEGG metabolism pathway distribution for the H. brasiliensis contigs. https://doi.org/10.1371/journal.pone.0102665.g007 Rubber biosynthesis pathway. Latex is produced in specialized cells known as laticifers or latex vessels, which are located adjacent to the phloem of the rubber tree [4]. The chemical composition of rubber includes high-molecular-weight cis-polyisoprene [1], which is formed through the sequential condensation of isopentenyl diphosphate (IPP) [17]. IPP biosynthesis is related to the mevalonate (MVA) pathway [4], which occurs in the cytoplasm, and the 2-C-methyl-D-erythritol 4-phosphate (MEP) pathway which occurs in the plastid [18]. The MVA pathway includes 6 steps, which are catalyzed by the 6 corresponding enzymes, whereas the MEP pathway is catalyzed by 7 enzymes [4], [18]. IPP that is synthetized through the MEP pathway was initially thought to be used for carotenoid synthesis in Frey-Wyssling particles [40]. However, the MEP pathway has been shown to serve as an alternative source of IPP for cis-polyisoprene synthesis in mature rubber trees or in clones that do not produce a large amount of carotenoids [18]. Acetyl-CoA is a precursor of the MVA pathways and is produced through the glycolysis/gluconeogenesis pathway. The MEP pathway precursors include glyceraldehyde-3-phosphate, which is produced via the glycolysis/gluconeogenesis pathway, and pyruvate, which is a product of pyruvate metabolism. For the KEGG annotations, 192 contigs were annotated to 25 enzymes in the glycolysis/gluconeogenesis pathway (Figure S2), and 116 were annotated to 22 enzymes in pyruvate metabolism (Figure S3). In addition, we identified all of the key genes that are involved in the MVA and MEP pathways through KEGG annotations (Figure S4). In total, 25 contigs were related to the MVA pathway, and 40 were related to the MEP pathway (Table 4). Digital gene expression analysis We conducted a gene expression analysis to evaluate the potential genes that were differentially expressed between the GT1 and PR255 genotypes. In this analysis, we observed that 716 genes were expressed at higher levels in GT1, and 1,267 were more prominently expressed in PR255 (Figure S5) The top 20 differentially expressed genes that were found for each genotype are listed in Table S5. Similar to Li et al. (2012) [14], we observed genes that were related to stress/defense responses, such as the chalcone synthase [41], glycine-rich RNA-binding protein [42], ascorbate peroxidase [43] and o-methyltransferase [44] genes, as these clones were frequently harvested. Interestingly, the gene enconding carbonic anhydrase was the most highly expressed in PR255. This enzyme is responsible for facilitating the diffusion of carbon dioxide in photosynthesis and is essential for processes such as respiration [45]. The most highly expressed gene in GT1 was phenylalanine ammonia-lyase 2 which is involved in lignin and flavonoid synthesis and is typically highly expressed in response to pathogen attack and tissue wounding [46]. Considering the annotations of all the key genes that are involved in the MVA and MEP pathways according to the KEGG database, we observed that the genes encoding hydroxymethylglutaryl-CoA reductase (NADPH) (contig_104848) in the MVA pathway and (E)-4-hydroxy-3-methylbut-2-enyl-diphosphate synthase (contig_145940 and contig_146058) and 4-hydroxy-3-methylbut-2-enyl diphosphate reductase (contig_97647) in the MEP pathway, were enhanced in the GT1 genotype, providing a strong evidence that these genes are differentially expressed in these two clones. Although the experiments did not include replicates, this analysis represents the first step in understanding the unique responses of different genotypes and elucidating possible candidate genes for rubber tree molecular breeding. Putative SSR marker discovery The 50,384 contigs were subjected to a search for putative SSR markers. A total of 17,927 SSRs were detected in 13,070 contigs, and 3,433 contigs presented with more than one SSR (Table 5). There were 6,822 di-, 6,098 tri-, 3,033 tetra-, 1,125 penta- and 849 hexanucleotide potential SSRs (Table 6). A total of 50,608,451 bp were analyzed, and a frequency of one SSR per 2.8 kb was observed, similar to previously described by Feng et al. (one SSR per 2.25 kb) [12] and by Li et al. (one SSR per 2.42 kb) [14]. To investigate the contributions of the novel sequences containing SSRs for future rubber tree studies, we performed a BLASTn search using our identified sequences with SSRs against the H. brasiliensis database. We identified 1,709 sequences that showed no similarity with the H. brasiliensis database, suggesting that they possess novel SSRs for the rubber tree, and thus 203 sequences were annotated with the nr database. Dinucleotide SSRs have been reported to be the most abundant SSR type in plant genomes [47]. In contrast with plants such as the sugarcane [48], wheat [49], sweet potato [50] and citrus [51], in which SSRs containing trinucleotide motifs are the most abundant in transcribed regions, it has been reported that dinucleotide motifs figure prominently in H. brasiliensis transcripts [12]. Dinucleotide motifs are also abundant in other plants such as sesame [52], kiwi [53] and coffee [54]. In this work, dinucleotide motifs were found to be predominant, corroborating with previous studies in which 38% of the total putative SSRs were shown to possess these motifs (Figure S6). The most abundant motif in the dinucleotide class was AG/TC (4.674, 68.5%), followed by AT/TA (1298, 19%), AC/TG (829, 12.1%) and GC/CG (21, 0.3%) (Figure S6). The rarity of the CG dinucleotide microsatellites cannot be explained by the low C/G contents. CpG dinucleotides that are not situated in CpG islands can undergo cytosine methylation, and methylated cytosines tend to mutate to thymine, which may explain the underrepresentation of the CpG dinucleotides and, consequently, the low coverage of microsatellites CG motifs [55]. The most frequent trinucleotide motif was AAG/TTC (1876, 30.7%), and the least represented motif was CCG/CGG (90, 1.4%) (Table 6). Previous studies on Arabidopsis and soybean also suggested that the trinucleotide AAG motif may figure prominently in dicots [50]. Interestingly, we found only 90 CCG/CGG trinucleotides, which have been reported to predominant in monocots [47], [56], such as maize, barley and sorghum [50]. Our results are in accord with previous studies if rubber tree and with the observed rarity of CCG/CGG repeat units that have been reported in a large number of dicotyledonous plants such as Citrus, Coffea and Glycine [57]. Long CCG/CGG sequences could compete with the components of the splicing machinery, resulting in inadequate splicing. Moreover, CCG/CGG repeats, may potentially form higher structures, such as hairpins and quadruplexes, affecting the efficiency and accuracy of splicing and influencing the formation of mature mRNA [56], [58]. Our findings correlate with previous studies of the rubber tree, in which AG/TC and AAG/TTC were found to be the most abundant motifs in the dinucleotide and trinucleotide categories, respectively. Putative SNP marker discovery For the putative SNP detection, the 50,384 contigs were first mapped with trimmed short sequence reads using the CLC Genomics Workbench. In total, 404,114 putative SNPs were detected, and an average of one SNP per 125 bp was observed (Table 7), which was similar to the SNP frequencies that were previously reported for Eucalyptus grandis (1 SNP per 192 bp) [59], apple (1 SNP per 149 bp) [60] and grapevine (1SNP per 117 bp) [61], in addition to a recent study for rubber tree (1 SNP per 178 bp) [31]. However, the density of putative SNPs was higher than that which was described by Pootakham et al. (2011) [62] and Salgado et al [63] for the rubber tree, who detected one SNP per 1.5 kb and one SNP per 5.2 kb, respectively, using 454 pyrosequencing technology, which has a lower sequencing depth than Illumina sequencing technology. thumbnail Table 7. Summary of putative SNPs identified using CLC Genomics Workbench. https://doi.org/10.1371/journal.pone.0102665.t007 Transition SNPs were predominant, of which 242,732 (60%) were detected, while 161,382 (40%) transversion SNPs were identified (Table 7). Among the transversion variations, A ↔ T was the most highly represented with 49,283 SNPs detected, and G ↔ C was the least common with 31,376 SNPs identified (Figure S7). As expected, the transition SNPs were generally observed at higher frequencies than the transversion SNPs. During natural selection, transitions mutations are better tolerated than transversions because they generate synonymous mutations in protein-coding sequences [64]. Because contigs corresponding with genes that are involved in the MVA and MEP pathways were identified in the KEGG annotations, we also searched for SNPs in these sequences. Only 4 contigs that are involved in the MVA pathway did not contain putative SNPs, which were annotated as hydroxymethylglutaryl-CoA synthase (AACT) (1 contig), hydroxymethylglutaryl-CoA reductase (NADPH) (2 contigs) and phosphomevalonate kinase (PMK) (1 contig), while 1 contig from the MEP pathway that did not contain a putative SNP was found, which was annotated as 1-deoxy-D-xylulose-5-phosphate synthase (DXS). SNP marker validation Primer pairs were designed for the sequences that were related to the MVA and MEP pathways with putative SNPs to validate the SNPs via Sanger sequencing. We designed primer pairs for 21 and 31 transcripts from the MVA and MEP pathways, respectively. For some of the sequences, we designed more than one primer pair to validate a greater number of SNPs. A total of 64 primer pairs were designed and 35 yielded good amplification products for sequencing. However, 9 loci yielded good amplification products in only a few genotypes, and 26 loci were therefore analyzed for SNP marker validations. Some of the loci showed deviations from the expected and observed product sizes because the primers pairs were designed based on transcript regions (exons), whereas the amplification reactions were performed with genomic DNA which contains both exons and intron regions (Table S6). A total of 78 SNPs were validated in 25 contigs (Table S7). Of these 25 contigs, 9 were annotated to the MVA pathway. Among the 6 enzymes in the MVA pathway, we amplified transcripts that were annotated as the enzymes acetyl-CoA C-acetyltransferase (AACT) (1 contig; 2 SNPs), hydroxymethylglutaryl-CoA synthase (HMGS) (2 contigs; 2 SNPs), hydroxymethylglutaryl-CoA reductase (NADPH) (5 contigs; 12 SNPs) and diphosphomevalonate decarboxylase (MVD) (1 contig; 1 SNP). For the MEP pathway, we evaluated 14 contigs that were annotated as the enzymes 1-deoxy-D-xylulose-5-phosphate synthase (DXS) (10 contigs; 53 SNPs), 1-deoxy-D-xylulose-5-phosphate reductoisomerase (DXR) (1 contig; 1 SNP), 2-C-methyl-D-erythritol 2,4-cyclodiphosphate synthase (MDS) (2 contigs; 6 SNPs) and (E)-4-hydroxy-3-methylbut-2-enyl-diphosphate synthase (HDS) (1 contig; 1 SNP). The observed and expected heterozygosities ranged from 0.0294 to 0.9167 and from 0.0000 to 0.5394 respectively, and the PIC values ranged from 0.0286 and 0.4402. Interestingly, the locus HB_SNP_26 which was annotated as diphosphomevalonate decarboxylase (in the MVA pathway), contained a deletion or insertion (INDEL) polymorphism from positions 161 to 168 bp (Figure 8). The observed and expected heterozygosities and PIC values were not calculated to the INDEL polymorphisms. This study provides the first identification and validation of putative SNPs in 2 important pathways for rubber biosynthesis. RNA-seq for H. brasilensis breeding Crop domestication began more than 10,000 years ago, but the domestication and breeding of forest trees, such as rubber tree, only started approximately 100 years ago. Similar to other forest tree species with long generation times, rubber tree still in the early stages of domestication, with most breeding programs producing only two or three generations from the wild-type genotypes [5], whereas the same amount of progress can be accomplished in a single year for many agricultural crops [65]. With the advent of next-generation sequencing technologies, such as RNA-seq, rapid advances have been made in improving the levels of transcriptome coverage for forest trees. These transcripts can be characterized using public databases, and an enormous amount of genetic diversity has been identified in these species. Since 2011, the publically available RNA-seq data [13], [14], [19], [25] have included an abundance of new information provided on H. brasiliensis transcripts and, consequently on rubber tree genetics [25]. These data allowed us to compare and identify novel transcripts (Figure S1) and new sequences with SSRs for the H. brasiliensis database to improve this database. The high genetic variability that is present in H. brasiliensis have been demonstrated by the high frequency of polymorphisms that are found in its SSR [11], [66], [67] and EST-SSR [12], [31] markers. SNP markers constitute the most abundant type of DNA polymorphism in genomic sequences and are thought to play major roles in the induction of phenotypic variations [68]. RNA-seq, together with SNP discovery, can be applied to develop new markers in candidate genes for genetic breeding and to investigate the variability of these genes in rubber tree, which has been performed in other tree species. The integration of modern genetics and novel sequencing technologies with conventional breeding can provide additional information and should expedite H. brasiliensis domestication. Conclusions The use of RNA-seq technology has allowed for a more comprehensive understanding of transcriptional patterns occurring in the bark of H. brasiliensis. Furthermore, our data has revealed 1,089 new rubber tree genes and 7,545 potentially novel genes. The RNA-seq data has led to the identification of 1,709 new EST-SSRs for the H. brasiliensis database. In addition, SNP analysis elucidated a total 404,114 SNPs that may be associated with potentially important genes. This information may constitute a valuable resource for rubber tree breeding programs and genetic diversity studies. This is the first study in which putative SNPs were identified and validated in genes that are involved in the MVA and MEP pathways. Supporting Information Figure S1. Overview of the workflow for investigating the contribution of novel transcripts in the H. brasiliensis database. https://doi.org/10.1371/journal.pone.0102665.s001 (TIFF) Figure S2. Glycolysis/gluconeogenesis KEGG pathway. The annotated contigs are indicated in yellow. https://doi.org/10.1371/journal.pone.0102665.s002 (TIFF) Figure S3. Pyruvate metabolism KEGG pathway. The annotated contigs are indicated in yellow. https://doi.org/10.1371/journal.pone.0102665.s003 (TIFF) Figure S4. MVA and MEP KEGG pathways. The annotated contigs are indicated in yellow. https://doi.org/10.1371/journal.pone.0102665.s004 (TIFF) Figure S5. Digital gene expression analysis. Volcano plot of differentially expressed genes between the GT1 and PR255 genotypes. https://doi.org/10.1371/journal.pone.0102665.s005 (TIFF) Figure S6. Distribution of putative microsatellite types. https://doi.org/10.1371/journal.pone.0102665.s006 (TIF) Figure S7. Distribution of putative SNPs that were identified. https://doi.org/10.1371/journal.pone.0102665.s007 (TIF) Table S1. Genotypes of H. brasiliensis that were used for SNP validations and characterizations. https://doi.org/10.1371/journal.pone.0102665.s008 (XLSX) Table S2. The 50,384 contigs that were longer than 400 bp from the de novo assembly. https://doi.org/10.1371/journal.pone.0102665.s009 (XLSX) Table S3. The 10 longest contigs from the de novo assembly. https://doi.org/10.1371/journal.pone.0102665.s010 (XLSX) Table S4. The 137 pathways that were annotated in the KEGG database. https://doi.org/10.1371/journal.pone.0102665.s011 (XLSX) Table S5. The 20 most highly expressed genes in the GT1 and PR255 genotypes. https://doi.org/10.1371/journal.pone.0102665.s012 (XLSX) Table S6. Characterization of all the developed SNP markers. The table presents the SNP markers that were developed for H. brasiliensis, including the corresponding primer sequences, annealing temperatures, and expected and observed products sizes in 1.5% agarose gel electrophoresis. https://doi.org/10.1371/journal.pone.0102665.s013 (XLSX) Table S7. Validation of the SNP markers. The table presents the allelic variants, observed and expected heterozygosities and polymorphism information contents. https://doi.org/10.1371/journal.pone.0102665.s014 (XLSX) Author Contributions Conceived and designed the experiments: APS. Performed the experiments: CCM. Analyzed the data: CCM CBCS CCS RV. Contributed reagents/materials/analysis tools: CCS LMS ESJ PSG RV APS. Wrote the paper: CCM. References 1. 1. Sakdapipanich JT (2007) Structural characterization of natural rubber based on recent evidence from selective enzymatic treatments. J Biosci Bioeng 103: 287–292 2. 2. Cornish K (2001) Similarities and differences in rubber biochemistry among plant species. Phytochemistry 57: 1123–1134. 3. 3. Gronover CS, Wahler D, Prüfer D (2009) Natural Rubber Biosynthesis and Physic- Chemical Studies on Plant Derived Latex. 2005. 4. 4. Saha T, Priyadarshan PM (2012) Genomics of Tree Crops. Schnell RJ, Priyadarshan PM, editors New York, NY: Springer New York. doi:10.1007/978-1-4614-0920-5. 5. 5. Priyadarshan PM, Goncalves PDS (2003) Hevea gene pool for breeding: 101–114. 6. 6. Leitch AR, Lim KY, Leitch IJ, Neill MO, et al.. (1998) Molecular cytogenetic studies in rubber, Hevea: 464–467. 7. 7. Pires JM, Secco R., Gomes JI (2002). Taxonomia e filogeografia das seringueiras (Hevea spp) Belem: Embrapa Amazonia Oriental p.103. 8. 8. Pushparajah E (2001) Natural rubber. In: Last, F.T. (ed) Tree Crop Ecosystems. Amsterdam, The Netherlands: Elsevier Science. 9. 9. Raj S, Das G, Pothen J, Dey SK (2005) Relationship between latex yield of Hevea brasiliensis and antecedent environmental parameters. Int J Biometeorol 49: 189–196 10. 10. Le Guen V, Garcia D, Doaré F, Mattos CRR, Condina V, et al. (2011) A rubber tree's durable resistance to Microcyclus ulei is conferred by a qualitative gene and a major quantitative resistance factor. Tree Genet Genomes 7: 877–889 11. 11. Mantello CC, Suzuki FI, Souza LM, Gonçalves PS, Souza AP (2012) Microsatellite marker development for the rubber tree (Hevea brasiliensis): characterization and cross-amplification in wild Hevea species. BMC Res Notes 5: 329 12. 12. Feng SP, Li WG, Huang HS, Wang JY, Wu YT (2008) Development, characterization and cross-species/genera transferability of EST-SSR markers for rubber tree (Hevea brasiliensis). Mol Breed 23: 85–97 13. 13. Triwitayakorn K, Chatkulkawin P, Kanjanawattanawong S, Sraphet S, Yoocha T, et al. (2011) Transcriptome sequencing of Hevea brasiliensis for development of microsatellite markers and construction of a genetic linkage map. DNA Res 18: 471–482 14. 14. Li D, Deng Z, Qin B, Liu X, Men Z (2012) De novo assembly and characterization of bark transcriptome using Illumina sequencing and development of EST-SSR markers in rubber tree (Hevea brasiliensis Muell. Arg.). BMC Genomics 13: 192 15. 15. Lespinasse D, Rodier-Goud M, Grivet L, Leconte A, Legnate H (2000) Seguin M (2000) A saturated genetic linkage map of rubber tree (Hevea spp.) based on RFLP, AFLP, microsatellite, and isozyme markers. Theor Appl Genet 100: 127–138. 16. 16. Souza LM, Gazaffi R, Mantello CC, Silva CC, Garcia D, et al. (2013) QTL mapping of growth-related traits in a full-sib family of rubber tree (Hevea brasiliensis) evaluated in a sub-tropical climate. PLoS One 8: e61238 17. 17. Chow K-S, Wan K-L, Isa MNM, Bahari A, Tan S-H, et al. (2007) Insights into rubber biosynthesis from transcriptome analysis of Hevea brasiliensis latex. J Exp Bot 58: 2429–2440 18. 18. Chow K-S, Mat-Isa M-N, Bahari A, Ghazali A-K, Alias H, et al. (2012) Metabolic routes affecting rubber biosynthesis in Hevea brasiliensis latex. J Exp Bot 63: 1863–1871 19. 19. Rahman AYA, Usharraj AO, Misra BB, Thottathil GP, Jayasekaran K, et al. (2013) Draft genome sequence of the rubber tree Hevea brasiliensis. BMC Genomics 14: 75 20. 20. Wang Z, Gerstein M, Snyder M (2009) RNA-Seq: a revolutionary tool for transcriptomics. Nat Rev Genet 10: 57–63. 21. 21. Lister R, O'Malley RC, Tonti-Filippini J, Gregory BD, Berry CC, et al. (2008) Highly integrated single-base resolution maps of the epigenome in Arabidopsis. Cell 133: 523–536 22. 22. Lu T, Lu G, Fan D, Zhu C, Li W, et al.. (2010) Function annotation of the rice transcriptome at single-nucleotide resolution by RNA-seq: 1238–1249. doi:10.1101/gr.106120.110. 23. 23. Hansey CN, Vaillancourt B, Sekhon RS, de Leon N, Kaeppler SM, et al. (2012) Maize (Zea mays L.) genome diversity as revealed by RNA-sequencing. PLoS One 7: e33071 24. 24. Egan AN, Schlueter J, Spooner DM (2012) Applications of next-generation sequencing in plant biology. Am J Bot 99: 175–185 25. 25. Xia Z, Xu H, Zhai J, Li D, Luo H, et al. (2011) RNA-Seq analysis and de novo transcriptome assembly of Hevea brasiliensis. Plant Mol Biol 77: 299–308 26. 26. Chang S, Puryear J, Cairney J (1993) A simple and efficient method for isolating RNA from pine trees. Plant Mol Biol Report 11: 113–116 27. 27. Doyle J, Doyle J (1987) A rapid DNA isolation procedure for small quantities of fresh leaf tissue. Phytochem Bull 19: 11–15. 28. 28. Conesa A, Götz S, García-Gómez JM, Terol J, Talón M, et al. (2005) Blast2GO: a universal tool for annotation, visualization and analysis in functional genomics research. Bioinformatics 21: 3674–3676 29. 29. Ye J, Fang L, Zheng H, Zhang Y, Chen J, et al. (2006) WEGO: a web tool for plotting GO annotations. Nucleic Acids Res 34: W293–7 30. 30. Zdobnov EM, Apweiler R (2001) signature-recognition methods in InterPro. 17: 847–848. 31. 31. Silva CC, Mantello CC, Campos T, Souza LM, Gonçalves PS, et al.. (2014) Leaf-, panel- and latex-expressed sequenced tags from the rubber tree (Hevea brasiliensis) under cold-stressed and suboptimal growing conditions: the development of gene-targeted functional markers for stress response. Mol Breed. doi:10.1007/s11032-014-0095-2. 32. 32. Untergasser A, Nijveen H, Rao X, Bisseling T, Geurts R, et al. (2007) Primer3Plus, an enhanced web interface to Primer3. Nucleic Acids Res 35: W71–4 33. 33. Miller M (1997) 27. Miller MP: Tools for population genetic analysis (TFPGA) 1.3: A Windows program for the analysis of allozyme and molecular population genetic data. Computer Software distributed by the author 1997. 34. 34. Tatusov RL, Fedorova ND, Jackson JD, Jacobs AR, Kiryutin B, et al. (2003) The COG database: an updated version includes eukaryotes. BMC Bioinformatics 4: 41 35. 35. Stirnimann CU, Petsalaki E, Russell RB, Müller CW (2010) WD40 proteins propel cellular networks. Trends Biochem Sci 35: 565–574 36. 36. Rushton PJ, Somssich IE, Ringler P, Shen QJ (2010) WRKY transcription factors. Trends Plant Sci 15: 247–258 37. 37. Cheng Y, Zhou Y, Yang Y, Chi Y-J, Zhou J, et al. (2012) Structural and functional analysis of VQ motif-containing proteins in Arabidopsis as interacting proteins of WRKY transcription factors. Plant Physiol 159: 810–825 38. 38. Kanehisa M, Goto S (2000) KEGG: kyoto encyclopedia of genes and genomes. Nucleic Acids Res 28: 27–30. 39. 39. Kanehisa M, Araki M, Goto S, Hattori M, Hirakawa M, et al. (2008) KEGG for linking genomes to life and the environment. Nucleic Acids Res 36: D480–4 40. 40. Sando T, Takeno S, Watanabe N, Okumoto H, Kuzuyama T, et al. (2008) Cloning and Characterization of the 2-C-Methyl-D-erythritol 4-Phosphate (MEP) Pathway Genes of a Natural-Rubber Producing Plant, Hevea brasiliensis. Biosci Biotechnol Biochem 72: 2903–2917 41. 41. Dao TTH, Linthorst HJM, Verpoorte R (2011) Chalcone synthase and its functions in plant resistance. Phytochem Rev 10: 397–412 42. 42. Kim JY, Kim WY, Kwak KJ, Oh SH, Han YS, et al. (2010) Glycine-rich RNA-binding proteins are functionally conserved in Arabidopsis thaliana and Oryza sativa during cold adaptation process. J Exp Bot 61: 2317–2325 43. 43. Caverzan A, Passaia G, Rosa SB, Ribeiro CW, Lazzarotto F, et al. (2012) Plant responses to stresses: Role of ascorbate peroxidase in the antioxidant protection. Genet Mol Biol 35: 1011–1019. 44. 44. Lam KC, Ibrahim RK, Behdad B, Dayanandan S (2007) Structure, function, and evolution of plant O -methyltransferases. 1013: 1001–1013 45. 45. Badger M (2003) The roles of carbonic anhydrases in photosynthetic CO(2) concentrating mechanisms. Photosynth Res 77: 83–94 46. 46. Tanaka Y, Matsuoka M, Yamanoto N, Ohashi Y, Kano-Murakami Y, et al. (1989) Structure and characterization of a cDNA clone for phenylalanine ammonia-lyase from cut-injured roots of sweet potato. Plant Physiol 90: 1403–1407. 47. 47. Morgante M, Hanafey M, Powell W (2002) Microsatellites are preferentially associated with nonrepetitive DNA in plant genomes. Nat Genet 30: 194–200 48. 48. Marconi TG, Costa E a, Miranda HR, Mancini MC, Cardoso-Silva CB, et al. (2011) Functional markers for gene mapping and genetic diversity studies in sugarcane. BMC Res Notes 4: 264 49. 49. La Rota M, Kantety R V, Yu J-K, Sorrells ME (2005) Nonrandom distribution and frequencies of genomic and EST-derived microsatellite markers in rice, wheat, and barley. BMC Genomics 6: 23 50. 50. Wang Z, Fang B, Chen J, Zhang X, Luo Z, et al. (2010) De novo assembly and characterization of root transcriptome using Illumina paired-end sequencing and development of cSSR markers in sweet potato (Ipomoea batatas). BMC Genomics 11: 726 51. 51. Chen C, Zhou P, Choi Y a, Huang S, Gmitter FG (2006) Mining and characterizing microsatellites from citrus ESTs. Theor Appl Genet 112: 1248–1257 52. 52. Wei W, Qi X, Wang L, Zhang Y, Hua W, et al. (2011) Characterization of the sesame (Sesamum indicum L.) global transcriptome using Illumina paired-end sequencing and development of EST-SSR markers. BMC Genomics 12: 451 53. 53. Fraser LG, Harvey CF, Crowhurst RN, De Silva HN (2004) EST-derived microsatellites from Actinidia species and their potential for mapping. Theor Appl Genet 108: 1010–1016 54. 54. Aggarwal RK, Hendre PS, Varshney RK, Bhat PR, Krishnakumar V, et al. (2007) Identification, characterization and utilization of EST-derived genic microsatellite markers for genome analyses of coffee and related species. Theor Appl Genet 114: 359–372 55. 55. Meglécz E, Nève G, Biffin E, Gardner MG (2012) Breakdown of phylogenetic signal: a survey of microsatellite densities in 454 shotgun sequences from 154 non model eukaryote species. PLoS One 7: e40861 56. 56. Tóth G, Gáspári Z, Jurka J (2000) Microsatellites in different eukaryotic genomes: survey and analysis. Genome Res 10: 967–981. 57. 57. Kumpatla SP, Mukhopadhyay S (2005) Mining and survey of simple sequence repeats in expressed sequence tags of dicotyledonous species. 998: 985–998 58. 58. Splicing PRNA, Coleman TP, Roesser JR, Commonwealth V, Uni V, et al.. (1998) RNA Secondary Structure: An Important cis -Element in Rat Calcitonin/CGRP: 15941–15950. 59. 59. Novaes E, Drost DR, Farmerie WG, Jr GJP, Grattapaglia D, et al. (2008) High-throughput gene and SNP discovery in Eucalyptus grandis, an uncharacterized genome. 14: 1–14 60. 60. Chagné D, Crowhurst RN, Troggio M, Davey MW, Gilmore B, et al. (2012) Genome-wide SNP detection, validation, and development of an 8K SNP array for apple. PLoS One 7: e31745 61. 61. Lijavetzky D, Cabezas JA, Ibáñez A, Rodríguez V, Martínez-Zapater JM (2007) High throughput SNP discovery and genotyping in grapevine (Vitis vinifera L.) by combining a re-sequencing approach and SNPlex technology. BMC Genomics 8: 424 62. 62. Pootakham W, Chanprasert J, Jomchai N, Sangsrakru D, Yoocha T, et al. (2011) Single nucleotide polymorphism marker development in the rubber tree, Hevea brasiliensis (Euphorbiaceae). Am J Bot 98: e337–8 63. 63. Salgado LR, Koop DM, Pinheiro DG, Rivallan R, Le Guen V, et al. (2014) De novo transcriptome analysis of Hevea brasiliensis tissues by RNA-seq and screening for molecular markers. BMC Genomics 15: 236 64. 64. Allegre M, Argout X, Boccara M, Fouet O, Roguet Y, et al. (2012) Discovery and mapping of a new expressed sequence tag-single nucleotide polymorphism and simple sequence repeat panel for large-scale genetic studies and breeding of Theobroma cacao L. DNA Res 19: 23–35 65. 65. Neale DB, Kremer A (2011) Forest tree genomics: growing resources and applications. Nat Rev Genet 12: 111–122 66. 66. Souza LM, Mantello CC, Santos MO, Goncalves PS, Souza A (2009) Microsatellites from rubber tree (Hevea brasiliensis) for genetic diversity analysis and cross-amplification in six Hevea wild species. Conserv Genet Resour 1: 75–79. 67. 67. Le Guen, V Gay, C Xiong, T C, Souza, L M, Rodier-Goud M, Seguin M (2011) Development and characterization of 296 new polymorphic microsatellite markers for rubber tree (Hevea brasiliensis). Plant Breed 130: 294–296. 68. 68. Hirakawa H, Shirasawa K, Ohyama A, Fukuoka H, Aoki K, et al. (2013) Genome-wide SNP genotyping to infer the effects on gene functions in tomato. DNA Res 20: 221–233
{ "url": "https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0102665", "source_domain": "journals.plos.org", "snapshot_id": "crawl=CC-MAIN-2020-10", "warc_metadata": { "Content-Length": "248531", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:NZFCABBO4WPZTQWJN46JQKJHDKTSMIJT", "WARC-Concurrent-To": "<urn:uuid:6a64de67-6d1b-400a-9025-b9f8a6546bfc>", "WARC-Date": "2020-02-24T03:15:26Z", "WARC-IP-Address": "216.74.38.76", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:Q3T6J32GZGR7I2AEZNKYQXZAM7M47ZVG", "WARC-Record-ID": "<urn:uuid:de3d818f-a0c5-4992-8c0d-013a6837e85b>", "WARC-Target-URI": "https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0102665", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d24bec78-b005-4d60-9310-b2d064b3dd66>" }, "warc_info": "isPartOf: CC-MAIN-2020-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-228.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 14, 35, 37, 38, 102, 103, 162, 163, 183, 184, 329, 330, 359, 360, 420, 421, 606, 607, 642, 643, 828, 829, 858, 859, 1044, 1045, 1071, 1072, 1257, 1258, 1293, 1294, 1423, 1424, 1454, 1455, 1539, 1540, 1562, 1563, 1748, 1749, 1776, 1777, 1837, 1838, 2190, 2191, 2336, 2337, 2366, 2402, 2432, 2459, 2495, 2526, 2549, 2576, 2581, 2583, 2584, 2593, 2594, 4257, 4258, 4269, 4270, 4652, 4653, 5379, 5380, 5692, 5693, 6850, 6851, 7199, 7200, 7830, 7831, 8665, 8666, 8904, 8905, 9529, 9530, 10425, 10426, 10448, 10449, 10466, 10467, 10804, 10805, 10850, 10851, 11317, 11318, 11725, 11726, 11767, 11768, 12312, 12313, 12349, 12350, 13233, 13234, 13295, 13296, 13718, 13719, 13938, 13939, 14279, 14280, 14774, 14775, 14808, 14809, 15413, 15414, 15432, 15433, 15705, 15706, 16094, 16095, 16110, 16111, 16928, 16929, 17334, 17335, 17720, 17721, 17744, 17745, 17791, 17792, 18126, 18127, 18137, 18216, 18217, 18267, 18268, 18572, 18573, 18691, 18692, 18702, 18755, 18756, 18915, 18916, 18966, 18967, 19148, 19149, 19190, 19191, 19386, 19387, 19644, 19645, 20002, 20003, 20255, 20256, 20266, 20353, 20354, 20404, 20405, 20582, 20583, 20855, 20856, 21255, 21256, 21284, 21285, 21492, 21493, 21784, 21785, 21795, 21867, 21868, 21918, 21919, 22793, 22794, 22925, 22926, 23109, 23110, 23499, 23500, 23715, 23716, 23754, 23755, 24372, 24373, 24383, 24464, 24465, 24515, 24516, 24723, 24724, 24846, 24847, 24871, 24872, 25153, 25154, 25963, 25964, 25974, 26078, 26079, 26129, 26130, 26292, 26293, 26313, 26314, 26494, 26495, 26877, 26878, 27032, 27033, 27043, 27123, 27124, 27174, 27175, 27204, 27205, 27714, 27715, 28205, 28206, 28498, 28499, 28694, 28695, 28931, 28932, 28965, 28966, 29110, 29111, 29259, 29260, 29639, 29640, 29884, 29885, 30100, 30101, 30655, 30656, 30887, 30888, 30918, 30919, 31430, 31431, 31855, 31856, 32532, 32533, 34040, 34041, 34239, 34240, 34270, 34271, 35108, 35109, 35119, 35194, 35195, 35245, 35246, 35555, 35556, 35828, 35829, 36420, 36421, 36443, 36444, 36598, 36599, 36798, 36799, 37322, 37323, 38337, 38338, 38548, 38549, 38655, 38656, 38782, 38783, 38819, 38820, 39318, 39319, 39639, 39640, 40010, 40011, 40795, 40796, 40808, 40809, 41526, 41527, 41550, 41551, 41562, 41563, 41677, 41678, 41728, 41729, 41736, 41737, 41748, 41749, 41837, 41838, 41888, 41889, 41896, 41897, 41908, 41909, 41990, 41991, 42041, 42042, 42049, 42050, 42061, 42062, 42136, 42137, 42187, 42188, 42195, 42196, 42207, 42208, 42326, 42327, 42377, 42378, 42385, 42386, 42397, 42398, 42445, 42446, 42496, 42497, 42503, 42504, 42515, 42516, 42568, 42569, 42619, 42620, 42626, 42627, 42637, 42638, 42725, 42726, 42776, 42777, 42784, 42785, 42795, 42796, 42871, 42872, 42922, 42923, 42930, 42931, 42941, 42942, 42992, 42993, 43043, 43044, 43051, 43052, 43062, 43063, 43122, 43123, 43173, 43174, 43181, 43182, 43192, 43193, 43260, 43261, 43311, 43312, 43319, 43320, 43330, 43331, 43606, 43607, 43657, 43658, 43665, 43666, 43676, 43677, 43827, 43828, 43878, 43879, 43886, 43887, 43908, 43909, 44115, 44116, 44127, 44128, 44297, 44425, 44559, 44723, 44808, 44928, 45068, 45201, 45373, 45614, 45849, 46055, 46307, 46549, 46791, 47019, 47205, 47384, 47554, 47676, 47861, 48046, 48219, 48351, 48511, 48657, 48792, 49001, 49140, 49236, 49579, 49738, 49966, 50133, 50271, 50389, 50619, 50731, 50890, 51157, 51293, 51515, 51716, 51859, 51993, 52226, 52384, 52574, 52771, 53020, 53175, 53403, 53584, 53844, 54054, 54192, 54349, 54524, 54703, 54887, 55132, 55345, 55556, 55834, 55954, 56194, 56420 ], "line_end_idx": [ 14, 35, 37, 38, 102, 103, 162, 163, 183, 184, 329, 330, 359, 360, 420, 421, 606, 607, 642, 643, 828, 829, 858, 859, 1044, 1045, 1071, 1072, 1257, 1258, 1293, 1294, 1423, 1424, 1454, 1455, 1539, 1540, 1562, 1563, 1748, 1749, 1776, 1777, 1837, 1838, 2190, 2191, 2336, 2337, 2366, 2402, 2432, 2459, 2495, 2526, 2549, 2576, 2581, 2583, 2584, 2593, 2594, 4257, 4258, 4269, 4270, 4652, 4653, 5379, 5380, 5692, 5693, 6850, 6851, 7199, 7200, 7830, 7831, 8665, 8666, 8904, 8905, 9529, 9530, 10425, 10426, 10448, 10449, 10466, 10467, 10804, 10805, 10850, 10851, 11317, 11318, 11725, 11726, 11767, 11768, 12312, 12313, 12349, 12350, 13233, 13234, 13295, 13296, 13718, 13719, 13938, 13939, 14279, 14280, 14774, 14775, 14808, 14809, 15413, 15414, 15432, 15433, 15705, 15706, 16094, 16095, 16110, 16111, 16928, 16929, 17334, 17335, 17720, 17721, 17744, 17745, 17791, 17792, 18126, 18127, 18137, 18216, 18217, 18267, 18268, 18572, 18573, 18691, 18692, 18702, 18755, 18756, 18915, 18916, 18966, 18967, 19148, 19149, 19190, 19191, 19386, 19387, 19644, 19645, 20002, 20003, 20255, 20256, 20266, 20353, 20354, 20404, 20405, 20582, 20583, 20855, 20856, 21255, 21256, 21284, 21285, 21492, 21493, 21784, 21785, 21795, 21867, 21868, 21918, 21919, 22793, 22794, 22925, 22926, 23109, 23110, 23499, 23500, 23715, 23716, 23754, 23755, 24372, 24373, 24383, 24464, 24465, 24515, 24516, 24723, 24724, 24846, 24847, 24871, 24872, 25153, 25154, 25963, 25964, 25974, 26078, 26079, 26129, 26130, 26292, 26293, 26313, 26314, 26494, 26495, 26877, 26878, 27032, 27033, 27043, 27123, 27124, 27174, 27175, 27204, 27205, 27714, 27715, 28205, 28206, 28498, 28499, 28694, 28695, 28931, 28932, 28965, 28966, 29110, 29111, 29259, 29260, 29639, 29640, 29884, 29885, 30100, 30101, 30655, 30656, 30887, 30888, 30918, 30919, 31430, 31431, 31855, 31856, 32532, 32533, 34040, 34041, 34239, 34240, 34270, 34271, 35108, 35109, 35119, 35194, 35195, 35245, 35246, 35555, 35556, 35828, 35829, 36420, 36421, 36443, 36444, 36598, 36599, 36798, 36799, 37322, 37323, 38337, 38338, 38548, 38549, 38655, 38656, 38782, 38783, 38819, 38820, 39318, 39319, 39639, 39640, 40010, 40011, 40795, 40796, 40808, 40809, 41526, 41527, 41550, 41551, 41562, 41563, 41677, 41678, 41728, 41729, 41736, 41737, 41748, 41749, 41837, 41838, 41888, 41889, 41896, 41897, 41908, 41909, 41990, 41991, 42041, 42042, 42049, 42050, 42061, 42062, 42136, 42137, 42187, 42188, 42195, 42196, 42207, 42208, 42326, 42327, 42377, 42378, 42385, 42386, 42397, 42398, 42445, 42446, 42496, 42497, 42503, 42504, 42515, 42516, 42568, 42569, 42619, 42620, 42626, 42627, 42637, 42638, 42725, 42726, 42776, 42777, 42784, 42785, 42795, 42796, 42871, 42872, 42922, 42923, 42930, 42931, 42941, 42942, 42992, 42993, 43043, 43044, 43051, 43052, 43062, 43063, 43122, 43123, 43173, 43174, 43181, 43182, 43192, 43193, 43260, 43261, 43311, 43312, 43319, 43320, 43330, 43331, 43606, 43607, 43657, 43658, 43665, 43666, 43676, 43677, 43827, 43828, 43878, 43879, 43886, 43887, 43908, 43909, 44115, 44116, 44127, 44128, 44297, 44425, 44559, 44723, 44808, 44928, 45068, 45201, 45373, 45614, 45849, 46055, 46307, 46549, 46791, 47019, 47205, 47384, 47554, 47676, 47861, 48046, 48219, 48351, 48511, 48657, 48792, 49001, 49140, 49236, 49579, 49738, 49966, 50133, 50271, 50389, 50619, 50731, 50890, 51157, 51293, 51515, 51716, 51859, 51993, 52226, 52384, 52574, 52771, 53020, 53175, 53403, 53584, 53844, 54054, 54192, 54349, 54524, 54703, 54887, 55132, 55345, 55556, 55834, 55954, 56194, 56420, 56594 ] }
{ "red_pajama_v2": { "ccnet_original_length": 56594, "ccnet_original_nlines": 512, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.2157796323299408, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.06886584311723709, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3234994113445282, "rps_doc_frac_unique_words": 0.2678571343421936, "rps_doc_mean_word_length": 5.3433332443237305, "rps_doc_num_sentences": 780, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 6.5472564697265625, "rps_doc_word_count": 8400, "rps_doc_frac_chars_dupe_10grams": 0.03803136944770813, "rps_doc_frac_chars_dupe_5grams": 0.12481062114238739, "rps_doc_frac_chars_dupe_6grams": 0.07287675142288208, "rps_doc_frac_chars_dupe_7grams": 0.05529810115695, "rps_doc_frac_chars_dupe_8grams": 0.046007491648197174, "rps_doc_frac_chars_dupe_9grams": 0.04199714958667755, "rps_doc_frac_chars_top_2gram": 0.005347120109945536, "rps_doc_frac_chars_top_3gram": 0.004634169861674309, "rps_doc_frac_chars_top_4gram": 0.0066170599311590195, "rps_doc_books_importance": -4811.826171875, "rps_doc_books_importance_length_correction": -4811.826171875, "rps_doc_openwebtext_importance": -2210.910888671875, "rps_doc_openwebtext_importance_length_correction": -2210.910888671875, "rps_doc_wikipedia_importance": -1665.1234130859375, "rps_doc_wikipedia_importance_length_correction": -1665.1234130859375 }, "fasttext": { "dclm": 0.04168533906340599, "english": 0.8875020146369934, "fineweb_edu_approx": 2.527646064758301, "eai_general_math": 0.5924902558326721, "eai_open_web_math": 0.46221762895584106, "eai_web_code": 0.041899438947439194 } }
{ "free_decimal_correspondence": { "primary": { "code": "581.48", "labels": { "level_1": "Science and Natural history", "level_2": "Botany", "level_3": "Plant physiology and Plant anatomy" } }, "secondary": { "code": "572.888", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Anthropology" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-8,656,996,129,514,071,000
LATEST VERSION: 9.5.2 - RELEASE NOTES Pivotal GemFire® v9.5 SELECT Statement The SELECT statement allows you to filter data from the collection of object(s) returned by a WHERE search operation. The projection list is either specified as * or as a comma delimited list of expressions. For *, the interim results of the WHERE clause are returned from the query. Examples: Query all objects from the region using *. Returns the Collection of portfolios (The exampleRegion contains Portfolio as values). SELECT * FROM /exampleRegion Query secIds from positions. Returns the Collection of secIds from the positions of active portfolios: SELECT secId FROM /exampleRegion, positions.values TYPE Position WHERE status = 'active' Returns a Collection of struct<type: String, positions: map> for the active portfolios. The second field of the struct is a Map ( jav.utils.Map ) object, which contains the positions map as the value: SELECT "type", positions FROM /exampleRegion WHERE status = 'active' Returns a Collection of struct<portfolios: Portfolio, values: Position> for the active portfolios: SELECT * FROM /exampleRegion, positions.values TYPE Position WHERE status = 'active' Returns a Collection of struct<pflo: Portfolio, posn: Position> for the active portfolios: SELECT * FROM /exampleRegion portfolio, positions positions TYPE Position WHERE portfolio.status = 'active' SELECT Statement Results The result of a SELECT statement is either UNDEFINED or is a Collection that implements the SelectResults interface. The SelectResults returned from the SELECT statement is either: 1. A collection of objects, returned for these two cases: • When only one expression is specified by the projection list and that expression is not explicitly specified using the fieldname:expression syntax • When the SELECT list is * and a single collection is specified in the FROM clause 2. A collection of Structs that contains the objects When a struct is returned, the name of each field in the struct is determined following this order of preference: 1. If a field is specified explicitly using the fieldname:expression syntax, the fieldname is used. 2. If the SELECT projection list is * and an explicit iterator expression is used in the FROM clause, the iterator variable name is used as the field name. 3. If the field is associated with a region or attribute path, the last attribute name in the path is used. 4. If names cannot be decided based on these rules, arbitrary unique names are generated by the query processor. DISTINCT Use the DISTINCT keyword if you want to limit the results set to unique rows. Note that in the current version of GemFire you are no longer required to use the DISTINCT keyword in your SELECT statement. SELECT DISTINCT * FROM /exampleRegion Note: If you are using DISTINCT queries, you must implement the equals and hashCode methods for the objects that you query. LIMIT You can use the LIMIT keyword at the end of the query string to limit the number of values returned. For example, this query returns at most 10 values: SELECT * FROM /exampleRegion LIMIT 10 ORDER BY You can order your query results in ascending or descending order by using the ORDER BY clause. You must use DISTINCT when you write ORDER BY queries. SELECT DISTINCT * FROM /exampleRegion WHERE ID < 101 ORDER BY ID The following query sorts the results in ascending order: SELECT DISTINCT * FROM /exampleRegion WHERE ID < 101 ORDER BY ID asc The following query sorts the results in descending order: SELECT DISTINCT * FROM /exampleRegion WHERE ID < 101 ORDER BY ID desc Note: If you are using ORDER BY queries, you must implement the equals and hashCode methods for the objects that you query. Preset Query Functions GemFire provides several built-in functions for evaluating or filtering data returned from a query. They include the following: Function Description Example ELEMENT(expr) Extracts a single element from a collection or array. This function throws a FunctionDomainException if the argument is not a collection or array with exactly one element. ELEMENT(SELECT DISTINCT * FROM /exampleRegion WHERE id = 'XYZ-1').status = 'active' IS_DEFINED(expr) Returns TRUE if the expression does not evaluate to UNDEFINED. Inequality queries include undefined values in their query results. With the IS_DEFINED function, you can limit results to only those elements with defined values. IS_DEFINED(SELECT DISTINCT * FROM /exampleRegion p WHERE p.status = 'active') IS_UNDEFINED (expr) Returns TRUE if the expression evaluates to UNDEFINED. With the exception of inequality queries, most queries do not include undefined values in their query results. The IS_UNDEFINED function allows undefined values to be included, so you can identify elements with undefined values. SELECT DISTINCT * FROM /exampleRegion p WHERE IS_UNDEFINED(p.status) NVL(expr1, expr2) Returns expr2 if expr1 is null. The expressions can be query parameters (bind arguments), path expressions, or literals.   TO_DATE(date_str, format_str) Returns a Java Data class object. The arguments must be String S with date_str representing the date and format_str representing the format used by date_str. The format_str you provide is parsed using java.text.SimpleDateFormat.   COUNT The COUNT keyword returns the number of results that match the query selection conditions specified in the WHERE clause. Using COUNT allows you to determine the size of a results set. The COUNT statement always returns an integer as its result. The following queries are example COUNT queries that return region entries: SELECT COUNT(*) FROM /exampleRegion SELECT COUNT(*) FROM /exampleRegion WHERE ID > 0 SELECT COUNT(*) FROM /exampleRegion WHERE ID > 0 LIMIT 50 SELECT COUNT(*) FROM /exampleRegion WHERE ID >0 AND status LIKE 'act%' SELECT COUNT(*) FROM /exampleRegion WHERE ID IN SET(1,2,3,4,5) The following COUNT query returns the total number of StructTypes that match the query’s selection criteria. SELECT COUNT(*) FROM /exampleRegion p, p.positions.values pos WHERE p.ID > 0 AND pos.secId 'IBM' The following COUNT query uses the DISTINCT keyword and eliminates duplicates from the number of results. SELECT DISTINCT COUNT(*) FROM /exampleRegion p, p.positions.values pos WHERE p.ID > 0 OR p.status = 'active' OR pos.secId OR pos.secId = 'IBM'
{ "url": "http://gemfire.docs.pivotal.io/95/geode/developing/query_select/the_select_statement.html", "source_domain": "gemfire.docs.pivotal.io", "snapshot_id": "crawl=CC-MAIN-2018-47", "warc_metadata": { "Content-Length": "257300", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:3QFNJ7F6GU4SGX6QEMUQ6BQUKRWGDLP3", "WARC-Concurrent-To": "<urn:uuid:e26403fd-ea88-4d2e-9acd-f036403a836d>", "WARC-Date": "2018-11-15T14:42:37Z", "WARC-IP-Address": "54.210.178.40", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:IXC3ZIUKJBH74QWKGNWZG3XIBJDGA3WO", "WARC-Record-ID": "<urn:uuid:e1d166cc-02e3-4acb-a386-ac9cd8d542f4>", "WARC-Target-URI": "http://gemfire.docs.pivotal.io/95/geode/developing/query_select/the_select_statement.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:7a7d3831-92b4-4943-988e-d2be8f6a2eb5>" }, "warc_info": "isPartOf: CC-MAIN-2018-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-168-131.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 38, 60, 61, 78, 79, 287, 288, 364, 365, 375, 376, 506, 507, 536, 537, 640, 641, 707, 731, 732, 933, 934, 980, 1004, 1005, 1104, 1105, 1153, 1191, 1192, 1283, 1284, 1345, 1393, 1394, 1419, 1420, 1537, 1538, 1602, 1603, 1663, 1664, 1817, 1905, 1960, 1961, 2075, 2076, 2178, 2336, 2446, 2561, 2562, 2571, 2572, 2775, 2776, 2814, 2815, 2939, 2940, 2946, 2947, 3048, 3049, 3100, 3101, 3139, 3140, 3149, 3150, 3301, 3302, 3367, 3368, 3426, 3427, 3496, 3497, 3556, 3557, 3627, 3628, 3752, 3753, 3776, 3777, 3905, 3906, 3935, 4121, 4148, 4170, 4209, 4453, 4483, 4506, 4533, 4837, 4856, 4879, 4908, 5049, 5310, 5311, 5317, 5318, 5563, 5564, 5640, 5641, 5677, 5726, 5784, 5821, 5856, 5893, 5920, 5921, 6030, 6031, 6048, 6095, 6130, 6131, 6237, 6238, 6263, 6309, 6360 ], "line_end_idx": [ 38, 60, 61, 78, 79, 287, 288, 364, 365, 375, 376, 506, 507, 536, 537, 640, 641, 707, 731, 732, 933, 934, 980, 1004, 1005, 1104, 1105, 1153, 1191, 1192, 1283, 1284, 1345, 1393, 1394, 1419, 1420, 1537, 1538, 1602, 1603, 1663, 1664, 1817, 1905, 1960, 1961, 2075, 2076, 2178, 2336, 2446, 2561, 2562, 2571, 2572, 2775, 2776, 2814, 2815, 2939, 2940, 2946, 2947, 3048, 3049, 3100, 3101, 3139, 3140, 3149, 3150, 3301, 3302, 3367, 3368, 3426, 3427, 3496, 3497, 3556, 3557, 3627, 3628, 3752, 3753, 3776, 3777, 3905, 3906, 3935, 4121, 4148, 4170, 4209, 4453, 4483, 4506, 4533, 4837, 4856, 4879, 4908, 5049, 5310, 5311, 5317, 5318, 5563, 5564, 5640, 5641, 5677, 5726, 5784, 5821, 5856, 5893, 5920, 5921, 6030, 6031, 6048, 6095, 6130, 6131, 6237, 6238, 6263, 6309, 6360, 6380 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6380, "ccnet_original_nlines": 131, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.28278687596321106, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.13360655307769775, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.21639344096183777, "rps_doc_frac_unique_words": 0.27205100655555725, "rps_doc_mean_word_length": 5.364505767822266, "rps_doc_num_sentences": 68, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.8384246826171875, "rps_doc_word_count": 941, "rps_doc_frac_chars_dupe_10grams": 0.09350237995386124, "rps_doc_frac_chars_dupe_5grams": 0.23236925899982452, "rps_doc_frac_chars_dupe_6grams": 0.19671157002449036, "rps_doc_frac_chars_dupe_7grams": 0.189778134226799, "rps_doc_frac_chars_dupe_8grams": 0.13133913278579712, "rps_doc_frac_chars_dupe_9grams": 0.11370839923620224, "rps_doc_frac_chars_top_2gram": 0.06735341250896454, "rps_doc_frac_chars_top_3gram": 0.03922345116734505, "rps_doc_frac_chars_top_4gram": 0.038034871220588684, "rps_doc_books_importance": -572.8020629882812, "rps_doc_books_importance_length_correction": -572.8020629882812, "rps_doc_openwebtext_importance": -341.153564453125, "rps_doc_openwebtext_importance_length_correction": -341.153564453125, "rps_doc_wikipedia_importance": -177.54061889648438, "rps_doc_wikipedia_importance_length_correction": -177.54061889648438 }, "fasttext": { "dclm": 0.7934107184410095, "english": 0.6716284155845642, "fineweb_edu_approx": 2.312481641769409, "eai_general_math": 0.6451132297515869, "eai_open_web_math": 0.09456908702850342, "eai_web_code": 0.9881522059440613 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.44", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "5", "label": "Exceptionally Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
-2,809,641,747,830,824,400
Beefy Boxes and Bandwidth Generously Provided by pair Networks Don't ask to ask, just ask   PerlMonks   Re: Ensuring only one copy of a perl script is running at a time by Moron (Curate) on Dec 19, 2006 at 16:54 UTC ( #590700=note: print w/ replies, xml ) Need Help?? in reply to Ensuring only one copy of a perl script is running at a time As I understand it, the first argument to flock must be a filehandle. So the fact that the tricky use of __DATA__ works on unix seems better characterised as an unclosed loophole and your own solution as the correct version that accords with the manual. -M Free your mind • Comment on Re: Ensuring only one copy of a perl script is running at a time Replies are listed 'Best First'. Re^2: Ensuring only one copy of a perl script is running at a time by ikegami (Pope) on Dec 19, 2006 at 17:38 UTC The problem is that Windows uses mandatory locking, while unix uses advisory locking. It has nothing to do with DATA. Perl doesn't check if the file is locked, so advisory locks are completely ignored. However, when mandatory locking is involved, perl can't read the source file when it's locked. DATA is a filehandle to the file being executed. It's well known that one can seek to offset 0 of DATA to read the source code. Locking DATA is the same thing as locking the file whose name is in $0. It doesn't matter how you lock the script (using DATA or $0 (as shown below)), the problem still exists. use strict; use warnings; use Fcntl qw(:flock); print "start of program\n"; open(my $script_fh, '<', $0) or die("Unable to open script source: $!\n"); unless (flock($script_fh, LOCK_EX|LOCK_NB)) { print "$0 is already running. Exiting.\n"; exit(1); } print "sleeping 15...\n"; sleep(15); print "end of program\n"; __DATA__ This exists so flock() code above works. DO NOT REMOVE THIS DATA SECTION. Update: Updated the non-code portion for clarity. While executing the above script the contents of the given file in the script gets deleted.WHY???? I don't know what you are talking about. The script neither takes a file nor does it delete or even write anything. The fact that locking behaviour differs in general by platform is not relevant because (see manual link labelled 'it' in earlier reply) flock deliberately uses its own advisory locking irrespective of platform precisely for such reasons of portability. -M Free your mind I find extremely rude posts that do nothing but contradict the parent when the poster could have verified that the parent was correct. You're wrong. flock does NOT use its own advisory locking. If flock implemented some kind of advisory locking, Windows's type command would know nothing of it, yet it can't read a file locked using flock. use Fcntl qw( :flock ); open(my $fh, '>', 'file') or die("Unable to open file: $!\n"); print $fh ("ok\n"); print("type without lock:\n"); system("type file"); print("\n"); flock($fh, LOCK_EX|LOCK_NB) or die("Unable to lock file: $!\n"); print("type with lock:\n"); system("type file"); unlink('file'); outputs >perl 590735.pl type without lock: ok type with lock: The process cannot access the file because another process has locked +a portion of the file. Tested with 5.6.0, 5.6.1, 5.8.0 and 5.8.8. Update: Updated to show that type works when the file isn't locked by flock. Log In? Username: Password: What's my password? Create A New User Node Status? node history Node Type: note [id://590700] help Chatterbox? and the web crawler heard nothing... How do I use this? | Other CB clients Other Users? Others scrutinizing the Monastery: (5) As of 2016-07-24 20:49 GMT Sections? Information? Find Nodes? Leftovers? Voting Booth? What is your favorite alternate name for a (specific) keyboard key? Results (221 votes). Check out past polls.
{ "url": "http://www.perlmonks.org/index.pl?node_id=590700", "source_domain": "www.perlmonks.org", "snapshot_id": "crawl=CC-MAIN-2016-30", "warc_metadata": { "Content-Length": "28753", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:RCUSWWEHJSIYTRHJYAPYMZA26NYCR7S5", "WARC-Concurrent-To": "<urn:uuid:c8b47eb3-98c1-4ffa-81cf-c9c93b399164>", "WARC-Date": "2016-07-24T20:50:28Z", "WARC-IP-Address": "216.92.34.251", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:GAI5J2NCSOTY6YNHMQ3PTHJPBPCYICLH", "WARC-Record-ID": "<urn:uuid:cc5f8dc8-2a53-48e4-b31f-ff0973146968>", "WARC-Target-URI": "http://www.perlmonks.org/index.pl?node_id=590700", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:105bacd7-a5bc-4e14-9048-718ad897175f>" }, "warc_info": "robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 63, 90, 92, 104, 105, 170, 171, 189, 270, 271, 272, 345, 346, 600, 601, 604, 605, 620, 621, 701, 702, 735, 802, 849, 850, 1151, 1152, 1461, 1462, 1863, 1864, 1918, 1919, 2024, 2148, 2407, 2408, 2417, 2418, 2439, 2440, 2583, 2584, 2797, 2798, 3108, 3109, 3125, 3126, 3282, 3283, 3334, 3335, 3420, 3421, 3429, 3439, 3449, 3450, 3470, 3488, 3501, 3514, 3544, 3549, 3561, 3598, 3599, 3637, 3650, 3689, 3716, 3726, 3739, 3751, 3762, 3780, 3852, 3853, 3854, 3855, 3856, 3857, 3858, 3859, 3860, 3861, 3862, 3863, 3864, 3865, 3866, 3867, 3868, 3869, 3870 ], "line_end_idx": [ 63, 90, 92, 104, 105, 170, 171, 189, 270, 271, 272, 345, 346, 600, 601, 604, 605, 620, 621, 701, 702, 735, 802, 849, 850, 1151, 1152, 1461, 1462, 1863, 1864, 1918, 1919, 2024, 2148, 2407, 2408, 2417, 2418, 2439, 2440, 2583, 2584, 2797, 2798, 3108, 3109, 3125, 3126, 3282, 3283, 3334, 3335, 3420, 3421, 3429, 3439, 3449, 3450, 3470, 3488, 3501, 3514, 3544, 3549, 3561, 3598, 3599, 3637, 3650, 3689, 3716, 3726, 3739, 3751, 3762, 3780, 3852, 3853, 3854, 3855, 3856, 3857, 3858, 3859, 3860, 3861, 3862, 3863, 3864, 3865, 3866, 3867, 3868, 3869, 3870, 3916 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3916, "ccnet_original_nlines": 96, "rps_doc_curly_bracket": 0.0005107300239615142, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.31214529275894165, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03405221179127693, "rps_doc_frac_lines_end_with_ellipsis": 0.010309279896318913, "rps_doc_frac_no_alph_words": 0.2780930697917938, "rps_doc_frac_unique_words": 0.4725806415081024, "rps_doc_mean_word_length": 4.561290264129639, "rps_doc_num_sentences": 57, "rps_doc_symbol_to_word_ratio": 0.0034052201081067324, "rps_doc_unigram_entropy": 5.259995937347412, "rps_doc_word_count": 620, "rps_doc_frac_chars_dupe_10grams": 0.07072135806083679, "rps_doc_frac_chars_dupe_5grams": 0.0799151286482811, "rps_doc_frac_chars_dupe_6grams": 0.07072135806083679, "rps_doc_frac_chars_dupe_7grams": 0.07072135806083679, "rps_doc_frac_chars_dupe_8grams": 0.07072135806083679, "rps_doc_frac_chars_dupe_9grams": 0.07072135806083679, "rps_doc_frac_chars_top_2gram": 0.014851490035653114, "rps_doc_frac_chars_top_3gram": 0.021216409280896187, "rps_doc_frac_chars_top_4gram": 0.02687411941587925, "rps_doc_books_importance": -390.3998107910156, "rps_doc_books_importance_length_correction": -390.3998107910156, "rps_doc_openwebtext_importance": -182.73968505859375, "rps_doc_openwebtext_importance_length_correction": -182.73968505859375, "rps_doc_wikipedia_importance": -110.7895736694336, "rps_doc_wikipedia_importance_length_correction": -110.7895736694336 }, "fasttext": { "dclm": 0.10622721910476685, "english": 0.9142302870750427, "fineweb_edu_approx": 2.3232970237731934, "eai_general_math": 0.24832481145858765, "eai_open_web_math": 0.31891411542892456, "eai_web_code": 0.024218620732426643 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.133", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.67", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-7,030,061,416,288,167,000
"Standard Deviation" Essays and Research Papers 11 - 20 of 500 Standard Deviation and Minimum Order mean+0.67*SD (standard deviation). According to z table, z equal to 0.67 when probability is 0.75. Therefore, we can calculate quantity for each style include the risk of stock out by using formulate Q*=mean+z*SD. Therefore, we can get the maximum order units for each style in order to avoid stock out. Figure 1 |Style |Price |Average |Standard |2*standard |P=1-8%/(24%+8|Z |Q*=Average+z*SD | | | |forecast |deviation |deviation... Premium People's Republic of China, Risk, Economy of the People's Republic of China 1732  Words | 7  Pages Open Document Probability: Standard Deviation and Pic 9551/SQRT(300),1) = 0.0783 (c) A circuit contains three resistors wired in series. Each is rated at 6 ohms. Suppose, however, that the true resistance of each one is a normally distributed random variable with a mean of 6 ohms and a standard deviation of 0.3 ohm. What is the probability that the combined resistance will exceed 19 ohms? How "precise" would the manufacturing process have to be to make the probability less than 0.005 that the combined resistance of the circuit would exceed 19... Premium Probability theory, Ohm's law, Random variable 558  Words | 3  Pages Open Document Random Variable and Standard Deviation the mean from part b find the standard deviation of the probability distribution. 8. A computer password consists of two letters followed by a five-digit number, none of which can be repeated. After 3 tries the computer locks down and notifies security. a) What is the probability of guessing the correct password on the first try? b) What it the probability of guessing the correct password within three tries? 9. Find the mean and standard deviation of the binomial distribution... Premium Probability theory, Standard deviation, Discrete probability distribution 560  Words | 3  Pages Open Document Standard Deviation and Probability order is long and uncertain. This time gap is called “lead time.” From past experience, the materials manager notes that the company’s demand for glue during the uncertain lead time is normally distributed with a mean of 187.6 gallons and a standard deviation of 12.4 gallons. The company follows a policy of placing an order when the glue stock falls to a predetermined value called the “reorder point.” Note that if the reorder point is x gallons and the demand during lead time exceeds x gallons... Premium Standard deviation, Safety stock, Reorder point 514  Words | 3  Pages Open Document Standard Deviation and Gulf View Condominiums Sales Price |   | Days to Sell |   |   |   |   |   |   |   | Mean | 474007.5 | Mean | 454222.5 | Mean | 106 | Standard Error | 31194.293 | Standard Error | 30439.72954 | Standard Error | 8.256078 | Median | 437000 | Median | 417500 | Median | 96 | Mode | 975000 | Mode | 305000 | Mode | 85 | Standard Deviation | 197290.03 | Standard Deviation | 192517.7534 | Standard Deviation | 52.21602 | Sample Variance | 3.892E+10 | Sample Variance | 37063085378 | Sample Variance | 2726.513 | Kurtosis... Premium Mean, Normal distribution, Standard deviation 913  Words | 4  Pages Open Document Standard Deviation and Double Degree in analysing the data is determining if outliers exists within the data. The presence of outliers must be evaluated because their existence could distort the data and make it inaccurate. In order to determine if outliers exist the average and standard deviation must be calculated in order to calculate the Z score, which will show, wither or not outliers exist. In this instance to outliers where found present in the data set as all of the data fell within the +3,-3 range, the largest positive outlier... Premium Factor analysis, Median, Normal distribution 1218  Words | 5  Pages Open Document Quiz: Standard Deviation and Confidence Interval Estimate corresponds to a 94% level of confidence. A. 1.88 B. 1.66 C. 1.96 D. 2.33 2. In a sample of 10 randomly selected women, it was found that their mean height was 63.4 inches. Form previous studies, it is assumed that the standard deviation, σ, is 2.4. Construct the 95% confidence interval for the population mean. A. (61.9, 64.9) B. (58.1, 67.3) C. (59.7, 66.5) D. (60.8, 65.4) 3. Suppose a 95% confidence interval for µ turns out to be (120, 310). To make... Premium Confidence interval, Sample size, Statistical inference 973  Words | 4  Pages Open Document Standard deviation abstract Standard Deviation Abstract QRB/501 Standard Deviation Abstract Standard Deviations Are Not Perverse Purpose: The purpose of this article is to illustrate how using statistical data, such as standard deviation, can help a cattleman choose the best lot of calf’s at auction. The statistical data used in these decision making processes can also help the cattleman with future analysis of the lots purchased and existing stock. Research Question: How can understanding the standard deviation... Premium Normal distribution, National Hockey League, Unbiased estimation of standard deviation 1465  Words | 5  Pages Open Document Biology Homework Stansard Deviation 14, 14, 15, 15, 16. The mean is 14.0mm.What is the best estimate of the standard deviation? 
 -1mm 5  1000 bananas were collected from a single plantation and weighed.Their masses formed a normal distribution. How many bananas would be expected to be within 2 standard deviations of the mean? 
 -950 6  In a normal distribution, what percentage of values fall within ±1 standard deviation of the mean and
±2 standard deviations of the mean? 
 -1= 68% -2=95% 7  The lengths of the leaves of dandelion plants... Premium Median, Cauchy distribution, Mean 669  Words | 4  Pages Open Document standard deviation Standard deviation can be difficult to interpret as a single number on its own. Basically, a small standard deviation means that the values in a statistical data set are close to the mean of the data set, on average, and a large standard deviation means that the values in the data set are farther away from the mean, on average. The standard deviation measures how concentrated the data are around the mean; the more concentrated, the smaller the standard deviation. A small standard deviation can... Premium Real number, Mean, Statistics 507  Words | 2  Pages Open Document Become a StudyMode Member Sign Up - It's Free
{ "url": "https://www.studymode.com/subjects/standard-deviation-page2.html", "source_domain": "www.studymode.com", "snapshot_id": "crawl=CC-MAIN-2021-25", "warc_metadata": { "Content-Length": "104456", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:QYYSKQIDX35SJQLKI7ZBWM4OV6VA5TRU", "WARC-Concurrent-To": "<urn:uuid:639e1fdc-5e5a-42f1-a8cb-5f9fd34453ca>", "WARC-Date": "2021-06-17T01:29:01Z", "WARC-IP-Address": "13.32.182.96", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:PE5XUJIRBDCULC33S65DYBIPP3PGNXQA", "WARC-Record-ID": "<urn:uuid:6179ee11-93cf-4ff0-ab42-6532959f89b7>", "WARC-Target-URI": "https://www.studymode.com/subjects/standard-deviation-page2.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:8b6c6d10-7afa-49da-8f4b-abce628d0184>" }, "warc_info": "isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-34.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 48, 49, 64, 65, 102, 103, 536, 537, 644, 645, 659, 660, 700, 701, 1199, 1200, 1277, 1278, 1292, 1293, 1332, 1333, 1817, 1818, 1922, 1923, 1937, 1938, 1973, 1974, 2476, 2477, 2555, 2556, 2570, 2571, 2617, 2618, 3113, 3114, 3190, 3191, 3205, 3206, 3243, 3244, 3752, 3753, 3829, 3830, 3844, 3845, 3903, 3904, 4363, 4364, 4450, 4451, 4465, 4466, 4494, 4495, 4988, 4989, 5107, 5108, 5122, 5123, 5159, 5160, 5670, 5671, 5735, 5736, 5750, 5751, 5770, 5771, 6273, 6274, 6334, 6335, 6349, 6350, 6376, 6377 ], "line_end_idx": [ 48, 49, 64, 65, 102, 103, 536, 537, 644, 645, 659, 660, 700, 701, 1199, 1200, 1277, 1278, 1292, 1293, 1332, 1333, 1817, 1818, 1922, 1923, 1937, 1938, 1973, 1974, 2476, 2477, 2555, 2556, 2570, 2571, 2617, 2618, 3113, 3114, 3190, 3191, 3205, 3206, 3243, 3244, 3752, 3753, 3829, 3830, 3844, 3845, 3903, 3904, 4363, 4364, 4450, 4451, 4465, 4466, 4494, 4495, 4988, 4989, 5107, 5108, 5122, 5123, 5159, 5160, 5670, 5671, 5735, 5736, 5750, 5751, 5770, 5771, 6273, 6274, 6334, 6335, 6349, 6350, 6376, 6377, 6396 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6396, "ccnet_original_nlines": 86, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.2598484754562378, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.01666666939854622, "rps_doc_frac_lines_end_with_ellipsis": 0.1149425283074379, "rps_doc_frac_no_alph_words": 0.32121211290359497, "rps_doc_frac_unique_words": 0.4082051217556, "rps_doc_mean_word_length": 5.094358921051025, "rps_doc_num_sentences": 93, "rps_doc_symbol_to_word_ratio": 0.007575760129839182, "rps_doc_unigram_entropy": 5.232043743133545, "rps_doc_word_count": 975, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.10791222006082535, "rps_doc_frac_chars_dupe_6grams": 0.0738876610994339, "rps_doc_frac_chars_dupe_7grams": 0.07328367233276367, "rps_doc_frac_chars_dupe_8grams": 0.01731427013874054, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.12321320921182632, "rps_doc_frac_chars_top_3gram": 0.034225888550281525, "rps_doc_frac_chars_top_4gram": 0.02516609989106655, "rps_doc_books_importance": -508.2071228027344, "rps_doc_books_importance_length_correction": -508.2071228027344, "rps_doc_openwebtext_importance": -368.0993957519531, "rps_doc_openwebtext_importance_length_correction": -368.0993957519531, "rps_doc_wikipedia_importance": -261.488037109375, "rps_doc_wikipedia_importance_length_correction": -261.488037109375 }, "fasttext": { "dclm": 0.7021359801292419, "english": 0.843676745891571, "fineweb_edu_approx": 2.307882785797119, "eai_general_math": 0.9568971991539001, "eai_open_web_math": 0.6560418605804443, "eai_web_code": 0.21996068954467773 } }
{ "free_decimal_correspondence": { "primary": { "code": "519.5", "labels": { "level_1": "Science and Natural history", "level_2": "Mathematics", "level_3": "Probabilities; or, Mathematical statistics" } }, "secondary": { "code": "519.2", "labels": { "level_1": "Science and Natural history", "level_2": "Mathematics", "level_3": "Probabilities; or, Mathematical statistics" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "2", "label": "Academic/Research" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "6", "label": "Content Listing" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-1,824,611,936,323,225,000
Safety Control Technology of Deepwater Perforated Gas Well Testing Abstract Due to the high difficulties, high investment, and high risks in deepwater oil and gas well testing, major safety problems can occur easily. A key to prevent accidents is to conduct safety assessment and control on deepwater testing and to improve the testing technology. The deepwater of the South China Sea has some special environmental features: long distance from offshore, frequent typhoons in summer and constant monsoons in winter, and the presence of sandy slopes, sandy ridges and internal waves, coupled with the complex properties of oil and gas reserves which bring more challenges to deepwater well testing. In combination with deepwater well testing practice in the South China Sea, this paper analyzes the main potential risks in deepwater well testing and concludes that there are risks of failures of testing string, tools, and ground processes. Other risks are gas hydrate blockage, reservoir stratum sanding, and typhoon impacts. Specific precautions are also proposed in response to these risks in the paper. Share and Cite: Liang, H. and Wu, M. (2019) Safety Control Technology of Deepwater Perforated Gas Well Testing. Engineering, 11, 131-136. doi: 10.4236/eng.2019.113011. 1. Introduction The deepwater zone in the South China Sea which is called “the second Person Gulf” is vast, rich of petroleum and natural gas hydrate reserves [1] [2] . A number of significant discoveries of natural gas reserves have been achieved recently [3] [4] . As an irreplaceable tool in deepwater oil and gas exploration and production, well testing not only provides valuable information for structure and trap evaluation, but also paves the way for effective oil and gas production. However, deepwater well testing technology in China is in its infancy stage currently [5] [6] [7] [8] . In order to meet the strategic needs of deepwater oil and gas exploitation in the South China Sea, safety assessment and control technique of deepwater well testing is investigated. 2. Challenges of Deepwater Well Testing 1) Deepwater well testing should be accomplished with floating drilling platform. Affected by factors like wind, wave, and current, the platform is under constant complex movements such as rising, sinking, and drifting. Besides, the deepwater well testing string should also be constrained by the riser. As a result, the forces on the test string, especially that above the mud line, is extraordinarily complicated, which has brought with significant difficulty for its design and safety control. This challenge is even tougher as water depth increases. 2) The combination of low temperature at the mud line and the rapid drop of pressure once well shut-in is the major lure for natural gas hydrate, which will bring with not only failure to the test, but also dramatic risks to the well control, or even catastrophic accidents. 3) Under water facilities should work against the tough surroundings brought by the great water depth to ensure the entire well testing process is upon reliable foundations. Moreover, other factors including the limited space of the platform, the narrow window of formation pressure, high production rate and high formation pressure, will also add the challenges to well control and surface safety control. 4) As the test is conducted on a floating platform, unpredictable incidents like the breakdown of positioning system, undercurrents, and bad weather, will make the platform drift away from the well head. Under this situation, test string above the mud line should be dismissed from the rest in order to avoid a catastrophe. Consequently, the fast dismission of the string under emergency and the re-connection after that are other challenges in well testing. 3. Potential Risks and Their Preventive Measures of Deepwater Well Testing 3.1. Failure and Its Prevention of Testing String and Facilities The test string, from which the underground fluid flow to the surface, is composed with three major components: bottom-hole test facilities, testing tubing, and under water facilities. For safety purpose, suitable bottom-hole test facilities should be selected. Besides, the test tubing should be optimized through specific mechanical analysis with the target of safety and high quality. It should not merely satisfy the demand of test process in the toughest environment, but also be convenient in use, suitable in material and economical. According to such principles, the optimization workflow of the tubing design in deepwater testing is shown as following (showing in Figure 1). 3.2. Failure and Its Prevention of Surface Process A typical surface process of deepwater well testing includes: the flow head, safety Figure 1. Optimization workflow of the string design in deepwater well testing. valves, emergency shutdown valves, a desander, choke manifold, a steam boiler and heater, a three-phase separator, a gauge tank, a conveying pump, a temporary supply tank, a burner boom, and connecting manifold, etc. This process is short in flow distance (only dozens of meters from the burner wall to well head), high in pressure, short in flow time (generally about 1 day), and complex in phase change processes. Ice blockage is risky to take place during the test, bringing about great danger to the personnel and the test. So a series of emergency shutdown facilities should be equipped in the manifold to ensure that any place can be artificially shut-in in emergency. A desander is needed to remove sands in potential sand producing formations. A large discharge pump for chemicals is installed at the well head to inject methanol to prevent gas hydrate. All the pressure vessels in deepwater well testing should be qualified with a third party qualification such as DNV, ABS or Lioyd according to their period of validity. Once the lectotype of facilities is finished, the workflow should be numerically simulated to check whether the temperature and pressure are in proper range, and the capability of the facilities is correct. Then the further optimization of the facilities and pipelines should be conducted. 3.3. Prediction and Control of Natural Gas Hydrate Natural gas hydrate is a kind of cage-like crystal formed when the gaseous natural gas (like methane and ethane) reacts with water in low temperature (0˚C - 10˚C) and high pressure (over 10 MPa) environment. It is like ice crumbles or compacted snow in appearance, so it is usually called “flammable ice”. The density is 880 - 900 kg/m3. Natural gas with free water are risky to transform into gas hydrate in low temperature and high pressure surroundings. Currently there are a number of approaches to determine the pressure-temperature at which natural gas hydrate comes into being. Roughly, they can be classified as: graph approach, empirical equation approach, balance constant approach, and statistical thermodynamics approach which is the most accurate yet complicated method. On the basis of system theory, the statistical thermodynamics approach connects the macro phase behavior of gas hydrate with the inter-molecular reactions. By employing functions to describe the creation conditions of gas hydrate, this method is beneficial from the solid theoretical foundation and has a wide applicable range. With the help of computer, it can be applied to continuously calculate the temperature and pressure at which gas hydrate forms in a relatively wide range. According to the classical absorption theory proposed by Vander Waals and Platteeuw, the phase balance conditions of gas hydrate can be applied to determine whether solid hydrate appears at given pressure, temperature and other conditions. As for well testing process, thermal or chemical methods are commonly used to prevent hydrate. The thermal method is applied to heat up the natural gas before choke. If the pressure drop at the choke keeps constant, to increase the temperature of the natural gas before choke means to increase the temperature of the gas after that. Once the temperature of the gas after choke is higher than the critical temperature at which hydrate appears, the target of hydrate prevention is achieved. Some chemicals are helpful to decrease the balance temperature of gas hydrate. Under certain pressure, the balance pressure decreases as the chemical concentration rises. A lot of investigations have been conducted by researchers all over the world on the chemicals which can impede gas hydrate. Methanol and ethanediol are the most commonly used chemicals for this purpose, and the former is the recognized most effective gas hydrate inhibitor in deepwater well testing. It has the following advantages: 1) low viscosity, easy to injection and allocation; 2) high solubility and volatility, easy to contact with other fluids in the wellbore; 3) easy to be burned with the produced gas. But as methanol is toxic and highly flammable, the safety aspect should be paid more attention to. The procedure of methanol injection should be clearly written in the Operation Procedure, and in the procedures of the testing company and the contractor. Flow rate is another factor for gas hydrate, which is easier to appear at lower flow rate. Temperature change is violated at the mud line as the temperature at seabed is quite low. As is shown in Figure 2, No hydrate appears when the flow rate is 25 × 104 m3/d. 3.4. Sanding Risks and Control Reservoirs in deepwater zones are generally shallow in buried depths. Furthermore, the compaction degree is decreased as a large interval of rock formations are substituted by sea water, whose density is less. As a result, sand production is common. In order for sand control, on one aspect, suitable well completion approaches should be adopted according to the specific property of the pay zone; on another aspect, sand control techniques should be applied whenever necessary. Figure 2. Generated area of hydrate under different flow capacity. Mechanical sand control techniques are commonly used as the first barrier for sand production in deepwater evaluation wells. Some sand control measurements in Liwan Block, South China Sea are provided here. 1) All the wells are cemented with casing, which is helpful for sand control in the casing. 2) Qty-2 Meshrite screen pipe is attached on DST-TCP string and extended below the packer. Coiled tubing and related lifting frame for sand wash are prepared on the site. 3) Pressure drop in the test is strictly controlled. Proper perforation fluid is selected. The pressure difference in the time-lapse underbalanced perforation is limited to 2.76 MPa. 4) Test valves should be designed to work against the sand. 5) A sand monitor and desander are set at the upstream of the choke manifold. An oil pool is prepared to contain the separated sand. 6) Production pressure difference is closely monitored during the production process, in which the production rate increases gradually from a small beginning. Control the flow pressure at well head within the sand production limitations. 7) Supervise the sand content in the produced fluid by taking a sample every 15 min from the separator. 3.5. Typhoon Prediction Typhoon is a factor responsible for the excursion of the platform, which further affects the stress state of the pipe string above mud line. Once the excursion exceeds the limitation, the testing tree should be immediately dismissed to avoid the breaking of the string. According to the depth of water and the demands of the testing tree, the safety operation window of the floating platform can be calculated considering factors like the response time of the testing tree, response time of BOP, and drift analysis of the platform. When the platform drifts away to an extent, the bottom-hole valves should be shutdown, testing tree dismissed. The safety operation windows are marked with different colors. Green represents that the dynamic positioning system works well and normal operations can be conducted. Blue-green means that the dismission limit is close, and operation should be pause. The valves in the testing tree should be shutdown. Drifts of the platform should be monitored more closely, and the dismission of the string above mud line is prepared. Yellow zones means immediate dismission should be taken out. If the color is red, that is means the dynamic positioning system is broken down completely. LMRP should be departed from BOP instantly to prevent the well head, BOP and risers from being broken. 4. Conclusion Due to the limited space, intense facilities and personnel, tough natural environment, and remote distance from land-based supports, any accidents may result in significant loss. In the testing period, as the underground oil and gas is produced to the surface through the testing string, once the linkage of the string is out of control, catastrophe would happen. One of the key points to prevent accidents is to conduct the safety assessment and control in the deepwater testing process. Test data should be gathered within safety limitation. Conflicts of Interest The authors declare no conflicts of interest regarding the publication of this paper. References [1] Xie, Y.H. (2015) Status and Prospect of Proprietary Oil and Gas Field Exploration and Development in Deepwater West Area of South China Sea. Oil Drilling & Production Technology, 37, 11-13. [2] Xie, Y.H. (2014) A Major Breakthrough in Deepwater Natural Gas Exploration in a Self-Run Oil/Gas Field in the Northern South China Sea and Its Enlightenment. Natural Gas Industry, 34, 1-8. [3] Wu, M.W., Yang, H.J., Liang, H., et al. (2015) Key Techniques and Practices of Critical Flow Based Tests for Deepwater Exploration Wells: A Case Study of Deep Water Area in the Qiongdongnan Basin. Natural Gas Industry, 35, 65-70. [4] Wu, M.W., Liang, H. and Jiang, H.F. (2015) Key Technology of Testing Design for High-Permeability Gas Well in Deep Water Area of the Qiongdongnan Basin. China Offshore Oil and Gas, 6, 31-36. [5] Yang, S.K., Dai, Y.D., Lv, Y. and Guan, L.J. (2009) Key Techniques of Gas Well Testing in South China Sea Deep Water. China Offshore Oil and Gas, 4, 237-241. [6] Dai, Z., Luo, D.H., Liang, W., et al. (2012) A DST Design and Practice in Deep-Water Gasfields, South China Sea. China Offshore Oil and Gas, 1, 25-28. [7] Zhang, X.T. (2010) The Structure Design of Well Completion Test String in Deep Water. China University of Petroleum, Beijing. [8] Xie, X., Fu, J.H., Zhang, Z. and He, Y.F. (2011) Mechanical Analysis of Deep Water Well-Testing Strings. Natural Gas Industry, 31, 77-79. Copyright © 2023 by authors and Scientific Research Publishing Inc. Creative Commons License This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
{ "url": "https://www.scirp.org/journal/PaperInformation.aspx?paperID=91291&", "source_domain": "www.scirp.org", "snapshot_id": "CC-MAIN-2023-40", "warc_metadata": { "Content-Length": "90541", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:WVFCOB3CDLYSLZKWGNRSHFIBAIJF2D7U", "WARC-Concurrent-To": "<urn:uuid:8fbf6a76-7a5f-40c3-98e6-322ab5ad158b>", "WARC-Date": "2023-10-03T14:07:29Z", "WARC-IP-Address": "107.191.112.46", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:FEAZXIXDSWNJ6YGQBG2DREMAJCF56MBL", "WARC-Record-ID": "<urn:uuid:0f83b761-5fd2-41ec-b868-afbb049d3499>", "WARC-Target-URI": "https://www.scirp.org/journal/PaperInformation.aspx?paperID=91291&", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a67de5c2-cf1b-43f4-96e7-076208d27ed3>" }, "warc_info": "isPartOf: CC-MAIN-2023-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-67\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 67, 68, 77, 78, 1108, 1109, 1125, 1126, 1278, 1279, 1295, 1296, 2059, 2060, 2100, 2101, 2655, 2656, 2931, 2932, 3339, 3340, 3799, 3800, 3875, 3876, 3941, 3942, 4626, 4627, 4678, 4679, 4763, 4764, 4844, 4845, 5707, 5708, 6167, 6168, 6219, 6220, 7487, 7488, 8217, 8218, 9159, 9160, 9422, 9423, 9454, 9455, 9934, 9935, 10002, 10003, 10210, 10211, 11192, 11193, 11217, 11218, 12538, 12539, 12553, 12554, 13098, 13099, 13121, 13122, 13208, 13209, 13220, 13221, 13415, 13608, 13842, 14037, 14199, 14354, 14484, 14626, 14627, 14695, 14696, 14721, 14722 ], "line_end_idx": [ 67, 68, 77, 78, 1108, 1109, 1125, 1126, 1278, 1279, 1295, 1296, 2059, 2060, 2100, 2101, 2655, 2656, 2931, 2932, 3339, 3340, 3799, 3800, 3875, 3876, 3941, 3942, 4626, 4627, 4678, 4679, 4763, 4764, 4844, 4845, 5707, 5708, 6167, 6168, 6219, 6220, 7487, 7488, 8217, 8218, 9159, 9160, 9422, 9423, 9454, 9455, 9934, 9935, 10002, 10003, 10210, 10211, 11192, 11193, 11217, 11218, 12538, 12539, 12553, 12554, 13098, 13099, 13121, 13122, 13208, 13209, 13220, 13221, 13415, 13608, 13842, 14037, 14199, 14354, 14484, 14626, 14627, 14695, 14696, 14721, 14722, 14833 ] }
{ "red_pajama_v2": { "ccnet_original_length": 14833, "ccnet_original_nlines": 87, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3180865943431854, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.01990222930908203, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.19448323547840118, "rps_doc_frac_unique_words": 0.3255418539047241, "rps_doc_mean_word_length": 5.087547779083252, "rps_doc_num_sentences": 176, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.616591930389404, "rps_doc_word_count": 2353, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.051958899945020676, "rps_doc_frac_chars_dupe_6grams": 0.022303899750113487, "rps_doc_frac_chars_dupe_7grams": 0.00969007983803749, "rps_doc_frac_chars_dupe_8grams": 0.00969007983803749, "rps_doc_frac_chars_dupe_9grams": 0.00969007983803749, "rps_doc_frac_chars_top_2gram": 0.010441900230944157, "rps_doc_frac_chars_top_3gram": 0.021719150245189667, "rps_doc_frac_chars_top_4gram": 0.0053462497889995575, "rps_doc_books_importance": -1312.2308349609375, "rps_doc_books_importance_length_correction": -1312.2308349609375, "rps_doc_openwebtext_importance": -836.6395874023438, "rps_doc_openwebtext_importance_length_correction": -836.6395874023438, "rps_doc_wikipedia_importance": -504.3072204589844, "rps_doc_wikipedia_importance_length_correction": -504.3072204589844 }, "fasttext": { "dclm": 0.03538858890533447, "english": 0.9301354885101318, "fineweb_edu_approx": 2.669581890106201, "eai_general_math": 0.6603959798812866, "eai_open_web_math": 0.3364928960800171, "eai_web_code": 0.018780289217829704 } }
{ "free_decimal_correspondence": { "primary": { "code": "622.222", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mining engineering and Mines and mineral resources" } }, "secondary": { "code": "622.22", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mining engineering and Mines and mineral resources" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-4,489,816,661,749,648,000
Objective Play audio with VLC in Python. Distributions This will work on any Linux distribution Requirements A working Linux install with Python and VLC. Difficulty Easy Conventions • # - requires given command to be executed with root privileges either directly as a root user or by use of sudo command • $ - given command to be executed as a regular non-privileged user Introduction There are plenty of ways to play audio files with Python. It really depends on your application, but the easiest way, by far, is to use the bindings for VLC to control VLC with Python, and play your files. With VLC, you don't need to worry about codecs and file support. It also doesn't require too many complicated methods, and/or objects. So, for simple audio playback, VLC is best. Get The VLC Bindings The VLC bindings are actually developed and maintained by VLC. That said, the easiest way is still to use pip # pip install python-vlc Of course, if this is for a single project, use virtualenv instead. Set Up Your File Creating your file is very simple. You only need to import the VLC module. import VLC That's really all. You can use the module to create MediaPlayer instances, and that's what's necessary to play audio. Create A Media Player Object Again, the VLC module is super easy to use. You only need to instantiate a MediaPlayer object and pass it the audio file that you want to play. VLC can handle virtually any file type, so you don't need to worry about compatibility. player = vlc.MediaPlayer("/path/to/file.flac") Play A Song Playing a file from an existing object is even easier. You only need to call the play method on the object, and Python will begin playing it. When the playback finishes, it will stop. There's no looping or any nonsense like that. player.play() Stopping And Pause The VLC bindings make it easy to stop or pause a file once you've started playing it too. There is a pause method that will pause playback if the file is playing. player.pause() If the player is already paused, calling the method again will resume playback. To stop a file altogether, call the stop method. player.stop Looping And "Playlists" You can actually create pseudo-playlists with this, and loop through the songs that you've added. It would only take a basic for loop. playlist = ['/path/to/song1.flac', '/path/to/song2.flac', 'path/to/song3.flac'] for song in playlist: player = vlc.MediaPlayer(song) player.play() That's obviously very rudimentary, but you can see how Python can script VLC. Closing Thoughts VLC isn't the only solution for playing audio with Python, and it certainly isn't the best in every situation, but it is very good for a lot of basic use cases. The greatest bonus of using VLC is the unbeatable simplicity. Exercises 1. Install the Python VLC bindings with pip in a virtual environment. 2. Create a Python file and import the VLC bindings. 3. Instantiate a player object to play a file. 4. Play that file. 5. Play the file again. Pause and resume playback. 6. Create a loop to play multiple files in order. 7. Challenge: Generate a list of files using Python modules to interact with directories on your system. Play them as a playlist.
{ "url": "https://linuxconfig.org/how-to-play-audio-with-vlc-in-python", "source_domain": "linuxconfig.org", "snapshot_id": "crawl=CC-MAIN-2018-17", "warc_metadata": { "Content-Length": "79257", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:KL3BV6FAKKLU7CUZJOD2AGUEUE44EMHA", "WARC-Concurrent-To": "<urn:uuid:1cfe48e6-fe2b-410b-9fa2-809928361cb9>", "WARC-Date": "2018-04-24T18:33:15Z", "WARC-IP-Address": "104.27.6.18", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:27QLUNIQOJPFTGBJYG5X6DRC4K46HTYC", "WARC-Record-ID": "<urn:uuid:7f4dbe96-1f42-42ff-9c58-514f6e91f9a5>", "WARC-Target-URI": "https://linuxconfig.org/how-to-play-audio-with-vlc-in-python", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:5d26f34c-deaf-49b6-9167-34fc32852cd6>" }, "warc_info": "robots: classic\r\nhostname: ip-10-16-217-249.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-17\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for April 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 10, 11, 42, 43, 57, 58, 99, 100, 113, 114, 159, 160, 171, 172, 177, 178, 190, 191, 315, 385, 386, 399, 400, 606, 607, 786, 787, 808, 809, 919, 944, 1012, 1013, 1030, 1031, 1106, 1117, 1235, 1236, 1265, 1266, 1498, 1545, 1546, 1558, 1559, 1789, 1803, 1804, 1823, 1824, 1987, 2002, 2131, 2143, 2144, 2168, 2169, 2304, 2384, 2385, 2407, 2442, 2457, 2535, 2536, 2553, 2554, 2777, 2778, 2788, 2789, 2861, 2916, 2965, 2986, 3039, 3091 ], "line_end_idx": [ 10, 11, 42, 43, 57, 58, 99, 100, 113, 114, 159, 160, 171, 172, 177, 178, 190, 191, 315, 385, 386, 399, 400, 606, 607, 786, 787, 808, 809, 919, 944, 1012, 1013, 1030, 1031, 1106, 1117, 1235, 1236, 1265, 1266, 1498, 1545, 1546, 1558, 1559, 1789, 1803, 1804, 1823, 1824, 1987, 2002, 2131, 2143, 2144, 2168, 2169, 2304, 2384, 2385, 2407, 2442, 2457, 2535, 2536, 2553, 2554, 2777, 2778, 2788, 2789, 2861, 2916, 2965, 2986, 3039, 3091, 3222 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3222, "ccnet_original_nlines": 78, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.35971224308013916, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03165467828512192, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1942445933818817, "rps_doc_frac_unique_words": 0.399624764919281, "rps_doc_mean_word_length": 4.675422191619873, "rps_doc_num_sentences": 55, "rps_doc_symbol_to_word_ratio": 0.0028776999097317457, "rps_doc_unigram_entropy": 4.847533226013184, "rps_doc_word_count": 533, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.037720710039138794, "rps_doc_frac_chars_dupe_6grams": 0.018459070473909378, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.014446229673922062, "rps_doc_frac_chars_top_3gram": 0.02247191034257412, "rps_doc_frac_chars_top_4gram": 0.015650080516934395, "rps_doc_books_importance": -315.01446533203125, "rps_doc_books_importance_length_correction": -315.01446533203125, "rps_doc_openwebtext_importance": -169.86929321289062, "rps_doc_openwebtext_importance_length_correction": -169.86929321289062, "rps_doc_wikipedia_importance": -118.39822387695312, "rps_doc_wikipedia_importance_length_correction": -118.39822387695312 }, "fasttext": { "dclm": 0.9611156582832336, "english": 0.9298893809318542, "fineweb_edu_approx": 2.42612886428833, "eai_general_math": 0.6143531203269958, "eai_open_web_math": 0.08444268256425858, "eai_web_code": 0.686652660369873 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.133", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "006.691", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Cognitive science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "1", "label": "No Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
-1,122,952,418,253,533,800
Compton Revision as of 04:58, September 25, 2014 by Drobbins (Talk | contribs) (spaces right after the | in fancynote will cause things to look pre-formatted; fixing.) x11-misc No contents found at URL http://ports.funtoo.org/packages.xml. Source Repository:Repository:Gentoo Portage Tree https://www.github.com/chjj/compton/ Summary: A compositor for X. No contents found at URL http://127.0.0.1:8888/portage/meta/x11-misc. News Drobbins Perl Updates Gentoo has bumped perl from 5.20 to 5.22. Be sure to run perl-cleaner --all after the upgrade. 2015-07-25 by Drobbins Drobbins ARM Rebuild ARM systems will use new stage3's that are not compatible with earlier versions. 2015-06-27 by Drobbins Drobbins ABI X86 64 and 32 Funtoo Linux has new 32-bit compatibility libraries inherited from Gentoo. Learn about them here. 2015-06-18 by Drobbins More... Compton Tip We welcome improvements to this page. To edit this page, Create a Funtoo account. Then log in and then click here to edit this page. See our editing guidelines to becoming a wiki-editing pro. History and background Compton was originally created as a fork of Dana Jansen's fork of Xcompmgr. It was refactored and bugs were fixed as it grew into a standalone project. Today it has many improvements and unique features when compared with other lightweight compositors such as Xcompmgr. Here are some of them: • OpenGL backend • Inactive window transparency • Create your own blur kernel and use it to blur unopaque window backgrounds • Custom-colored window drop shadows Installation To install compton, just emerge it: # emerge -av compton Configuration Creating a custom blur kernel The version of compton in the Funtoo repositories comes with another application called compton-convgen. compton-convgen allows you to generate custom blurs for the backgrounds of transparent window borders, menus, etc. compton-convgen takes the following switches: • -f: This option allows you to changes factors such as the sigma (standard deviation) of the blur kernel. A sigma of three to five looks nice and generates blurs similar to those seen in Windows 7 Aero and in the Ubuntu Unity launcher. To set the sigma value, enter something like: -f sigma=3 • --dump-compton: If you add this switch, compton-convgen will format the output in a way that can be used with compton. This is recommended. • type: The type of blur kernel to use. Options include box and gaussian. • width: The width of the blur kernel. As mentioned earlier, if you want an appearance like that of Windows Aero or Ubuntu Unity, a sigma of three to five accompanied by a gaussian with a width and height of 13 does the trick. • height: Not required if you enter height (so long as you want width and height to be equivalent). Note The height and width parameters must be odd-numbered. To build a blur (convolution) kernel of type gaussian with a sigma of three and a height of 13, run the following: $ compton-convgen -f sigma=3 --dump-compton gaussian 13 This should output some long string of values that begins with: 13,13,0.018316,0.033746,0.055638,0.082085,0.108368,0.128022,0.135335,0.128022,0.108368,0.082085,0.055638,0.033746,0.018316,0.033746,0.062177,0.102512,0.151240,0.199666,0.235877,0.249352,0.235877,0.199666,0.151240,0.102512,0.062177, Applying the custom blur kernel to compton Now that we have generated our own custom blur kernel, we can add it to our .config/compton.conf so that our transparent windows have blurred backgrounds. To do this, create a line of text in your compton.conf that says: ~/.config/compton.conf blur-kern = " Then, copy the output of compton-convgen (minus the trailing comma at the end) to the right side of this line in your .config/compton.conf. After you have copied it over, go back into your compton.conf and add a quote and semicolon to the end of the blur-kern entry. For example: ~/.config/compton.conf blur-kern = "a bunch of numbers and commas that you have pasted in........."; Now that the blur-kern is in our compton.conf, we can test it out. Go into your compton.conf again and add the following lines to make window borders transparent: ~/.config/compton.conf blur-kern = "a bunch of numbers and commas that you have pasted in........."; frame-opacity = 0.50; blur-background = true; After adding these lines, try launching compton. If you see that the borders of windows are now transparent and blurred, congratulations! If the borders are transparent, but not blurred, check that you entered the lines correctly and then relaunch compton. If that does not work, try adding the line backend = "glx"; to your compton.conf. If, after relaunching compton, this does not fix the issue, you may need to look into if your graphics drivers support such actions.
{ "url": "http://www.funtoo.org/index.php?title=Linux_Containers&oldid=5804", "source_domain": "www.funtoo.org", "snapshot_id": "crawl=CC-MAIN-2015-32", "warc_metadata": { "Content-Length": "27929", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:TPKBG5BLYK7N7UXEKU4HRAW2VGXQAOUR", "WARC-Concurrent-To": "<urn:uuid:9bd33924-f3f4-42cd-91c1-b513ba3152c4>", "WARC-Date": "2015-07-30T02:12:29Z", "WARC-IP-Address": "72.18.147.156", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:54KUFRAM3LJRIM4RLWQRQAHRS4P27RSC", "WARC-Record-ID": "<urn:uuid:80c81206-40ff-4061-830f-de4cc7cc6b2d>", "WARC-Target-URI": "http://www.funtoo.org/index.php?title=Linux_Containers&oldid=5804", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:757c7a7d-b288-4394-bbf8-f5ba879206e5>" }, "warc_info": "robots: classic\r\nhostname: ip-10-236-191-2.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-32\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for August 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 8, 9, 169, 170, 179, 180, 181, 244, 293, 294, 331, 332, 431, 432, 437, 438, 447, 448, 461, 462, 557, 580, 589, 590, 602, 603, 684, 707, 716, 717, 735, 736, 834, 857, 865, 866, 874, 875, 879, 880, 1072, 1073, 1096, 1097, 1390, 1391, 1410, 1443, 1522, 1561, 1562, 1575, 1576, 1612, 1613, 1634, 1635, 1649, 1650, 1680, 1681, 1947, 1948, 2244, 2388, 2464, 2693, 2795, 2800, 2801, 2855, 2856, 2971, 2972, 3028, 3029, 3093, 3094, 3326, 3327, 3370, 3371, 3592, 3593, 3616, 3630, 3631, 3911, 3912, 3935, 4013, 4014, 4177, 4178, 4201, 4279, 4301, 4325, 4326 ], "line_end_idx": [ 8, 9, 169, 170, 179, 180, 181, 244, 293, 294, 331, 332, 431, 432, 437, 438, 447, 448, 461, 462, 557, 580, 589, 590, 602, 603, 684, 707, 716, 717, 735, 736, 834, 857, 865, 866, 874, 875, 879, 880, 1072, 1073, 1096, 1097, 1390, 1391, 1410, 1443, 1522, 1561, 1562, 1575, 1576, 1612, 1613, 1634, 1635, 1649, 1650, 1680, 1681, 1947, 1948, 2244, 2388, 2464, 2693, 2795, 2800, 2801, 2855, 2856, 2971, 2972, 3028, 3029, 3093, 3094, 3326, 3327, 3370, 3371, 3592, 3593, 3616, 3630, 3631, 3911, 3912, 3935, 4013, 4014, 4177, 4178, 4201, 4279, 4301, 4325, 4326, 4797 ] }
{ "red_pajama_v2": { "ccnet_original_length": 4797, "ccnet_original_nlines": 99, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3003696799278259, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.008317929692566395, "rps_doc_frac_lines_end_with_ellipsis": 0.009999999776482582, "rps_doc_frac_no_alph_words": 0.3123844563961029, "rps_doc_frac_unique_words": 0.4307692348957062, "rps_doc_mean_word_length": 5.216783046722412, "rps_doc_num_sentences": 91, "rps_doc_symbol_to_word_ratio": 0.007393720094114542, "rps_doc_unigram_entropy": 5.2081475257873535, "rps_doc_word_count": 715, "rps_doc_frac_chars_dupe_10grams": 0.036461129784584045, "rps_doc_frac_chars_dupe_5grams": 0.057372648268938065, "rps_doc_frac_chars_dupe_6grams": 0.0466487891972065, "rps_doc_frac_chars_dupe_7grams": 0.036461129784584045, "rps_doc_frac_chars_dupe_8grams": 0.036461129784584045, "rps_doc_frac_chars_dupe_9grams": 0.036461129784584045, "rps_doc_frac_chars_top_2gram": 0.01876676082611084, "rps_doc_frac_chars_top_3gram": 0.012868629768490791, "rps_doc_frac_chars_top_4gram": 0.010455760173499584, "rps_doc_books_importance": -429.3985900878906, "rps_doc_books_importance_length_correction": -429.3985900878906, "rps_doc_openwebtext_importance": -230.9855499267578, "rps_doc_openwebtext_importance_length_correction": -230.9855499267578, "rps_doc_wikipedia_importance": -167.29397583007812, "rps_doc_wikipedia_importance_length_correction": -167.29397583007812 }, "fasttext": { "dclm": 0.03170258179306984, "english": 0.8919399976730347, "fineweb_edu_approx": 2.2068819999694824, "eai_general_math": 0.6403975486755371, "eai_open_web_math": 0.31901663541793823, "eai_web_code": 0.19828253984451294 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.0285", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.456", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-5,245,033,636,265,549,000
Do Antibiotics Cause Constipation Introduction :- Are you taking antibiotics and wondering “Do antibiotics cause constipation?”  You are in the right place, We will discuss this in detail Can Antibiotics Cause Constipation? Although antibiotics might induce gastrointestinal problems, constipation is not one of them. Antibiotics, on the other hand, might affect the gut microbiota, causing gastrointestinal disorders such as diarrhoea or constipation. The risk of constipation is determined by the antibiotic used and other personal risk factors. If a person develops constipation while taking antibiotics, they should not blame the medication but rather consider boosting their hydration and fibre diet as well as daily exercise to keep their bowels moving. If a person experiences severe symptoms, such as a new or worsening fever, or if their side effects continue to worsen, they should seek medical treatment. How To Treat Constipation Caused By Antibiotics? If a person develops constipation while taking antibiotics, they should not blame the medication but rather consider boosting their hydration and fibre diet as well as daily exercise to keep their bowels moving. If the constipation is caused by antibiotics, there are numerous treatments available, including: Stool softeners, such as docusate sodium, can help soften stools and make them easier to pass.  Laxatives, such as polyethylene glycol (PEG), can help stimulate bowel movements and relieve constipation.  Probiotics: Taking probiotics can help restore the balance of bacteria in the gut and reduce the risk of constipation caused by antibiotics. Fibre supplements, such as psyllium, can help bulk up stools and encourage regular bowel movements. Drinking enough fluids, such as water and herbal tea, can help keep stools soft and prevent constipation.  Daily exercise helps bowel movements and prevent constipation.  Before mixing any two medications or beginning any new treatment for antibiotic-induced constipation, consult with your doctor or chemist. What Is The Time Frame To Recover From Antibiotic Caused Constipation? There is no specific time frame for recovering from antibiotic-induced constipation. Even after the antibiotics have been removed from a person’s body, the alterations to the stomach that induce constipation may persist. There are two ways antibiotics might cause constipation. The first is by wreaking havoc on gut bacteria, and the second is by depleting the body of critical nutrients that aid in digestion. Antibiotics seldom induce constipation, but they can cause diarrhoea, cramps, and nausea. If constipation is severe, unpleasant, or occurs in conjunction with other gastrointestinal symptoms, a person should consult a doctor. What Can Increase The Risk Of Constipation? Some risk factors that may enhance the chance of antibiotic-induced constipation include:  Older people are more likely than younger adults to develop constipation as a result of antibiotics. The longer a person takes antibiotics, the greater the risk of getting constipation. Some antibiotics are more likely than others to produce constipation. People who have pre-existing gastrointestinal issues, such as irritable bowel syndrome (IBS), are more likely to have antibiotic-induced constipation. 1. Poor diet: A diet low in fibre and high in processed foods can increase the risk of antibiotic-induced constipation. Lack of exercise: A sedentary lifestyle can raise the risk of antibiotic-induced constipation. How Do Antibiotics Affect Gut Bacteria? Antibiotics can have a substantial impact on the gut microbiome, which is the diverse mix of bacteria that grows in the stomach and aids digestion. Antibiotics can have a number of negative effects on the gut microbiota, including decreased species diversity, changes in metabolic activity, and the selection of antibiotic-resistant organisms, resulting in downstream effects such as antibiotic-associated diarrhoea and recurring difficile infections.  Most antibiotics operate by killing or stopping bacteria from developing, but because they can’t tell the difference between good and bad bacteria, they can wreak havoc on the gut’s healthy bacteria.  Changes in the gut microbiome can induce a variety of gastrointestinal problems, including infections. diarrhoea. Are There Any Natural Therapies That Can Treat Constipation Caused By Antibiotics? While antibiotics almost never cause constipation, there are some natural therapies that can be used to prevent or alleviate constipation while on antibiotics. Increase your intake of fluids and fibre. Drinking plenty of water and eating high-fibre meals can help keep your intestines flowing and prevent constipation. Probiotic supplements can help restore the balance of healthy bacteria in the stomach and avoid gastrointestinal problems. Herbal medicines, such as senna, psyllium, and aloe vera, can be used to ease constipation. However, before using any herbal medicines, consult with a doctor or pharmacist, especially if you are taking antibiotics. To avoid unwanted alteration of the gut flora, antibiotics should only be used when absolutely essential. Can Drinking Water Reduce The Risk Of Constipation? Drinking more water while taking antibiotics can help reduce constipation. Constipation is frequently caused by dehydration, which makes it difficult to pass a bowel movement. Drinking enough water and being hydrated can therefore help keep the intestines flowing and prevent constipation. Increasing fibre intake and exercising regularly, in addition to drinking more water, can help reduce constipation when taking antibiotics. If constipation is severe, painful, or happens in conjunction with other gastrointestinal symptoms, a person should consult a doctor. What High-Fibre Foods Can Help Prevent Constipation? While taking antibiotics, eating high-fibre foods can help prevent constipation. Here are some high-fibre dietary examples: Beans, lentils, and chickpeas are high in fibre and can aid in digestion. Almonds, chia seeds, and flaxseeds are high in fibre and can aid in constipation prevention. Apples, oranges, berries, pears, and figs are high in fibre and can aid in bowel movement. Broccoli, carrots, peas, and leafy greens like spinach and kale are all high in fibre. Fibre-rich foods such as brown rice, whole wheat bread, and whole grain pasta can help reduce constipation. Conclusion  Hence , after going through the blog, you are now able to answer the question “Can antibiotics make you constipated? If you have any questions, let us know in the comments below. By Caitlyn
{ "url": "https://healtholine.com/do-antibiotics-cause-constipation/", "source_domain": "healtholine.com", "snapshot_id": "CC-MAIN-2024-38", "warc_metadata": { "Content-Length": "140802", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:ZLF3PP2FJKF4FSWOFBHAJLCC27V7XV5P", "WARC-Concurrent-To": "<urn:uuid:e9c8f94e-c98f-40bc-9d2c-ade77573e5ad>", "WARC-Date": "2024-09-08T16:54:06Z", "WARC-IP-Address": "154.41.250.7", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:23TBH7LPRK7LEGGYMTW5XVNFACYIL4R3", "WARC-Record-ID": "<urn:uuid:d4a0bdcc-b38b-499e-a575-8508eab15895>", "WARC-Target-URI": "https://healtholine.com/do-antibiotics-cause-constipation/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:941a30d5-b1b8-44b7-a902-16f67a08f0e3>" }, "warc_info": "isPartOf: CC-MAIN-2024-38\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 34, 35, 51, 52, 190, 191, 227, 228, 920, 921, 970, 971, 1281, 1282, 1378, 1379, 1487, 1488, 1629, 1630, 1730, 1731, 1838, 1839, 1902, 1903, 2043, 2044, 2115, 2116, 2753, 2754, 2798, 2799, 2890, 2891, 2992, 2993, 3078, 3079, 3149, 3150, 3516, 3517, 3557, 3558, 4326, 4327, 4410, 4411, 4571, 4572, 4731, 4732, 4855, 4856, 5071, 5072, 5178, 5179, 5231, 5232, 5307, 5308, 5797, 5798, 5851, 5852, 5976, 5977, 6051, 6052, 6145, 6146, 6237, 6238, 6325, 6326, 6434, 6435, 6447, 6448, 6627, 6628 ], "line_end_idx": [ 34, 35, 51, 52, 190, 191, 227, 228, 920, 921, 970, 971, 1281, 1282, 1378, 1379, 1487, 1488, 1629, 1630, 1730, 1731, 1838, 1839, 1902, 1903, 2043, 2044, 2115, 2116, 2753, 2754, 2798, 2799, 2890, 2891, 2992, 2993, 3078, 3079, 3149, 3150, 3516, 3517, 3557, 3558, 4326, 4327, 4410, 4411, 4571, 4572, 4731, 4732, 4855, 4856, 5071, 5072, 5178, 5179, 5231, 5232, 5307, 5308, 5797, 5798, 5851, 5852, 5976, 5977, 6051, 6052, 6145, 6146, 6237, 6238, 6325, 6326, 6434, 6435, 6447, 6448, 6627, 6628, 6638 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6638, "ccnet_original_nlines": 84, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3585069477558136, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.003472219919785857, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1397569328546524, "rps_doc_frac_unique_words": 0.3661538362503052, "rps_doc_mean_word_length": 5.592820644378662, "rps_doc_num_sentences": 61, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.191868782043457, "rps_doc_word_count": 975, "rps_doc_frac_chars_dupe_10grams": 0.09389326721429825, "rps_doc_frac_chars_dupe_5grams": 0.1888868510723114, "rps_doc_frac_chars_dupe_6grams": 0.13185402750968933, "rps_doc_frac_chars_dupe_7grams": 0.10764717310667038, "rps_doc_frac_chars_dupe_8grams": 0.10764717310667038, "rps_doc_frac_chars_dupe_9grams": 0.09389326721429825, "rps_doc_frac_chars_top_2gram": 0.015404360368847847, "rps_doc_frac_chars_top_3gram": 0.011553269810974598, "rps_doc_frac_chars_top_4gram": 0.015404360368847847, "rps_doc_books_importance": -451.36224365234375, "rps_doc_books_importance_length_correction": -451.36224365234375, "rps_doc_openwebtext_importance": -283.5605773925781, "rps_doc_openwebtext_importance_length_correction": -283.5605773925781, "rps_doc_wikipedia_importance": -208.37815856933594, "rps_doc_wikipedia_importance_length_correction": -208.37815856933594 }, "fasttext": { "dclm": 0.8686478137969971, "english": 0.9221892952919006, "fineweb_edu_approx": 3.2001187801361084, "eai_general_math": 0.028861820697784424, "eai_open_web_math": 0.2700740098953247, "eai_web_code": 0.0076231397688388824 } }
{ "free_decimal_correspondence": { "primary": { "code": "615.522028", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Materia medica, Drugs, and Pharmacy" } }, "secondary": { "code": "615.522", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Materia medica, Drugs, and Pharmacy" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "9", "label": "FAQ" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-4,181,621,440,034,684,400
Next Article in Journal Study of Condensate Absorption Capacity in Exposed Soil when Water Recedes at the Bottom of Hoh Xil Lake, Qinghai Next Article in Special Issue Water Leakage and Crack Identification in Tunnels Based on Transfer-Learning and Convolutional Neural Networks Previous Article in Journal The Study on the Ballast Water Management of Mailiao Exclusive Industrial Harbor in Taiwan Previous Article in Special Issue Removal of Copper (II) from Aqueous Solution by a Hierarchical Porous Hydroxylapatite-Biochar Composite Prepared with Sugarcane Top Internode Biotemplate     Order Article Reprints Font Type: Arial Georgia Verdana Font Size: Aa Aa Aa Line Spacing: Column Width: Background: Article Evaluation of the Karst Collapse Susceptibility of Subgrade Based on the AHP Method of ArcGIS and Prevention Measures: A Case Study of the Quannan Expressway, Section K1379+300-K1471+920 1 Department of Energy Engineering and Building Environment, Guilin University of Aerospace Technology, Guilin 541004, China 2 College of Civil Engineering and Architecture, Guilin University of Technology, Guilin 541004, China 3 Guangxi Hualan Geotechnical Engineering Co., Ltd., Nanning 530001, China 4 Institute of Karst Geology, Chinese Academy of Geological Sciences, Guilin 541004, China * Author to whom correspondence should be addressed. Water 2022, 14(9), 1432; https://doi.org/10.3390/w14091432 Received: 31 March 2022 / Revised: 24 April 2022 / Accepted: 27 April 2022 / Published: 29 April 2022 (This article belongs to the Special Issue Water–Rock/Soil Interaction) Abstract : In order to solve the problem of geological disasters caused by karst collapse in the K1379+300-K1471+920 section of the Quannan Expressway reconstruction and expansion, the evaluation of karst collapse susceptibility in the study area was carried out, and the corresponding prevention measures are put forward. Firstly, by identifying and determining the susceptible factors of karst collapse in the study area, three criterion layers, including the basic geological conditions, karst collapse impact, and human activities were selected, with a total of seven susceptible factors. The analytic hierarchy process (AHP) was used to assign values to each factor, and the evaluation model of karst collapse susceptibility in the study area was established. Then, using the spatial analysis function of ArcGIS, the seven susceptible factor partition maps were superimposed according to the evaluation model, and the evaluation map of the karst collapse susceptibility was obtained. The study area was divided into five levels of susceptibility: extremely susceptible areas (2.64–2.81), susceptible areas (2.43–2.64), somewhat susceptible areas (1.88–2.43), non-susceptible areas (1.04–1.88), and non-karst areas (0.51–1.04). The length of the extremely susceptible area is 11.90 km, 12.85% of the total length of the route, and the susceptible area, somewhat susceptible area, non-susceptible area, and non-karst area account for 25.05%, 39.54%, 11.01%, and 11.55% of the total length, respectively. The research results of the karst collapse susceptibility in the area are consistent with the actual situation. Finally, combined with the research results, prevention measures for karst collapse are put forward, which provide a reference for the prevention and mitigation of disaster in engineering construction. 1. Introduction Karst collapse is a dynamic geological phenomenon in which the surface rock and soil bodies sink downward under the action of natural or human factors and form collapse pits (holes) in the ground, which is one of the main types of geological disasters in karst areas [1,2,3,4,5]. According to the statistics, 17 countries have been plagued by karst collapse problems. China is one of the countries with the most extensive karst collapse development in the world, covering 23 provinces and cities in China, among which karst collapse is especially serious in Guangxi, Guizhou, and Hubei, greatly affecting the economic construction and livable environment. Therefore, it is extremely necessary to solve the problem of karst collapse, which must be theoretically analyzed and mastered first. It is extremely important to select an effective evaluation method of karst collapse susceptibility, and then select the corresponding prevention measures on this basis, which will often achieve better results. However, due to the influence of many factors, the formation of karst collapse has a large degree of uncertainty, both in time and space [6,7,8]. The selection of suitable evaluation methods has always puzzled researchers [9,10,11], for which they have made a lot of efforts. From the 1960s to the present, the studies on karst collapse evaluation have been fruitful. Wang Fei [12], Yang Yang [13], Miao Shixian [14], Mu Chunmei [15], Wan Zhibo [16], Gao Xuechi [17], etc. have analyzed the evolution mechanism of karst collapse through field monitoring, experiments, and the analysis of triggering factors. Since the factors affecting karst collapse are multi-faceted, multi-layered, interrelated, and mutually restrictive, their degrees of influence are different, meaning many methods cannot be directly applied to karst collapse evaluation. Therefore, Hengheng [6], Zhong Yu [18], Wu Liqing [19], Duan Xianqian [20], Ouyang Hui [21], Cui Yuliang [22], etc. carried out quantitative predictive evaluations of karst collapse in time and space through different evaluation index systems and methods and achieved certain results. In order to seek a reliable evaluation method of karst collapse, through continuous exploration and application research, many experts and scholars, such as Pan Zongyuan [3], Zhang Jie [5], Zeng Bin [8], Li Xi [23], Chen Juyan [24], etc., have gradually confirmed that AHP methods and GIS technologies have better applicability and good reliability in karst collapse evaluation. The advantages of AHP methods and GIS technologies are also obvious [25,26,27,28,29]. For the karst collapse problem, Xiao Jianqiu [30], Peng Yuhuan [31], Zhang Baozhu [32], Luo Xiaojie [33], etc., based on the effective evaluation of karst collapse susceptibility and combined with karst collapse-inducing factors and the karst geological structure, proposed a management plan and prevention measures for karst collapse and achieved better results. In order to adapt to the economic development of the ASEAN region and ensure smooth and safe economic transportation, it is necessary to renovate and expand section K1379+300-K1471+920 of the Quannan Expressway. The total length of the route is 92.62 km, 72% of which is located in the karst area. The karst collapse is the main risk factor in the construction and operation of the expressway. It is of great significance to carry out the prediction and evaluation of karst collapse and propose prevention and control methods for the whole route to ensure the safe construction and operation of the expressway after completion, and to promote the steady economic development of the ASEAN region. In this paper, based on the previous research results, the evaluation index system and evaluation model of the karst collapse susceptibility are established by the AHP method, the evaluation of the karst collapse susceptibility of the K1379+300-K1471+920 section of the Quannan Expressway is carried out by ArcGIS analysis technology, and the prevention measures for karst collapse are proposed to provide a reference for disaster prevention and mitigation work. The research of this paper plays a guiding role in the safe construction and operation of the expressway after completion, which is of great practical significance. At the same time, it is of certain academic research value, as it promotes and draws reference from the research on the karst collapse of several route projects. 2. Overview of the Research Area 2.1. Natural Geography The range of the study area is the K1379+300–K1471+920 section of the Quannan Expressway Expansion Project, which belongs to Binyang County, Heng County, and the Yongning District of Guangxi and passes through the karst area. The range of the research area is shown in Figure 1, Figure 2 and Figure 3. The research area is located in the south of central Guangxi, China, south of a latitude of 23.5° N, has a subtropical monsoon climate, is rich in light and heat, and has abundant rainfall. The annual average temperature is 21.8 °C, and the annual average rainfall is 1300 mm. The rainy season is concentrated from April to September, accounting for more than 76% of the annual rainfall. The rainfall is the least from November to February, which is the annual dry season. The northern part of the research area is located in the Guizhong Basin and its edge, while the southern part is mainly located in the Yong (Yu) River valley. The landform types are divided into mountainous and plain landforms, mainly karst landforms. 2.2. Geological Structure The northern part of the research area is located in the Guizhong Basin and its edge, while the southern part is mainly located in the Yong (Yu) River valley. The geological structure is relatively complex, and the folds are generally not developed. Faults dominate the geological and tectonic background of the study area. The faults in the study area are mainly concentrated in the area from K1389 to K1431, are mainly compressive or compressive–torsional faults, and mainly in the Litang Fracture Zone, the Luxu–Liantang–Hengxian Fault System, and the Tianma–Lucun Regional Fault. There are 12 faults intersecting along the line, five of which are distributed in the karst area. The folds are mainly in the Liujing–Shangzhou gentle monoclinic structure and the Gantang short-axis oblique. According to the combination relationship and genesis of the structure in the study area, it can be divided into three structural systems: the Guangxi mountain-shaped structural system, the north-west structural belt, and the east–west structural belt. The east–west structure is the earliest formation, mainly manifested as wide and gentle folds; the north-west-trending structural belt formed later than the east–west structure, and the latest is the Guangxi mountain-shaped structure, which is dominated by compressive–torsional faults. The three types of structures are all the result of compression. Due to the later formation of the Guangxi mountain-shaped structure and the multiple tectonic movements after its formation superimposed and transformed the EW-trending and NW-trending structures, these two groups of structures experienced the alternating action of left and right twisting. Compression failure and tectonic traction along the fault zone are more common, thus controlling the development direction of karst in the study area. Therefore, the east–west structure has the greatest impact on the line, followed by the north-west structure, and the mountain-shaped structure with the lowest. The relationships between the main fault and the folds and lines in the research area and their influence are shown in Table 1 and Figure 3. 2.3. Landform The types of landforms in the study area can be divided into karst landforms and non-karst landforms according to the lithology. Non-karst landforms are composed of erosion and accumulation landforms. The erosion landforms are mainly formed by tectonic erosion. The terrain is characterized by gentle slopes, low mountains, and hills, and the terrain is undulating. The typical types of depositional landforms include alluvial–proluvial fans and river terraces, which are relatively flat. Karst landforms are formed by the combined action of dissolution and erosion. When a karst area is dominated by carbonate rocks, dissolution is the main action, and erosion is the supplement. When a karst area is dominated by clastic rocks, erosion is the main action, and dissolution is the supplement. Dissolution–erosion and erosion–dissolution landforms are mainly developed in the interbedded hydrochloride and clastic rocks, marl and argillaceous limestone, or non-carbonate rocks intercalated with carbonate rocks. Due to the low purity of carbonate rock or the influence of non-carbonate rock, the dissolution effect of carbonate rock is reduced, the karst development is relatively weak, the erosion effect of water flow is strong, and the weathering and denudation effects are also significant. Therefore, erosion plays an important role in the shaping of landforms. The landform formed when dissolution is dominant and erosion is secondary is called erosion–dissolution landform; otherwise, it is dissolution–erosion landform, with relatively gentle terrain and large fluctuations. Dissolution landforms are the key landform types in the study area. They are developed in relatively pure carbonate rock distribution areas. The typical dissolution landform types are dissolving residual hills and ridge plains. The terrain is generally flat and slightly undulating, locally. The karst collapse in the study area is influenced by karst landforms, and the types of landforms in the study area are shown in Figure 3 and Table 2. The typical dissolution landforms of the study area are shown in Figure 4. 2.4. Overburden As shown in Figure 3, more than 80% of the surface of the research area is covered by the Quaternary strata. The Quaternary overburden is of the Holocene and Pleistocene ages. The Holocene series layers are mainly distributed in the first terrace of the river, and the Pleistocene series layers are mainly distributed in the second and third terraces. According to its genesis, it is mainly divided into residual slope sediments, residual sediments, and alluvial sediments, which are in the form of clay, silty clay, silt and sand, pebble, and heterogeneous soil. According to the results of the field survey, field investigation, and geophysical exploration and drilling, the thickness of the Quaternary soil layer is small in the foothills and slopes, generally less than 8 m. In the karst plains and valleys, the thickness of the overlying soil layer varies greatly, generally from 1 to 10 m, and the maximum thickness is mainly less than 20 m. The engineering geological properties of the Quaternary soil layers in the karst area of the research area vary greatly, and there is a tendency for gradual deterioration from top to bottom. Especially in the deeper solution ditch and solution trough, there is thick soft plastic and soft plastic flow soil, which easily produces karst collapse under the influence of groundwater level fluctuation. The karst collapse that has occurred in the study area is mainly the collapse of soil layers with a thickness of around or within 10 m. It is closely related and has a great impact on the construction of the expressway project. 2.5. Hydrogeology The stratigraphy of the study area is divided into three major types of groundwater-bearing rock groups: carbonate rock, clastic rock, and loose rock, and the corresponding groundwater types are karst water, fracture water of clastic rock, and pore water of loose accumulation of the Quaternary. Karst water is divided into three subcategories: karst fissure water, fissure–cave water, and cave–fissure water, which are mainly developed in the Devonian and Carboniferous carbonate strata, with rich groundwater, mainly pipeline flow, springs, and dark rivers developed along the tectonic line and fracture zone. The fracture water of clastic rocks is mainly controlled by tectonics and weathering, which is distributed in the clastic rock formations of Devonian, Cambrian, Cretaceous, and Tertiary systems, and the groundwater is relatively poor. The pore water of loose accumulation includes the pore phreatic water of the Holocene and Pleistocene series of the Quaternary, which is mainly distributed in the riverbeds, river mudflats, terraces, plains, and depressions of intermountain streams and gullies in the river valleys. Except for the riverbeds, river mudflats, and terraces, which are richer, the rest of the water is poor. The groundwater in the clastic area is mainly recharged by the infiltration of atmospheric rainfall, while the groundwater in the karst area is recharged by the infiltration of atmospheric rainfall collected by negative karst topography, infiltration through waterfall holes, underground river skylights, vertical wells, karst fissures, etc., and the infiltration of groundwater in the Quaternary, while there is a lateral recharge of fissure water from neighboring non-soluble rocks in the research area. The fluctuation of the groundwater level in the karst area, especially at the rock–soil interface, is one of the main factors leading to the formation of karst collapse. 2.6. Karst Development The bedrock stratum in the research area is Cambrian to Tertiary, mainly sedimentary rocks, of which the Devonian stratum is the most widely distributed. The length of the karst development section in the research area is 79.8 km, accounting for 86.18% of the total length. The bedrock stratum with the greatest influence on the line is the pure carbonate rock with strong karst development, mainly including the Upper Devonian Liujiang Group (D3l), Middle Devonian Donggangling Group (D2d), Middle Carboniferous Tai Po Group (C2d), and Lower Carboniferous Datang Group (C1d). the rock group has developed seven underground rivers. According to the field survey, there have been 45 natural collapses and 151 collapse pits. More than 90% of them are concentrated in the karst-developed section of k1380–k1410, mainly with soil collapse and no bedrock collapse. The thickness of the collapsed soil layer is about 10 m or less, the thickness of the soil layer is more than 20 m, and the scale of the collapse pits is larger, which seriously affects the engineering construction in the research area. The typical karst collapse of the study area is shown in Figure 5. 2.7. Human Activities The domestic water source in the study area is mostly groundwater (mainly karst groundwater). In most cases, there is one well in a village. The amount of groundwater exploitation is not high, but a few villages and townships need a centralized water supply, and the amount of groundwater exploitation is high in these areas, which has caused the subsidence and cracking of many houses near the mining wells. Local farms in the area have been massively converted to vegetable cultivation and drilling wells to extract groundwater for irrigation, which has led to karst collapse in many places. High-frequency vibration during expressway construction and operation, ground piling, and blasting vibration can trigger collapse. For example, in 2012, during the construction of the Liunan Intercity High-Speed Railway, ground collapse was triggered in Ma’an Village due to punching pile construction. According to the on-site investigation, it was found that there were 18 artificially triggered (groundwater pumping- or construction-induced) collapses. Most of the collapses caused by groundwater pumping and draining occurred within 400 m around the mining well. Therefore, groundwater pumping or construction has had a greater impact on the formation and occurrence of karst collapses in the study area. A typical groundwater mining well in the study area is shown in Figure 6. 3. Evaluation Index System Construction 3.1. Evaluation Methodology Karst collapse has the characteristics of concealment and suddenness, and it is difficult to accurately predict its location and occurrence time before it happens. It is extremely harmful to the engineering construction and operation of the research area. Karst collapse is the most serious risk factor facing engineering construction in the research area; therefore, it is extremely important to carry out the prediction and evaluation of karst collapse susceptibility and screen out the potential karst collapse-susceptible areas for engineering construction. In the evaluation of karst collapse susceptibility, qualitative and quantitative evaluation methods are mainly used at present, but qualitative evaluation often cannot fully reflect the joint effect of multiple factors on karst collapse. Therefore, the evaluation of karst collapse susceptibility mostly adopts quantitative evaluation methods, such as the analytic hierarchy process, comprehensive fuzzy analysis, artificial neural network, and the logistic regression method. The analytical hierarchy process involves decomposing the problem into different component factors according to the nature of the problem and the total goal to be achieved, and combining the factors at different levels according to their mutual influence relationship and affiliation to form a multi-level analysis structure model, and finally, simplifying the system analysis for the determination of the relative importance weights of the bottom level relative to the top level (total goal). The advantage is that when calculating the ranking weights of all elements of the same level for the highest level, the consistency ratio (CR) can be checked and corrected. If it is not satisfied, the judgment matrix can be readjusted until it is satisfied, which reduces the blindness and arbitrariness of relying entirely on experts’ scores and avoids the bias caused by other evaluation methods in which experts only assign values based on their experience. It is a combination of qualitative and quantitative decision analysis methods [34,35,36]. Therefore, in this study, first, the mature analytic hierarchy process was used to decompose the complex evaluation target of karst collapse susceptibility into the criterion layer with the main karst collapse-inducing factors, and then to decompose the criterion layer into the index layer. On this basis, the single-level ranking (weight) and total ranking were calculated by the method of qualitative index quantification, and the evaluation model of karst collapse susceptibility was established. Finally, ArcGIS technology was used to superimpose the influence zoning map of each index according to the evaluation model, and the prediction evaluation map reflecting the susceptibility of karst collapse was obtained. 3.2. Evaluation System Construction Due to the characteristics of sudden and unpredictable karst collapse, the evaluation of its susceptibility has been an important technical tool in the current comprehensive prevention and control of karst collapse. Although karst collapse is influenced by many factors, the occurrence of karst collapse cannot be separated from the three factors of rock, soil, and water [37]. Based on the results of the geological survey of karst collapse in the research area, combined with the hydrological engineering geological conditions and the previous research results on karst collapse-inducing factors [3,4,5,6,7,8,9,10,11,12,13], a hierarchical evaluation system of three levels, one objective, three criteria, and seven indicators was constructed by selecting three susceptible factors in a total of seven aspects [38,39,40], as shown in Figure 7. The evaluation of karst collapse susceptibility as the objective layer contains three criterion layers (basic geological conditions, karst risk influence, and human activities) and seven indicator layers (degree of karst development (Hkarst), karst landform (Hlandform), fault (Hfault), soil thickness (Hsoil), karst collapse (Hcollapse), underground river (Hgroundriver), and mining well (Hwell)). 3.3. Evaluation Model Construction The evaluation model of the karst collapse susceptibility was constructed according to the principle of mathematical multi-factor fitting or prediction using a polynomial of one-dimensional based on the established karst collapse susceptibility = evaluation index system. A quantitative database of seven major indicators was established using the analytical hierarchy process to establish the weights of each indicator and classify each indicator according to its influence on karst collapse, giving normalized indicators. Using the ArcGIS spatial analysis tools, the indicator value of each evaluation factor was superimposed according to the weights. The evaluation model is as follows: H = X 1 × H 1 + X 2 × H 2 + H 3 × X 3 + where H is the susceptible evaluation result; Xi is the weight of the influence factor of this layer determined by the analytical hierarchy process method (AHP); Hi is the value of the impact factor of this layer. Each layer of impact factors can include multiple sub-level impact factors, and the upper-level impact factors are derived from the sub-level factors using a similar model. 4. Evaluation Model of the Karst Collapse Susceptibility 4.1. Quantification of Evaluation Index Assignment According to the characteristics of the geological environment of the study area and the degree of influence of each index on karst collapse based on a questionnaire survey of experts, as well as referring to the method of assigning influence factors to karst collapse in similar projects, and combined with the previous research results on the inducing factors of karst collapse [3,4,5,6,7,8,9,10,11,12,13] and the expert group’s review recommendations for this research, the quantitative indicators were finally determined, and the impact level of each impact factor was divided into five levels, namely extremely high impact, high impact, medium impact, low impact, and extremely low impact. The larger the score, the higher the degree of influence, and vice versa. On this basis, the zoning map of the degree of influence of each influence factor on karst collapse was derived, as detailed in Table 3 and Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14. 4.2. Constructing the Judgment Matrix and Assigning Values The method of constructing the judgment matrix is that each element with downward affiliation (called criterion) is the first element of the judgment matrix (located in the upper left corner), and each element affiliated to it is arranged in the first row and the first column in turn. In analyzing the relationship between the factors of the evaluation target, a judgment matrix can be constructed according to the importance of the two factors in the hierarchical structure evaluation system. In order to ensure the reliability and accuracy of the criterion of importance between two factors, in this study, the evaluation of the importance of each factor was based on the previous research results on karst collapse-inducing factors [3,4,5,6,7,8,9,10,11,12,13] and the expert group’s review recommendations for this research. Then, the final judgment matrix was obtained by synthesizing the judgment matrix independently constructed by each expert. The construction judgment matrix was constructed according to a nine-level scale, and the specific results are listed in Table 3. In order to eliminate the influence of prejudice caused by experts participating in the determination of weighting factors, the judgment results of each expert can be judged by the consistency of the test results of the judgment matrix. In addition, the unreasonable judgment results of experts were eliminated, which reduced the blindness and randomness of relying solely on expert scores. This avoids the deviation caused by experts only assigning values based on experience, reduces the influence of human factors, and ensures the reliability of the AHP method. According to the importance criterion between the two factors (Table 4), the susceptible factors were assigned and combined with the karst collapse hierarchy in Table 3. The judgment matrices KA-Bi and KBi-Ci were established for the association between the different layers of objective layer A and criterion layer Bi, and criterion layer Bi and indicator layer Ci. For example, if the ratio of the importance of criterion layer B1 to indicator layer C3 is 3, then the ratio of the importance of indicator layer C3 to criterion layer B1 is 1/3; if the ratio of the importance of criterion layer B1 to indicator layer C2 is 2, then the ratio of the importance of indicator layer C2 to criterion layer B1 is 1/2. Based on this approach, the matrices were constructed, and Equations (2)–(4) are the correlation judgment matrices KA-Bi, KB1-Ci, and KB2-Ci for objective layer A–criterion layer Bi, criterion layer B1–criterion layer Ci, and criterion layer B2–indicator layer Ci, respectively. K A B i = 1 4 5 1 / 4 1 3 1 / 5 1 / 3 1 K B 1 C i = 1 2 3 6 1 / 2 1 2 3 1 / 3 1 / 2 1 2 1 / 6 1 / 3 1 / 2 1   K B 2 C i = 1 2 1 / 2 1   4.3. Hierarchical Single Ranking and Validation Taking the criterion layer B1–indicator layer Ci judgment matrix (3) as an example, the weight of indicator layer Ci in criterion layer B1 was calculated. The square root method was used for the hierarchical analysis to calculate the following: (1) Calculate the product of each element of each row of the judgment matrix, the M 1 = 1 × 2 × 3 × 6 = 36 , same argument M 2 = 3 , M 3 = 0.3333 , M 4 = 0.0278 ; (2) Calculate the nth power root of M 1 (n = 4), W 1 ¯ = M 1 4 = 36 4 = 2.4495 , same argument W 2 ¯ = 1.3161 , W 3 ¯ = 0.7598 , W 4 ¯ = 0.4083 ; (3) Normalized to W ¯ 1 , W 1 = 2.4495 2.4495 + 1.3161 + 0.7598 + 0.4083 = 0.4965 , same argument W 2 = 0.2668 , W 3 = 0.1540 , W 4 = 0.0827 ; So, W = 0.4965 , 0.2668 , 0.1540 , 0.0827 is the desired eigenvector; (4) Calculate the maximum characteristic root of the judgment matrix λ max , λ max = 1 n i = 1 n ( K W ) i W i = 1.9885 4 × 0.4965 + 1.0713 4 × 0.2668 + 0.6184 4 × 0.1540 + 0.3314 4 × 0.0827 = 4.0104   where (KW)1 = 1 × 0.4965 + 2 × 0.2668 + 3 × 0.1540 + 6 × 0.0827 = 1.9885, and (KW)2, (KW)3, and (KW)4 are calculated as 1.073, 0.6184, and 0.3314, respectively. (5) In order to test whether the qualitative judgment of the constructed judgment matrix logically meets the requirement of transmissibility, it is necessary to conduct a consistency test, and the consistency index CR is used as the criterion to measure the consistency of the judgment matrix. The judgment matrix can be considered to have satisfactory consistency when CR < 0.10; otherwise, it is necessary to adjust the judgment matrix; C I = λ max n n 1 = 4.0104 4 4 1 = 0.00347 , C R = C I R I = 0.00347 0.9 = 0.003856 , where RI is the average random consistency index, and the RI values of its judgment matrix are shown in Table 5. When n = 4, RI = 0.9; since CR < 0.1, the consistency satisfies the requirement. Similarly, the weights of all evaluation factors can be calculated, as shown in Table 6. 4.4. Karst Collapse Susceptibility Evaluation Model From the above calculations, A = [0.3285, 0.1770, 0.1023, 0.0548, 0.1494, 0.0830, 0.1050], and the karst collapse susceptibility prediction and evaluation model can be established as follows: H = (0.3285 × Hkarst + 0.1770 × Hlandform + 0.1023 × Hfault + 0.0548Hsoil) + (0.1494 × Hcollapse + 0.0830 × Hgroundriver) + 0.1050 × Hwell 5. Analysis of Evaluation Results By using the spatial analysis function of ArcGIS, the zoning map of the influence of the seven assigned factors of the degree of karst collapse was superimposed according to the AHP prediction and evaluation model to obtain the prediction and evaluation map reflecting the karst collapse susceptibility, as shown in Figure 15. According to the size of the H value, the study area was divided. There are four levels of karst collapse susceptibility, including extremely susceptible areas (2.64–2.81), susceptible areas (2.43–2.64), somewhat susceptible areas (1.88–2.43), and non-susceptible areas (1.04–1.88), and one non-karst level (0.51–1.04), as shown in Figure 15 and Table 7. In Table 7, in the karst collapse-susceptible areas, the length of the extremely susceptible area is 11.9 km, accounting for about 12.85% of the total length of the line, and the remaining three susceptible areas are 23.2 km (25.05%), 36.62 km (39.54%), and 10.2 km (11.01%), respectively. The length of the non-karst area is 10.7 km, accounting for about 11.55% of the total length of the line. The sections of the expressway passing through the extremely susceptible area and susceptible area account for about 37.90% of the total length of the line. According to the analysis results, the susceptibility of karst collapse in the study area is mainly affected by factors such as the degree of karst development, karst landform, and soil thickness, and locally by faults, karst collapse, underground rivers, and mining well. The extremely susceptible and susceptible areas of karst collapse coincide with the existing karst collapse area, and the research results are consistent with the actual situation. The total length of the extremely susceptible and susceptible areas of karst collapse equals 34.3 km, mainly distributed in the dissolution plain landform (88.05%). Only 4.1 km (11.95%) of the susceptible area is distributed in the erosion–dissolution landform, 99.10% of the 11.1 km of the extremely susceptible area is distributed in the strong developed karst area, 63.36% of the 23.2 km of the susceptible area is distributed in the strong developed karst area, and the rest are distributed in the moderate developed karst area. The soil thickness in the extremely susceptible area is less than 10 m or 5–10 m, and it is affected by faults, underground channels, karst collapse, and mining wells. Areas with soil thickness of 5–10 m have increased susceptibility. The somewhat susceptible and non-susceptible areas of karst collapse are mainly controlled by the degree of karst development, and they are located in the areas with moderate developed karst or weak developed karst. The non-karst area is not affected by any karst collapse-susceptible factors. Because the extremely susceptible and susceptible areas of karst collapse are very dangerous to the project, corresponding control measures must be taken, and the strong developed karst area, dissolution plain landform areas, and soil thickness of less than 10 m in the study area should be treated. The karst area should be taken seriously and control measures can be taken. In the areas with somewhat susceptible and non-susceptible areas of karst collapse, attention should also be paid to the moderate developed or weak developed karst areas with a soil thickness of less than 10 m, such as the K1410+300-K1410+600 and K1440+000-K1471+920 sections. Combined with the hydrological engineering geological conditions, karst development, karst landform, and other influencing factors in the study area, the evaluation results coincide with the locations of karst collapse in the K1379+300-K1471+920 section of the Quannan Expressway in recent years, indicating that it is feasible to use the combination of the AHP method of ArcGIS to evaluate the susceptibility to karst collapse. The results can provide a scientific basis and technical support for the prevention and control of geological disasters, the planning of key areas, and the development and utilization of land. The basic factors of karst collapse, such as soil thickness and underground river in the study area, were mainly obtained through borehole data, which can reflect the geological situation of the study area well but cannot reveal it completely due to the limits of the number and spacing of boreholes. Moreover, the development and degree of karst are dynamic, so the data of the field investigation are time-sensitive. Karst collapse is sudden and unpredictable. Therefore, the results of this study have certain limitations. 6. Suggestions for Prevention Measures According to the evaluation conclusions of the AHP method of ArcGIS, as shown in Table 7 and Figure 15, it can be seen that the extremely susceptible and susceptible areas of karst collapse have a greater impact on the construction of the project and the safety after the project is completed, and the possibility of roadbed instability and damage is high. It is very necessary to take necessary prevention measures in the section. The specific prevention measures are proposed based on actual engineering experience and evaluation conclusions, as shown in Table 8. At the same time, it is recommended to carry out a key exploration of the hidden karst soil caves and karst caves in the K1379+300-K1471+920 section to further identify the hidden karst situation. In addition, there is also the danger of karst collapse in the somewhat susceptible areas, but the degree of susceptibility to karst collapse is lower than that of the susceptible area. It is recommended to detect hidden karst soil caves and karst caves according to the actual situation to further identify the hidden karst situation, paying attention to the possible karst collapse and referring to the prevention measures for the corresponding treatment of the susceptible areas. For the non-susceptible areas of the road section, the degree of karst collapse susceptibility is low. During construction, attention should be paid to the possible karst collapse in local areas, and corresponding treatment can also be made with reference to the prevention measures for the karst collapse-susceptible areas. 7. Conclusions The evaluation of karst collapse susceptibility is a complex and comprehensive research topic. In the evaluation process, it is very important to use scientific evaluation methods and establish a practical and perfect comprehensive evaluation system for karst collapse susceptibility evaluation. In this study, based on the AHP method of ArcGIS, the prediction and evaluation of the karst collapse susceptibility of section K1379+320-K1471+920 of the Quannan Expressway were carried out, and the conclusions are as follows: (1) With the full integration of karst collapse-inducing factors, through the AHP hierarchical analysis method, it is reasonable to build a hierarchical structure evaluation system of three levels, one objective, three criteria, and seven indicators to derive the karst collapse susceptibility evaluation model. (2) Through the spatial analysis function of ArcGIS, the prediction and evaluation map of karst collapse susceptibility was obtained. According to the size of the H value, the study area was divided into five levels. There are four levels of karst collapse susceptibility, including extremely susceptible areas (2.64–2.81), susceptible areas (2.43–2.64), somewhat susceptible areas (1.88–2.43), and non-susceptible areas (1.04–1.88), and one non-karst level (0.51–1.04). The length of the extremely susceptible area is 11.9 km, accounting for about 12.85% of the total length of the line, and the remaining three susceptible areas are 23.2 km (25.05%), 36.62 km (39.54%), and 10.2 km (11.01%), respectively. The research conclusions are consistent with the geographical location of karst collapse and the susceptibility to karst collapse in recent years, and the research results are consistent with the actual situation. (3) According to the analysis results, the total length of the extremely susceptible and susceptible areas of karst collapse is 34.3 km, mainly distributed in the dissolution plain landform (88.05%). Only 4.1 km (11.95%) of the susceptible area is distributed in the erosion–dissolution landform; 99.10% of the 11.1 km of the extremely susceptible area is distributed in the strong developed karst area, 63.36% of the 23.2 km of the susceptible area is distributed in the strong developed karst area, and the rest are distributed in the moderate developed karst area. The soil thickness in the extremely susceptible area is less than 10 m or 5–10 m, and it is affected by faults, underground water, karst collapse, and mining well. Areas with soil thickness of 5–10 m have increased susceptibility. The somewhat susceptible and non-susceptible areas of karst collapse are mainly controlled by the degree of karst development, and they are located in the areas with moderate developed karst or weak developed karst. The non-karst areas are not affected by any karst collapse susceptible factors. (4) In view of the prediction and evaluation conclusions and with reference to similar engineering experience, effective karst collapse prevention measures are put forward, which can provide a reference for disaster prevention and mitigation in engineering construction. (5) The research results have played a guiding role in the safe construction and safe operation of the project after completion, which is of great practical significance and has certain academic research value, as it promotes and draws reference from the development of karst collapse research for several route projects. At the same time, the research method provides a reference for similar projects to evaluate the susceptibility of karst collapse and also provides a scientific basis for the planning and layout of route engineering and its geological disaster prevention. (6) Although the research results can provide guidance for prevention in the study area, the research results have certain limitations due to the difficulty of collecting basic research data comprehensively. Author Contributions Writing—review and editing, Y.-H.X.; Supervision, B.-H.Z.; Writing—original draft, Y.-X.L.; Data curation, B.-C.L.; Software, C.-F.Z.; Investigation, Y.-S.L. All authors have read and agreed to the published version of the manuscript. Funding This research was funded by the Project on Improving the Basic Research Ability of Young and Middle-aged Teachers in Guangxi Universities (Grant No. 2022KY0786) and the Natural Science Foundation of Guangxi Province, China (Grant No. 2020GXNSFAA297078). Institutional Review Board Statement Not applicable. Informed Consent Statement Not applicable. Data Availability Statement The data presented in this study are available in Figure 2, Figure 3, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15. Conflicts of Interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. References 1. Zheng, Z.J.; Ao, W.L.; Zeng, J.; Gan, F.P.; Zhang, W. Application of integrated geophysical methods to karst collapse investigation in the Sijiao village near Liuzhou. Hydrogeol. Eng. Geol. 2017, 44, 143–149. [Google Scholar] 2. Yi, S.M.; Lu, W.; Zhou, X.J. The Formation Investigation and Remediation of Sinkhole in the Xiamao Village, Guangzhou. Trop. Geogr. 2021, 41, 801–811. [Google Scholar] 3. Pan, Z.Y.; Jia, L.; Liu, B.C. Risk evaluation of karst collapse based on technology of AHP and ArcGIS—A case of Yongle Town in Zunyi City. J. Guilin Univ. Technol. 2016, 36, 464–470. [Google Scholar] 4. Wei, Y.Y.; Sun, S.L.; Huang, J.J. Spatial-temporal distribution and causes of karst collapse in the Xuzhou area. Carsologica Sin. 2015, 34, 52–57. [Google Scholar] 5. Zhang, J.; Bi, P.; Wei, A.; Tao, Z.B.; Zhu, H.C. Assessment of susceptibility to karst collapse in the Qixia Zhongqiao district of Yantai based on fuzzy comprehensive method. Carsologica Sin. 2021, 40, 215–220. [Google Scholar] 6. Wang, H.H.; Zhang, F.W.; Guo, C.Q.; Sun, C.T. Urban karst collapse hazard assessment based on analytic hierarchy process:An example of southern Wuhan City. Carsologica Sin. 2016, 35, 667–673. [Google Scholar] 7. Perrin, J.; Cartannaz, C.; Noury, G.; Vanoudheusden, E. A Multi-criteria Approach to Karst Subsidence Hazard Mapping Supported by Weights-of-evidence Analysis. Eng. Geol. 2015, 197, 296–305. [Google Scholar] [CrossRef] 8. Zeng, B.; Yang, M.Y.; Shao, C.J.; Chen, Z.H.; Peng, D.M.; Zheng, S.N. Susceptibility Assessment of Karst Collapse of Hangchang Expressway Projects Based on Analytic Hierarchy Process. Saf. Environ. Eng. 2018, 25, 29–38. [Google Scholar] 9. Wu, Y.N. Process and influencing factors of karst ground collapse in the water source area of Taian-Jiuxian. Carsologica Sin. 2020, 39, 225–231. [Google Scholar] 10. Tu, J.; Li, H.J.; Peng, H.; Wei, X.; Jia, L. Analysis on collapse model of the karst area covered by clay in Wuhan City Jiangxia district Hongqi village. Carsologica Sin. 2018, 37, 112–119. [Google Scholar] 11. Wang, G.L.; Qiang, Z.; Cao, C.; Chen, Y.; Hao, J.Y. Assessment of susceptibility to karst collapse based on geodetector and analytichierarchy process: An example of Zhongliangshan area in Chongqing. Carsologica Sin. 2021. Available online: https://kns.cnki.net/kcms/detail/45.1157.P.20210310.1716.004.html (accessed on 11 March 2021). 12. Wang, F.; Chai, B.; Xu, G.L.; Chen, L.; Xiong, Z.T. Evolution Mechanism of Karst Sinkholes in Wuhan City. J. Eng. Geol. 2017, 25, 824–832. [Google Scholar] 13. Yang, Y.; Cao, X.M.; Feng, F.; Ding, J.P. Mechanism analysis of karst collapse at polie of Yanyu, Guizhou. J. Liaoning Tech. Univ. (Nat. Sci.) 2016, 35, 1081–1084. [Google Scholar] 14. Miao, S.X.; Huang, J.J.; Wu, J.Q.; Li, S.M. Mechanism Analysis of Karst Collapse and Ground Fissures Disasters in Dayanglin, Zhenjiang. J. Disaster Prev. Mitig. Eng. 2013, 33, 679–685. [Google Scholar] 15. Mu, C.M.; He, Y.C.; Li, C.J. The Cause of Formation Analysis and Preventive Treatment to the Karstic Collapse of a Stadium in Guilin. Ind. Constr. 2013, 43, 459–463. [Google Scholar] 16. Wan, Z.B.; Wu, X.; Xu, S.; Li, Y.H.; Yang, R.Y.; Chen, H.H.; Gao, M.X.; Zhang, S.F. Mechanism of karst collapse in Shiliquan area in Zaozhuang City. Hydrogeol. Eng. Geol. 2006, 4, 109–111. [Google Scholar] 17. Gao, X.C. Mechanism Analysis of Karst Subgrade Subsidence of Laixin Expressway. J. Highw. Transp. Res. Dev. 2004, 4, 42–44. [Google Scholar] 18. Zhong, Y.; Zhang, M.K.; Pan, L.; Zhao, S.K.; Hao, Y.H. Risk assessment for urban karst collapse in Wuchang District of Wuhan based on GIS. J. Tianjin Norm. Univ. (Nat. Sci. Ed.) 2015, 35, 48–53. [Google Scholar] 19. Wu, L.Q.; Liao, J.J.; Wang, W.; Pi, W.; Zhou, L.L. Risk Assessment of Karst Surface Collapse in Wuhan Region Based on AHP-Information Method. J. Yangtze River Sci. Res. Inst. 2017, 34, 43–47. [Google Scholar] 20. Duan, X.Q.; Chu, X.W.; Li, B. Risk prediction and evaluation of the karst collapse based on the set pair mechanism analysis. J. Saf. Environ. 2016, 16, 72–76. [Google Scholar] 21. Ou, Y.F.; Xu, G.L.; Zhang, X.J.; Li, Y.F.; Dong, J.X. Static Analysis and Hazard Assessment of Karst Ground Collapse in Vital Project. J. Yangtze River Sci. Res. Inst. 2016, 33, 88–93. [Google Scholar] 22. Cui, Y.L.; Wang, G.H.; Li, Z.Y. Risk assessment of karst collapse areas based on the improved fish bone model:An example of the Liuzhou area in Guangxi Province. Carsologica Sin. 2015, 34, 64–71. [Google Scholar] 23. Li, X.; Yin, K.L.; Chen, B.D.; Li, Y.; Jiang, C.; Yi, J. Evaluation of karst collapse susceptibility on both sides of Yangtze River in Baishazhou, Wuhan and countermeasures for prevention and control during subway construction. Geol. Sci. Technol. Bull. 2020, 39, 121–130. [Google Scholar] 24. Chen, J.Y.; Zhu, B.; Peng, S.X.; Shan, H.M. AHP and GIS-based assessment of karst collapse susceptibility in mining areas—A case study of karst mining area in Lingyu, Guizhou. J. Nat. Hazards 2021, 30, 226–236. [Google Scholar] 25. Abedini, M.; Tulabi, S. Assessing LNRF, FR, and AHP models in landslide susceptibility mapping index: A comparative study of Nojian watershed in Lorestan province, Iran. Environ. Earth Sci. 2018, 77, 405. [Google Scholar] [CrossRef] 26. Hammami, S.; Zouhri, L.; Souissi, D.; Souei, A.; Zghibi, A.; Marzougui, A.; Dlala, M. Application of the GIS based multi-criteria decision analysis and analytical hierarchy process (AHP) in the flood susceptibility mapping (Tunisia). Arab. J. Geosci. 2019, 12, 653. [Google Scholar] [CrossRef] 27. Azarafza, M.; Akgün, H.; Atkinson, P.M.; Derakhshani, R. Deep learning-based landslide susceptibility mapping. Sci. Rep. 2021, 11, 24112. [Google Scholar] [CrossRef] [PubMed] 28. Subedi, P.; Subedi, K.; Thapa, B.; Subedi, P. Sinkhole susceptibility mapping in Marion County, Florida: Evaluation and comparison between analytical hierarchy process and logistic regression based approaches. Sci. Rep. 2019, 9, 7140. [Google Scholar] [CrossRef][Green Version] 29. Di Napoli, M.; Di Martire, D.; Bausilio, G.; Calcaterra, D.; Confuorto, P.; Firpo, M.; Pepe, G.; Cevasco, A. Rainfall-induced shallow landslide detachment, transit and runout susceptibility mapping by integrating machine learning techniques and GIS-based approaches. Water 2021, 13, 488. [Google Scholar] [CrossRef] 30. Xiao, J.Q.; Qiao, S.F. Interaction between karst-subsidence foundation and subgrade in Lou-Xing freeway and its treatment methods. J. Railw. Sci. Eng. 2009, 6, 33–38. [Google Scholar] 31. Peng, Y.H. Analysis of ground collapse mechanism and engineering management in karst areas. China Rural. Water Hydropower 2004, 4, 40–42. [Google Scholar] 32. Zhang, B.Z.; Chen, Z.D. Mechanism and comprehensive management of karst collapse in mines. Geol. China 1997, 4, 27–29. [Google Scholar] 33. Luo, X.J. Prevention, control and emergency disposal of covered karst ground collapse. Yangtze River 2016, 47, 38–44. [Google Scholar] 34. Nanehkaran, Y.A.; Mao, Y.; Azarafza, M.; Kockar, M.K.; Zhu, H.H. Fuzzy-based multiple decision method for landslide susceptibility and hazard assessment: A case study of Tabriz, Iran. Geomech. Eng. 2021, 24, 407–418. [Google Scholar] 35. Das, S. Flood susceptibility mapping of the Western Ghat coastal belt using multi-source geospatial data and analytical hierarchy process (AHP). Remote Sens. Appl. Soc. Environ. 2020, 20, 100379. [Google Scholar] [CrossRef] 36. Ghorbanzadeh, O.; Feizizadeh, B.; Blaschke, T. An interval matrix method used to optimize the decision matrix in AHP technique for land subsidence susceptibility mapping. Environ. Earth Sci. 2018, 77, 584. [Google Scholar] [CrossRef] 37. Wu, Y.B.; Liu, Z.K.; Yin, R.Z.; Lei, M.T.; Dai, J.L.; Luo, W.Q.; Pan, Z.Y. Evaluation and application of karst collapse susceptibility in Huaihua, Hunan based on AHP and GIS techniques. Carsologica Sin. 2021. Available online: https://kns.cnki.net/kcms/detail/45.1157.P.20211221.1205.002.html (accessed on 12 December 2021). 38. Arabameri, A.; Rezaei, K.; Pourghasemi, H.R.; Lee, S.; Yamani, M. GIS-based gully erosion susceptibility mapping: A comparison among three data-driven models and AHP knowledge-based technique. Environ. Earth Sci. 2018, 77, 628. [Google Scholar] [CrossRef] 39. Azarafza, M.; Ghazifard, A.; Akgün, H.; Asghari-Kaljahi, E. Landslide susceptibility assessment of South Pars Special Zone, southwest Iran. Environ. Earth Sci. 2018, 77, 805. [Google Scholar] [CrossRef] 40. Souissi, D.; Zouhri, L.; Hammami, S.; Msaddek, M.H.; Zghibi, A.; Dlala, M. GIS-based MCDM–AHP modeling for flood susceptibility mapping of arid areas, southeastern Tunisia. Geocarto Int. 2020, 35, 991–1017. [Google Scholar] [CrossRef] Figure 1. The location map of the study area. Figure 1. The location map of the study area. Water 14 01432 g001 Figure 2. The range of study area. Figure 2. The range of study area. Water 14 01432 g002 Figure 3. Engineering geological map of the study area. Figure 3. Engineering geological map of the study area. Water 14 01432 g003 Figure 4. Typical dissolution landforms. Figure 4. Typical dissolution landforms. Water 14 01432 g004 Figure 5. Typical karst collapse. Figure 5. Typical karst collapse. Water 14 01432 g005 Figure 6. A typical groundwater mining well. Figure 6. A typical groundwater mining well. Water 14 01432 g006 Figure 7. Evaluation system. Figure 7. Evaluation system. Water 14 01432 g007 Figure 8. Zoning map of influence degree of karst development on karst collapse. Figure 8. Zoning map of influence degree of karst development on karst collapse. Water 14 01432 g008 Figure 9. Zoning map of influence degree of karst landform on karst collapse. Figure 9. Zoning map of influence degree of karst landform on karst collapse. Water 14 01432 g009 Figure 10. Zoning map of influence degree of fault on karst collapse. Figure 10. Zoning map of influence degree of fault on karst collapse. Water 14 01432 g010 Figure 11. Zoning map of influence degree of soil thickness on karst collapse. Figure 11. Zoning map of influence degree of soil thickness on karst collapse. Water 14 01432 g011 Figure 12. Zoning map of influence degree of existing karst collapse in the research area. Figure 12. Zoning map of influence degree of existing karst collapse in the research area. Water 14 01432 g012 Figure 13. Zoning map of influence degree of underground river on karst collapse. Figure 13. Zoning map of influence degree of underground river on karst collapse. Water 14 01432 g013 Figure 14. Zoning map of influence degree of mining well on karst collapse. Figure 14. Zoning map of influence degree of mining well on karst collapse. Water 14 01432 g014 Figure 15. Zoning map of karst collapse susceptible prediction evaluation in the study area. Figure 15. Zoning map of karst collapse susceptible prediction evaluation in the study area. Water 14 01432 g015 Table 1. List of main structures in the research area. Table 1. List of main structures in the research area. Number Name Characteristic Intersection Area Impact Degree F1Bazha faultFracture of unknown natureK1389+750High F2Yangshan faultNormal faultK1393+020High F3Bianshan faultNormal faultK1397+100High F4Yao Village faultFracture of unknown natureK1398+570High F5Xingu Ling-Hengxian faultCompressive fractureK1404+340High F6Gaoshan faultNormal faultK1412+020Medium F7Fault of unknown natureFracture of unknown natureK1415+050Low F8Fault of unknown natureFracture of unknown natureK1416+200Low F9Li village faultNormal faultK1417+480Low F10Lijianpo faultNormal faultK1421+020Low F11Liantang faultRetrograde faultK1423+530Low F12Wangbuna faultRetrograde faultK1431+000Medium 1Liujing-Shangzhou gentle monoclinal faultMonoclinic structureLiujing, Lingli, Wuhe to Shangzhou areaHigh 2Gantang short-axis syncline SynclineGantang areaMedium Table 2. List of landform types in the study area. Table 2. List of landform types in the study area. Lithological ClassificationGenetic ClassificationThe Distribution of Section Non-karst landformsErosion landformsK1410+500~K1420+400, K1431+000~K1434+100 Accumulation landformsK1420+400~K1423+600, K1425+100~K1435+900 Karst landformsDissolution landformsK1379+300K1410+500, K1449+500~K1456+800, K1468+300~K1471+920 Dissolution–erosion landforms or erosion–dissolution landformsK1423+600~K1431+000, K1435+900~K1449+500, K1456+800~K1468+300 Table 3. Evaluation factors and assignment table of structural karst collapse susceptibility level. Table 3. Evaluation factors and assignment table of structural karst collapse susceptibility level. Objective Layer ACriteria Layer BIndicator Layer CImpact Degree/Assignment Extremely High Impact/5 High Impact/4Middle Impact/3 Low Impact/2Extremely Low Impact/1 Evaluation of karst collapse susceptibilityBasic geological conditions B1Degree of karst development C1 Hkarst StrongModerateWeak None Karst landform C2 Hlandform PlainErosion–karst hills valley (depression)Dissolution–erosion low hillsSolitary and residual peak Peak clump or peak forest Non-karst landforms FaultC3Hfault0~250 m250~500 m500~750 m750~1000 m>1000 m Soil thickness C4 Hsoil <5 m5~10 m10~20 m20~30 m>30 m Karst risk influence B2Karst collapse C5 Hcollapse >4/km22~4/km21~2/km21/km20 Underground river C6 Hgroundriver <1.5 m1.5~3 m3~6 m6~10 m>10 m Human activities B3Mining well C7 Hwel 0~250 m250~500 m500~750 m750~1000 m>1000 m Table 4. Importance scales. Table 4. Importance scales. Importance ScalesMeaning 1When two elements are compared, they are of equal importance 3When comparing two elements, the former is slightly more important than the latter 5When comparing two elements, the former is more important than the latter 7When comparing two elements, the former is significantly more important compared to the latter 9When comparing two elements, the former is extremely more important compared to the latter 2, 4, 6, 8The intermediate values of the above judgments ReciprocalIf the ratio of the importance of element I to element j is aij, then the ratio of the importance of element j to element I is aji = 1/aij Table 5. Average random consistency index allocation table. Table 5. Average random consistency index allocation table. Number of Steps n12345678910 RI000.580.901.121.241.321.411.451.49 Table 6. Evaluation factor weight allocation table. Table 6. Evaluation factor weight allocation table. Objective Layer AEvaluation of Karst Collapse Susceptibility Criterion layer BBasic geological conditions B1Karst risk influence B2Human activities B3 Criterion layer weights relative to objective layer0.66260.23240.1050 Indicator layer CDegree of karst development C1Karst landform C2Fault C3Soil thickness C4Karst collapse C5Underground river C6Mining well C7 Criterion layer weights relative to indicator layer weights0.49650.26680.15400.08270.64290.35711.0000 Indicator layer weights relative to objective layer weights0.32850.17700.10230.05480.14940.08300.1050 Table 7. Table of evaluation conclusions of karst collapse susceptibility. Table 7. Table of evaluation conclusions of karst collapse susceptibility. MileageSusceptible LevelLength/kmMileageSusceptible LevelLength/km k1379+300-k1381+800Extremely susceptible area2.5k1409+300-k1410+300Susceptible area1.0 k1381+800-k1388+000Susceptible area6.2k1410+300-k1410+600Somewhat susceptible area0.3 k1388+000-k1389+000Extremely susceptible area1.0k1410+600-k1414+500Non-susceptible area3.9 k1389+000-k1390+000Susceptible area1.0k1414+500-k1415+400Somewhat susceptible area0.9 k1390+000-k1391+000Extremely susceptible area1.0k1415+400-k1416+900Non-susceptible area1.5 k1391+000-k1394+000Susceptible area3.0k1416+900-k1417+200Somewhat susceptible area0.3 k1394+000-k1395+600Extremely susceptible area1.6k1417+200-k1418+100Non-karst area0.9 k1395+600-k1397+500Susceptible area1.9k1418+100-k1420+000Non-susceptible area1.9 k1397+500-k1399+700Extremely susceptible area2.2k1420+000-k1423+200Somewhat susceptible area3.2 k1399+700-k1400+500Susceptible area0.8k1423+200-k1425+100Non-susceptible area1.9 k1400+500-k1401+600Extremely susceptible area1.1k1425+100-k1433+000Non-karst area7.9 k1401+600-k1403+800Susceptible area2.2k1433+000-k1434+000Non-susceptible area1.0 k1403+800-k1405+000Extremely susceptible area1.2k1434+000-k1435+900Non-karst area1.9 k1405+000-k1408+000Susceptible area3.0k1435+900-k1440+000Susceptible area4.1 k1408+000-k1409+300Extremely susceptible area1.3k1440+000-k1475+000Somewhat susceptible area35.0 Table 8. Table of prevention measures. Table 8. Table of prevention measures. Road SectionSusceptible LevelPrevention Measures k1379+300-k1381+800Extremely susceptible areaIf the karst is developed in a large area and the bedrock surface is violently undulating, a large excavation program will be adopted to cut the height, fill the low level, and reinforce the substrate; on the contrary, if the solution trench and solution trough are locally developed, a local excavation and backfill or structure span program will be adopted. If the burial depth is shallow, excavation and backfill will be used to reinforce the hidden soil cave and karst cave, and if the burial depth is deep, grouting or structure can be used to span according to the specific situation. k1381+800-k1387+700Extremely susceptible area, susceptible area K1387+700-K1410+500Extremely susceptible area K1418+400-K1425+100Susceptible area K1436+700-K1439+700Extremely susceptible area K1439+700-K1471+920Susceptible area Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. Share and Cite MDPI and ACS Style Xie, Y.-H.; Zhang, B.-H.; Liu, Y.-X.; Liu, B.-C.; Zhang, C.-F.; Lin, Y.-S. Evaluation of the Karst Collapse Susceptibility of Subgrade Based on the AHP Method of ArcGIS and Prevention Measures: A Case Study of the Quannan Expressway, Section K1379+300-K1471+920. Water 2022, 14, 1432. https://doi.org/10.3390/w14091432 AMA Style Xie Y-H, Zhang B-H, Liu Y-X, Liu B-C, Zhang C-F, Lin Y-S. Evaluation of the Karst Collapse Susceptibility of Subgrade Based on the AHP Method of ArcGIS and Prevention Measures: A Case Study of the Quannan Expressway, Section K1379+300-K1471+920. Water. 2022; 14(9):1432. https://doi.org/10.3390/w14091432 Chicago/Turabian Style Xie, Yan-Hua, Bing-Hui Zhang, Yu-Xin Liu, Bao-Chen Liu, Chen-Fu Zhang, and Yu-Shan Lin. 2022. "Evaluation of the Karst Collapse Susceptibility of Subgrade Based on the AHP Method of ArcGIS and Prevention Measures: A Case Study of the Quannan Expressway, Section K1379+300-K1471+920" Water 14, no. 9: 1432. https://doi.org/10.3390/w14091432 Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here. Article Metrics Back to TopTop
{ "url": "https://www.mdpi.com/2073-4441/14/9/1432", "source_domain": "www.mdpi.com", "snapshot_id": "CC-MAIN-2023-23", "warc_metadata": { "Content-Length": "362367", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:B4BG3N427H3QCZXPKGUQXPP5XBLSJQOR", "WARC-Concurrent-To": "<urn:uuid:0c8c4648-1c7d-4c90-bd9f-587365bdd445>", "WARC-Date": "2023-06-10T17:47:00Z", "WARC-IP-Address": "104.18.25.151", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:PLAI3DTAW4DYYIWB3UTOQEA224YAHUED", "WARC-Record-ID": "<urn:uuid:2c10470d-dee2-4b51-b966-8bf0a07f5ab5>", "WARC-Target-URI": "https://www.mdpi.com/2073-4441/14/9/1432", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:71e4b216-c2d8-4f01-96a5-daa166e30336>" }, "warc_info": "isPartOf: CC-MAIN-2023-23\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-129\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 24, 138, 168, 279, 307, 398, 432, 586, 588, 590, 613, 624, 646, 657, 666, 680, 694, 706, 714, 715, 902, 903, 905, 1028, 1030, 1131, 1133, 1206, 1208, 1297, 1299, 1350, 1409, 1511, 1583, 1584, 1593, 1594, 1596, 3406, 3407, 3423, 3424, 5033, 6384, 7870, 7871, 7904, 7905, 7928, 7929, 8231, 8956, 8957, 8983, 8984, 11125, 11126, 11140, 11141, 13241, 13242, 13258, 13259, 14207, 14834, 14835, 14853, 14854, 16765, 16766, 16789, 16790, 17954, 17955, 17977, 17978, 19355, 19356, 19396, 19397, 19425, 19426, 20465, 21510, 22232, 22233, 22269, 22270, 23515, 23516, 23551, 23552, 24242, 24282, 24669, 24670, 24727, 24728, 24779, 24780, 25767, 25768, 25827, 25828, 26114, 27475, 28466, 28506, 28576, 28602, 28603, 28651, 28652, 28897, 29060, 29206, 29349, 29419, 29496, 29621, 29782, 30501, 30590, 30591, 30643, 30644, 30836, 30975, 30976, 31010, 31011, 32246, 34415, 35037, 35563, 35564, 35603, 35604, 37175, 37176, 37191, 37192, 37716, 37720, 38028, 38032, 38950, 38954, 40045, 40049, 40316, 40320, 40893, 40897, 41101, 41102, 41123, 41124, 41359, 41360, 41368, 41369, 41623, 41624, 41661, 41662, 41678, 41679, 41706, 41707, 41723, 41724, 41752, 41753, 41912, 41913, 41935, 41936, 42107, 42108, 42119, 42120, 42351, 42524, 42729, 42898, 43131, 43345, 43569, 43811, 43978, 44191, 44532, 44694, 44881, 45089, 45278, 45490, 45637, 45855, 46070, 46252, 46460, 46679, 46975, 47209, 47448, 47748, 47929, 48213, 48535, 48725, 48886, 49028, 49169, 49409, 49639, 49879, 50210, 50472, 50681, 50922, 50968, 51014, 51034, 51069, 51104, 51124, 51180, 51236, 51256, 51297, 51338, 51358, 51392, 51426, 51446, 51491, 51536, 51556, 51585, 51614, 51634, 51715, 51796, 51816, 51894, 51972, 51992, 52062, 52132, 52152, 52231, 52310, 52330, 52421, 52512, 52532, 52614, 52696, 52716, 52792, 52868, 52888, 52981, 53074, 53094, 53149, 53204, 53263, 53316, 53358, 53400, 53459, 53520, 53563, 53627, 53691, 53734, 53776, 53822, 53871, 53977, 53997, 54006, 54033, 54084, 54135, 54212, 54289, 54352, 54449, 54573, 54673, 54773, 54848, 54858, 54872, 54892, 54901, 54923, 54936, 55037, 55047, 55071, 55086, 55099, 55199, 55225, 55245, 55301, 55319, 55325, 55355, 55396, 55406, 55433, 55454, 55467, 55497, 55531, 55536, 55579, 55607, 55635, 55660, 55722, 55806, 55881, 55977, 56069, 56126, 56275, 56335, 56395, 56424, 56461, 56513, 56565, 56626, 56716, 56786, 56927, 57029, 57131, 57206, 57281, 57348, 57435, 57521, 57612, 57698, 57789, 57875, 57960, 58041, 58137, 58218, 58303, 58384, 58469, 58546, 58643, 58682, 58721, 58770, 59406, 59470, 59516, 59552, 59598, 59634, 59758, 59759, 59774, 59775, 59794, 59795, 60114, 60115, 60125, 60126, 60431, 60432, 60455, 60456, 60796, 60797, 60922, 60923, 60939, 60940 ], "line_end_idx": [ 24, 138, 168, 279, 307, 398, 432, 586, 588, 590, 613, 624, 646, 657, 666, 680, 694, 706, 714, 715, 902, 903, 905, 1028, 1030, 1131, 1133, 1206, 1208, 1297, 1299, 1350, 1409, 1511, 1583, 1584, 1593, 1594, 1596, 3406, 3407, 3423, 3424, 5033, 6384, 7870, 7871, 7904, 7905, 7928, 7929, 8231, 8956, 8957, 8983, 8984, 11125, 11126, 11140, 11141, 13241, 13242, 13258, 13259, 14207, 14834, 14835, 14853, 14854, 16765, 16766, 16789, 16790, 17954, 17955, 17977, 17978, 19355, 19356, 19396, 19397, 19425, 19426, 20465, 21510, 22232, 22233, 22269, 22270, 23515, 23516, 23551, 23552, 24242, 24282, 24669, 24670, 24727, 24728, 24779, 24780, 25767, 25768, 25827, 25828, 26114, 27475, 28466, 28506, 28576, 28602, 28603, 28651, 28652, 28897, 29060, 29206, 29349, 29419, 29496, 29621, 29782, 30501, 30590, 30591, 30643, 30644, 30836, 30975, 30976, 31010, 31011, 32246, 34415, 35037, 35563, 35564, 35603, 35604, 37175, 37176, 37191, 37192, 37716, 37720, 38028, 38032, 38950, 38954, 40045, 40049, 40316, 40320, 40893, 40897, 41101, 41102, 41123, 41124, 41359, 41360, 41368, 41369, 41623, 41624, 41661, 41662, 41678, 41679, 41706, 41707, 41723, 41724, 41752, 41753, 41912, 41913, 41935, 41936, 42107, 42108, 42119, 42120, 42351, 42524, 42729, 42898, 43131, 43345, 43569, 43811, 43978, 44191, 44532, 44694, 44881, 45089, 45278, 45490, 45637, 45855, 46070, 46252, 46460, 46679, 46975, 47209, 47448, 47748, 47929, 48213, 48535, 48725, 48886, 49028, 49169, 49409, 49639, 49879, 50210, 50472, 50681, 50922, 50968, 51014, 51034, 51069, 51104, 51124, 51180, 51236, 51256, 51297, 51338, 51358, 51392, 51426, 51446, 51491, 51536, 51556, 51585, 51614, 51634, 51715, 51796, 51816, 51894, 51972, 51992, 52062, 52132, 52152, 52231, 52310, 52330, 52421, 52512, 52532, 52614, 52696, 52716, 52792, 52868, 52888, 52981, 53074, 53094, 53149, 53204, 53263, 53316, 53358, 53400, 53459, 53520, 53563, 53627, 53691, 53734, 53776, 53822, 53871, 53977, 53997, 54006, 54033, 54084, 54135, 54212, 54289, 54352, 54449, 54573, 54673, 54773, 54848, 54858, 54872, 54892, 54901, 54923, 54936, 55037, 55047, 55071, 55086, 55099, 55199, 55225, 55245, 55301, 55319, 55325, 55355, 55396, 55406, 55433, 55454, 55467, 55497, 55531, 55536, 55579, 55607, 55635, 55660, 55722, 55806, 55881, 55977, 56069, 56126, 56275, 56335, 56395, 56424, 56461, 56513, 56565, 56626, 56716, 56786, 56927, 57029, 57131, 57206, 57281, 57348, 57435, 57521, 57612, 57698, 57789, 57875, 57960, 58041, 58137, 58218, 58303, 58384, 58469, 58546, 58643, 58682, 58721, 58770, 59406, 59470, 59516, 59552, 59598, 59634, 59758, 59759, 59774, 59775, 59794, 59795, 60114, 60115, 60125, 60126, 60431, 60432, 60455, 60456, 60796, 60797, 60922, 60923, 60939, 60940, 60954 ] }
{ "red_pajama_v2": { "ccnet_original_length": 60954, "ccnet_original_nlines": 393, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.23771537840366364, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.04028398171067238, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3024888336658478, "rps_doc_frac_unique_words": 0.216935932636261, "rps_doc_mean_word_length": 5.44100284576416, "rps_doc_num_sentences": 1059, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 6.042489528656006, "rps_doc_word_count": 8975, "rps_doc_frac_chars_dupe_10grams": 0.12387114763259888, "rps_doc_frac_chars_dupe_5grams": 0.2763500213623047, "rps_doc_frac_chars_dupe_6grams": 0.21778306365013123, "rps_doc_frac_chars_dupe_7grams": 0.1840968132019043, "rps_doc_frac_chars_dupe_8grams": 0.15194642543792725, "rps_doc_frac_chars_dupe_9grams": 0.1378576010465622, "rps_doc_frac_chars_top_2gram": 0.015358470380306244, "rps_doc_frac_chars_top_3gram": 0.01873732917010784, "rps_doc_frac_chars_top_4gram": 0.006593899801373482, "rps_doc_books_importance": -4878.5029296875, "rps_doc_books_importance_length_correction": -4878.5029296875, "rps_doc_openwebtext_importance": -2926.382080078125, "rps_doc_openwebtext_importance_length_correction": -2926.382080078125, "rps_doc_wikipedia_importance": -2672.66455078125, "rps_doc_wikipedia_importance_length_correction": -2672.66455078125 }, "fasttext": { "dclm": 0.04796510934829712, "english": 0.8742156028747559, "fineweb_edu_approx": 2.8515255451202393, "eai_general_math": 0.8018588423728943, "eai_open_web_math": 0.4302489161491394, "eai_web_code": 0.041574541479349136 } }
{ "free_decimal_correspondence": { "primary": { "code": "551.48", "labels": { "level_1": "Science and Natural history", "level_2": "Geology and Earth sciences", "level_3": "Physical geology and Geodynamics" } }, "secondary": { "code": "624.17", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Bridges, Roofs, and Civil engineering" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
7,010,764,721,495,999,000
• We are sorry, but NCBI web applications do not support your browser and may not function properly. More information Logo of plosbiolPLoS BiologySubmit to PLoSGet E-mail AlertsContact UsPublic Library of Science (PLoS)View this Article PLoS Biol. Feb 2005; 3(2): e65. Published online Feb 15, 2005. doi:  10.1371/journal.pbio.0030065 PMCID: PMC548955 Facts from Text—Is Text Mining Ready to Deliver? Biological databases offer access to formalized facts about many aspects of biology—genes and gene products, protein structure, metabolic pathways, diseases, organisms, and so on. These databases are becoming increasingly important to researchers. The information that populates databases is generated by research teams and is usually published in peer-reviewed journals. As part of the publication process, some authors deposit data into a database but, more often, it is extracted from the published literature and deposited into the databases by human curators, a painstaking process. Research literature and scientific databases fulfil different needs. Literature provides ideas and new hypotheses, but is not constrained to provide facts in formats suitable for use in databases. By contrast, databases efficiently provide large quantities of data and information in a standardised schema representing a predefined interpretation of the data. While the acceptance of a paper can enforce the submission of data to a central data repository, such as EMBL (www.ebi.ac.uk/embl/) or ArrayExpress (www.ebi.ac.uk/arrayexpress/), nobody receives credit for the submission of a fact to a database without an associated publication. As long as this practice continues, curation will be necessary to add the (re)formalised facts to biological databases. Given that publications are not about to be replaced with routine deposition of data into databases, is it possible to develop software tools to support the work of the curator? Could we automatically analyse new scientific publications routinely to extract facts, which could then be inserted into scientific databases? Could we tag gene and protein names, as well as other terms in the document, so that they are easier to recognise? How can we use controlled vocabularies and ontologies to identify biological concepts and phenomena? Fortunately, there are many groups that are now seeking to answer these questions, precisely with a view to extracting facts from text. Part of the motivation for this effort in text mining technology is the inexorable rise in the amount of published literature (Figure 1). This massive growth, coupled with the current inefficiencies in transferring facts into other data resources, leads to the unfortunate state that biological databases tend to be incomplete (for example, DNA sequences without known function in genetic databases), and there are inconsistencies between databases and literature. Figure 1 Medline Article Deluge In theory, text mining is the perfect solution to transforming factual knowledge from publications into database entries. But computational linguists have not yet developed tools that can analyse more than 30% of English sentences correctly and transform them into a structured formal representation [1,2]. We can analyse part of a sentence, such as a subphrase describing a protein–protein interaction or part of a sentence containing a gene and a protein name, but we always run into Zipf's law whenever we write down the rules for how the extraction is done (Figure 2) [3]. A small number of patterns describe a reasonable portion of protein–protein interactions, gene names, or mutations, but many of those entities are described by a pattern of words that's only ever used once. Even if we could collect them all—which is impossible—we can't stop new phrases from being used. Figure 2 Zipf's Law Curators—The Gold Standard Hand-curated data is precise, because the curator is trained to inspect literature and databases, select only high-quality data, and reformat the facts according to the schema of the database. In addition, curators select citations from the text as evidence for the identified fact, and those citations are also added to the database. Curators read and interpret the text at the same time, and if they don't understand the meaning of a sentence, they can go back and pick a new strategy to analyse it—they can even call the authors to iron out any ambiguities. Curators can also cope with the high variability of language described by Zipf's law. At present, no computer-based system comes close to matching these capabilities. In particular, it is difficult to convert all the curators' domain knowledge into a structured training set for the purposes of machine learning approaches. Curators fulfil a second important task: they know how to define standards for data consistency, in particular, the most relevant terminology, which has led to the design of standardised ontologies and controlled vocabularies (see Box 1 for an explanation of these and related terms). Examples of these include Gene Ontology (GO; www.geneontology.org/), Unified Medical Language System (www.nlm.nih.gov/research/umls/), and MedDRA (www.meddramsso.com/NewWeb2003/index.htm) [4]. These terminological resources help to relate entries in bioinformatics databases to concepts mentioned in scientific publications and to link related information in databases using different schemas. Text miners would love such standards to be used in text, but there is an understandable reluctance to impose and use standards that might limit the expressiveness of natural language. Box 1. Glossary Controlled vocabulary: A set of terms, to standardise input to a database. F-measure: A statistic that is used to score the success of NE recognition by text mining tools. The F-measure is an average parameter based on precision (how many of the entities found by the tool are correct identifications of an entity) and recall (how many of the entities existing in the text did the tool find). Machine learning: The technology and study of algorithms through which machines (computers) can “learn”, or automatically improve their systems through data gathered in the past (experience). Ontology: A set of terms with clear semantics (language), clear motivations for distinction between the terms, and strict rules for how the terms relate to each other. Curation and Text Mining—In Partnership The problem with curation of data is that it is time consuming and costly, and therefore has to focus on the most relevant facts. This compromises the completeness of the curated data, and curation teams are doomed to stay behind the latest publications. So, is it possible for curation and text mining to work together for rapid retrieval and analysis of facts with precise postprocessing and standardisation of the extracted information? There are several software tools that perform well in the identification of standardised terms from the literature. Examples include Textpresso and Whatizit [5,6,7,8]. Extensive term lists come from the Human Genome Organization (www.gene.ucl.ac.uk/hugo; 20,000 gene and protein names), GO (almost 20,000 terms), Uniprot/Swiss-Prot (www.ebi.uniprot.org/index.shtml; about 200,000 terms), and other databases. In addition, terms describing diseases, syndromes, and drugs are available from the Unified Medical Language System. Altogether, about 500,000 terms constitute the basis of domain knowledge in life sciences. To gain some perspective of this figure: an average individual handles 2,000 to 20,000 terms in his or her daily language, and Merriam-Webster's Collegiate Dictionary provides definitions for 225,000 terms (www.merriam-webstercollegiate.com/). The identification of all terms by a text mining system still sets challenging demands. All variants of a term have to be taken into account, including syntactical variants and synonyms. In the case of ambiguities, relevant findings have to be distinguished from other findings—a process referred to as disambiguation. Depending on the curation task, it might therefore be advantageous to select only part of the terminological resources and thus restrict the domain of the terminology to the curators' needs (Figure 3). Figure 3 GOAnnotator Available text mining solutions are concerned with named entity (NE) recognition (entities are, for example, proteins, species, and cell lines), with identification of relationships between NEs (such as protein interactions), and with the classification of text subphrases according to annotation schemata in general (thyroid receptor is a thyroid hormone receptor) [9,10,11,12,13,14,15]. Whilst the identification of a curation team's terminology in the scientific text under scrutiny is immensely valuable, there is still a long way to go before this becomes routine. Some Immediate Challenges Not all terms used in the literature (NEs) can actually be found in some kind of database (perhaps because of an author error, or an alternative name for an entity adopted by the community). Text mining methods therefore have to detect new terms and map the term to known terminology [16]. If several mappings are possible, the correct version has to be selected (disambiguation). Over the past several years text mining research teams have presented various approaches that train a software tool to locate representations of gene or protein names (for example, BioCreative, www.pdg.cnb.uam.es/BioLINK/BioCreative.eval.html, and JNLPBA, www.genisis.ch/~natlang/JNLPBA04/) [17,18]. These tools are scored with a statistic known as the F-measure, with the best methods scoring about 0.85. At the level of 0.85, curators still tend to be unhappy. However, analyses have shown that this score is in the range of curator–curator variation (unpublished data, measured as part of the project work for [19]), which suggests that such methods produce useful results. Additional information-extraction methods have been proposed, for example, for the documentation of mutations in specific genes and for the extraction of the subcellular location of proteins [11,13]. An even larger number of tools focus on the identification of appropriate terminology for the annotation of genes (GO terms) [7]. The evaluation of their usefulness depends on the demands of the user groups. Finally, another way to support curation teams would be to provide information-retrieval methods to guide the team members towards documents containing relevant information. For example, in 2002, the participants in the Knowledge Discovery and Data-Mining Challenge Cup (www.cs.cornell.edu/projects/kddcup/) had to select documents from a given corpus that contained relevant experimental results about Drosophila [20]. How Can Publishers Contribute? For all automated information-extraction methods, it is obvious that access to literature is crucial. Electronic access has, of course, already had a huge impact, but the structure and organisation of manuscripts could also be improved. For example, semantic tags could be integrated into the text. The markup would not appear on web pages or when the document is printed, but it would help software to deal with semantic aspects of the document. Inserting tags, for example, to mark protein names would allow retrieval software to find documents about proteins even if they look like common English words, such as “you” or “and”. Retrieval engines currently often ignore such terms. In addition, explicit tags would enable text mining methods, for example, when looking for protein–protein interactions, to use the correct semantic interpretation. Text mining systems already available today, such as Whatizit, can integrate semantic tags during submission, which have to be verified by the author. Text mining is ready to deliver tools whereby information is passed back to the authors about the proper use of terminology within their documents. If the use of a term raises conflicts or ambiguities or if the use of a term is wrong, the author is asked to provide feedback. The curation effort is resolved at the earliest possible time-point. Author, publisher, reviewer, and reader profit from consistent information representation, which leads to better dissemination of documents and journals and easily offsets the additional cost in the generation of an article. Publishers and authors have to agree on standards though. Is Text Mining Ready to Deliver? Text mining solutions have found their way into daily work, wherever fast and precise extraction of details from a large volume of text is needed. We have to keep in mind, however, that any text mining tool, just like other bioinformatics resources, will only be suitable for a limited number of tasks. For example, the same text may serve curators from different communities who extract different types of facts, depending on their domain knowledge. Furthermore, different communities have different expectations for accuracy. For example, curators dealing with a small set of proteins prefer tools with high recall, whereas curators dealing with a large number of proteins prefer tools with high precision. Although text mining cannot dissect English sentences completely, and cannot extract the meaning and put the facts into a database, text mining tools are becoming increasingly used and valued. Text mining is ready to deliver handling of complex terminology and nomenclature as a mature service. It is only a matter of time and effort before we are able to extract facts automatically. The consequences are likely to be profound. Not only will we have a more effective approach for the mining of knowledge from the literature, our approach to the publication process itself might change. If a fact is clear enough for automatic extraction, it could be reported in a fact database instead of a publication. As methods improve, authors will see more and more of their text being analysed and formalised in a database. If appropriate quality control is provided, and if authors receive due credit for their deposition of facts into databases, we might well see a shift towards original papers describing new creative ideas and visions rather than just listing facts. Abbreviations GO Gene Ontology NE named entity Footnotes Citation: Rebholz-Schuhmann D, Kirsch H, Couto F (2005) Facts from text—Is text mining ready to deliver? PLoS Biol 3(2): e65. Dietrich Rebholz-Schuhmann and Harald Kirsch are at the European Bioinformatics Institute, Cambridge, United Kingdom. Francisco Couto is in the Departamento de Informática, Faculidade de Ciências, Universidade de Lisboa, Portugal. References • Briscoe T, Carroll J. Robust Accurate statistical annotation of general text; Proceedings of the Third International Conference on Language Resources and Evaluation; 2002 May; Canary Islands, Spain: European Language Resources Association; 2002. pp. 1499–1504. • Pyysalo S, Ginter F, Pahikkala T, Koivula J, Boberg J, et al. In: Collier N, Ruch P, Nazarenko, editors. Analysis of link grammar on biomedical dependency corpus targeted at protein-protein interactions; Proceedings of the International Joint Workshop on Natural Language Processing in Biomedicine and Its Applications; 2004 August 28–29; Geneva, Switzerland. 2004. pp. 15–21. • Zipf GK. Selective studies and the principle of relative frequency in language. Cambridge (Massachusetts): MIT Press; 1932. • Gene Ontology Consortium. Creating the gene ontology resource: Design and implementation. Genome Res. 2001;11:1425–1433. [PMC free article] [PubMed] • Müller HM, Kenny EE, Sternberg PW. Textpresso: An ontology-based information retrieval and extraction system for biological literature. PLoS Biol. 2004;2:e309. [PMC free article] [PubMed] • Nenadic G, Mima H, Spasic I, Ananiadou S, Tsujii JI. Terminology-driven literature mining and knowledge acquisition in biomedicine. Int J Med Inf. 2002;67:33–48. [PubMed] • Perez AJ, Perez-Iratxeta C, Bork P, Thode G, Andrade MA. Gene annotation from scientific literature using mappings between keyword systems. Bioinformatics. 2004;20:2084–2091. [PubMed] • Rebholz-Schuhmann D, Kirsch H. Extraction of biomedical facts—A modular Web server at the EBI (Whatizit) [presentation]. Healthcare Digital Libraries Workshop; 2003 September 16; Bath, United Kingdom. 2004. • Marcotte EM, Xenarios I, Eisenberg D. Mining literature for protein-protein interactions. Bioinformatics. 2001;17:359–363. [PubMed] • Ono T, Hishigaki H, Tanigami A, Takagi T. Automated extraction of information on protein-protein interactions from the biological literature. Bioinformatics. 2001;17:155–161. [PubMed] • Rebholz-Schuhmann D, Marcel S, Albert S, Tolle R, Casari G, et al. Automatic extraction of mutations from Medline and cross-validation with Omim. Nucleic Acids Res. 2004;32:135–142. [PMC free article] [PubMed] • Rzhetsky A, Iossifov I, Koike T, Krauthammer M, Kra P, et al. GeneWays: A system for extracting, analyzing, visualizing, and integrating molecular pathway data. J Biomed Inf. 2004;37:43–53. [PubMed] • Stapley BJ, Kelley LA, Sternberg MJ. Predicting the sub-cellular location of proteins from text using support vector machines. Pac Symp Biocomput. 2002;2002:374–385. [PubMed] • Temkin J, Gilder M. Extraction of protein interaction information from unstructured text using a context-free grammar. Bioinformatics. 2003;19:2046–2053. [PubMed] • Yu H, Agichtein E. Extracting synonymous gene and protein terms from biological literature. Bioinformatics. 2003;19(Suppl 1):I340–I349. [PubMed] • Hanisch D, Fluck J, Mevissen HT, Zimmer R. Playing biology's name game: Identifying protein names in scientific text. Pac Symp Biocomput. 2003;2003:403–414. [PubMed] • Blaschke C, Hirschman L, Yeh A, Colosimo M, Morgan A, et al. Report on the BioCreAtIvE Workshop, Granada 2004 [abstract]. 12th International Conference on Intelligent Systems for Molecular Biology; 2004 13 July–4 August; ; Glasgow, United Kingdom. Intelligent Systems for Molecular Biology; 2004. • GuoDong Z, Dan S, Jie Z, Jian S, Heng TS, et al. In: Blaschke C, editor. Recognition of protein/gene names from text using an ensemble of classifiers and effective abbreviation resolution; Proceedings of the BioCreative Workshop; 2004 March 28–31; Granada, Spain: BMC Bioinformatics; 2004. • Albert S, Gaudan S, Knigge H, Raetsch A, Delgado A, et al. Computer-assisted generation of a protein-interaction database for nuclear receptors. Mol Endocrinol. 2003;17:1555–1567. [PubMed] • Yeh A, Hirschman L, Morgan A. Evaluation of text data mining for database curation: Lessons learned from the KDD Challenge Cup. Bioinformatics. 2003;19:I331–I339. [PubMed] Articles from PLoS Biology are provided here courtesy of Public Library of Science Formats: Related citations in PubMed See reviews...See all... Cited by other articles in PMC See all... Links Recent Activity Your browsing activity is empty. Activity recording is turned off. Turn recording back on See more...
{ "url": "http://www.ncbi.nlm.nih.gov/pmc/articles/PMC548955/?tool=pubmed", "source_domain": "www.ncbi.nlm.nih.gov", "snapshot_id": "crawl=CC-MAIN-2014-10", "warc_metadata": { "Content-Length": "72823", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:A5CUHHOFURTHVM6JSVCANB3W2MYPORNY", "WARC-Concurrent-To": "<urn:uuid:42bcde4c-5226-44e7-bd03-735977ab5aff>", "WARC-Date": "2014-03-10T16:13:41Z", "WARC-IP-Address": "130.14.29.110", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:7B2EJY6YDUGIVSWFGZGHIA7CM3PSMGM6", "WARC-Record-ID": "<urn:uuid:40aa3a20-bd17-4246-9ae3-f4cf1736b7b9>", "WARC-Target-URI": "http://www.ncbi.nlm.nih.gov/pmc/articles/PMC548955/?tool=pubmed", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a82d7190-a4e4-4c85-95b8-0645a9c61a00>" }, "warc_info": "robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 120, 239, 271, 337, 354, 355, 404, 405, 993, 994, 1754, 1755, 2428, 2429, 2894, 2895, 2904, 2927, 2928, 3809, 3810, 3819, 3830, 3831, 3858, 3859, 4194, 4195, 4745, 4746, 5610, 5611, 5627, 5628, 5703, 5704, 6022, 6023, 6215, 6216, 6384, 6385, 6425, 6426, 6866, 6867, 7728, 7729, 8250, 8251, 8260, 8272, 8273, 8843, 8844, 8870, 8871, 9252, 9253, 9930, 9931, 10759, 10760, 10791, 10792, 11641, 11642, 12421, 12422, 12455, 12456, 13165, 13166, 14229, 14230, 14244, 14245, 14248, 14262, 14265, 14278, 14279, 14289, 14290, 14416, 14417, 14648, 14649, 14660, 14661, 14926, 15307, 15435, 15588, 15780, 15955, 16143, 16354, 16490, 16678, 16892, 17095, 17274, 17441, 17590, 17760, 18061, 18355, 18548, 18724, 18725, 18808, 18809, 18818, 18819, 18847, 18848, 18873, 18874, 18905, 18906, 18917, 18918, 18924, 18925, 18941, 18942, 18975, 18976, 19010, 19011, 19034, 19035 ], "line_end_idx": [ 120, 239, 271, 337, 354, 355, 404, 405, 993, 994, 1754, 1755, 2428, 2429, 2894, 2895, 2904, 2927, 2928, 3809, 3810, 3819, 3830, 3831, 3858, 3859, 4194, 4195, 4745, 4746, 5610, 5611, 5627, 5628, 5703, 5704, 6022, 6023, 6215, 6216, 6384, 6385, 6425, 6426, 6866, 6867, 7728, 7729, 8250, 8251, 8260, 8272, 8273, 8843, 8844, 8870, 8871, 9252, 9253, 9930, 9931, 10759, 10760, 10791, 10792, 11641, 11642, 12421, 12422, 12455, 12456, 13165, 13166, 14229, 14230, 14244, 14245, 14248, 14262, 14265, 14278, 14279, 14289, 14290, 14416, 14417, 14648, 14649, 14660, 14661, 14926, 15307, 15435, 15588, 15780, 15955, 16143, 16354, 16490, 16678, 16892, 17095, 17274, 17441, 17590, 17760, 18061, 18355, 18548, 18724, 18725, 18808, 18809, 18818, 18819, 18847, 18848, 18873, 18874, 18905, 18906, 18917, 18918, 18924, 18925, 18941, 18942, 18975, 18976, 19010, 19011, 19034, 19035, 19046 ] }
{ "red_pajama_v2": { "ccnet_original_length": 19046, "ccnet_original_nlines": 133, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.30194804072380066, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.030573589727282524, "rps_doc_frac_lines_end_with_ellipsis": 0.02238805964589119, "rps_doc_frac_no_alph_words": 0.23620130121707916, "rps_doc_frac_unique_words": 0.3684774935245514, "rps_doc_mean_word_length": 5.512508869171143, "rps_doc_num_sentences": 227, "rps_doc_symbol_to_word_ratio": 0.001082250033505261, "rps_doc_unigram_entropy": 6.060441017150879, "rps_doc_word_count": 2798, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.03196316957473755, "rps_doc_frac_chars_dupe_6grams": 0.019579879939556122, "rps_doc_frac_chars_dupe_7grams": 0.005186719819903374, "rps_doc_frac_chars_dupe_8grams": 0.005186719819903374, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.012318460270762444, "rps_doc_frac_chars_top_3gram": 0.004538380075246096, "rps_doc_frac_chars_top_4gram": 0.0033065399620682, "rps_doc_books_importance": -1596.12841796875, "rps_doc_books_importance_length_correction": -1596.12841796875, "rps_doc_openwebtext_importance": -874.2914428710938, "rps_doc_openwebtext_importance_length_correction": -874.2914428710938, "rps_doc_wikipedia_importance": -619.4696655273438, "rps_doc_wikipedia_importance_length_correction": -619.4696655273438 }, "fasttext": { "dclm": 0.050881508737802505, "english": 0.8826122879981995, "fineweb_edu_approx": 2.963848829269409, "eai_general_math": 0.6322152018547058, "eai_open_web_math": 0.4519031047821045, "eai_web_code": 0.29174166917800903 } }
{ "free_decimal_correspondence": { "primary": { "code": "006.3", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Cognitive science" } }, "secondary": { "code": "570", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "4", "label": "Advanced Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
1,426,640,448,957,453,600
Switching it up: IGBTs Posted by Mackenzie Inman 15/08/2014 9 Comment(s) Variable Frequency Drives, An Insulated Gate Bipolar Transistor (IGBT) is a key component in what makes up a VFD (Variable Frequency Drive). If you break down a VFD, one easy way to analyze it is to think of it in three main parts: the bridge converter, DC link, and what we will talk about today, the inverter. An IGBT is the inverter element in a VFD, pulsing voltage faster than we can even blink. IGBTs have come a long way since they were first developed in the 1980’s. The IGBTs of today are much more advanced than their predecessors, which were slow at switching current on and off and often had problems overheating when passing a high current. With each new generation, IGBTs have continued to improve. No longer plagued by slow speeds, IGBTs have become highly reliable devices that can handle high voltage devices and are able to switch in less than a nanosecond (that’s a billionth of a second)! IGBTs are the “Gatekeepers” of Current To understand an IGBT’s role in a VFD, it is important to identify how an IGBT works on a smaller scale. As defined by being a transistor, an IGBT is a semiconductor with three terminals which work as a switch for moving electrical current. Just as the word “gate” suggests, when voltage is applied to the gate, it opens or “turns on” and creates a path for current to flow between the layers. If no voltage is applied to the gate, or if the voltage is not high enough, the gate remains closed and there will be no flow of electricity. In this way, an IGBT behaves like a switch; on when the gate is open and flowing current and off when it is closed.  In this way, the IGBT acts as the switch used to create Pulse-Width Modulation (PWM). An IGBT will switch the current on and off so rapidly that less voltage will be channeled to the motor, helping to create the PWM wave. For example, although the input voltage may in reality be 650V, the motor perceives it as more like 480V by using PWM (shown in diagrams below). This PWM wave is key to a VFDs operation because it is the variable voltage and frequency created by the PWM wave that will allow a VFD to control the speed of the motor. Therefore, without the IGBT switching the current on and off so rapidly a PWM wave—and the speed control that comes with it— could not be created. 480V 60Hz 80V 10Hz The number of pulses per second from the IGBTs is known as carrier frequency. Since carrier frequency is an adjustable parameter on most VFDs, you can essentially set it as high or as low as you want. Although, adjusting the carrier frequency comes with a few tradeoffs. Setting the carrier frequency too high will reduce the acoustic noise level produced from the VFD, but it will also shorten the expected VFD life due to heat. A higher carrier frequency will also contribute to an increase in motor heating and affect the overall efficiency of the motor. On the other hand, if you are in a sound sensitive environment – or if you just don’t want a headache – setting the carrier frequency too low can create a lot of motor noise or whining from the VFD. We have found that setting your carrier frequency at about 2 Kilohertz will achieve a nice balance between the audible acoustics while still keeping your VFD running efficiently.  In a typical six pulse drive there are six IGBTs pulsing voltage up to 15,000 times per second. Since their introduction in the 1980’s, IGBTs have literally switched up the market and now play a large role in many modern day power electronics applications where speed and process control are needed. It is clear that IGBTs play a large role in many power electronic applications and will continue to as they become more and more advanced in their technology. Hopefully taking this in depth look at the small part an IGBT plays has helped you to understand the overall functionality of a VFD as well. Check out our other featured articles for everything you need to know about VFDs and motors at www.vfds.com/blog, or click on the banner below to find the VFD you are looking for out of our 2,000+ inventory! Leave a Comment 9 Comment(s) Mitchell Friedman: 27/07/2017, 08:50:46 AM Reply We require a small (1 amp @ 120v 60 Hz input) power supply to provide 120v 60 Hz adjustable to 75 Hz output for a production application. rahul gupta: 06/01/2017, 06:18:52 AM Reply Commen good block for learning Amruth: 25/08/2016, 03:18:19 AM Reply what is the max temperature that IGBT can withstand in AC drives?? What is the max temp AC drives can withstand?? Ayoob: 04/06/2016, 07:44:14 AM Reply Is it possible to run the motor of 275 kW with 250kw drive? admin: 06/06/2016, 08:04:43 AM Hello Ayoob, If the VFD has a maximum current rating higher than the motor's full load amperage (FLA), and there is no reason the VFD would need to be de-rated (high elevation, high temperature, single-phase input), then the VFD will be able to drive the motor without a problem. naresh kumar: 27/11/2015, 11:38:12 PM Reply Principal nikan: 15/08/2015, 07:58:17 AM Reply Hi, thanks for nice site. Does the output of the inverter 200 V to 12 V, 12 V, 50 Hz with reduced and motor launches. Thank you. Jeff Vollin: 29/07/2015, 02:43:57 PM Reply Where do you get IGBT's that switch in under a nanosecond? I am not familiar with any device that fast, and I would be very interested if it existed. vikas: 10/09/2016, 11:05:48 PM take any faulty VFD break it u will find a three terminal device in it which will be in rectangular in shape. if u want more knowledge about it then refer to its manual. Marius Hauki : 17/05/2015, 05:50:55 AM Reply The rotor loss in a squirrel caged asynchronous AC motor is proportional to Pmech_axle * s/(1-s) where s = (ns - n) / ns. ns = synchronous speed n = axle speed s = slip If a voltage speed regulation method is used, the motor moves closer to Mmax and s increases. The rotor losses increase significantly since the artio s/(1-s) increases. Furthermore Mmax is proportional to Uin squared , so the M (mechanical moment) lost may be significant. If a slip ring rotor resistance regulation method is used, s still increases and loss increases, but the Moment Mmax is constant but moved lower in rpm. If a frequency based speed regulation method (VFD) is used, the ns is altered so s (the slip) can be held much lower. Therefore the rotor loss should be lower. The Mmax is also more or less constant. Therefore a VFD method gives less loss when we look at the fundamental frequency of the drive current. Harmonics may give loss components, but the VFD should have proper filtering and design to prevent harmonic current loss in the motor. al archambault: 30/12/2014, 11:32:43 AM Reply Your comment about higher xarrier frequencies increasing losses in the motor is not correct. A higher carrier frequency actually reduces the motor losses but as you said higher carrier frequency increases the losses in the inverter section of the VFD. admin: 09/01/2015, 04:23:00 PM Al, Thank you for your comment. We always try to give as accurate and reliable information as possible. We spoke with several of our engineers to learn their experiences with how a higher or lower carrier frequency affects a motor. They really felt that the majority of the time, losses either way (with a higher or lower carrier frequency) were negligible. They have, however, seen that with a high carrier frequency there were occasions where the motor would run hotter. We'll make sure to update our post to make that more clear, so thank you for bringing that to our attention. Mackenzie
{ "url": "http://www.vfds.com/blog/switching-it-up-igbt", "source_domain": "www.vfds.com", "snapshot_id": "crawl=CC-MAIN-2017-34", "warc_metadata": { "Content-Length": "47284", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:4ADWRHD6WHWISULDTZUPIQ3LHMFQ77JV", "WARC-Concurrent-To": "<urn:uuid:6dc8e619-01f7-482d-a78a-2a1c58a15fe8>", "WARC-Date": "2017-08-23T04:07:33Z", "WARC-IP-Address": "67.51.220.188", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:ZSLY4KUE4UHO6XAXODIZANSOXY56VUUQ", "WARC-Record-ID": "<urn:uuid:293f5879-9437-472b-ab81-71b5c20e0833>", "WARC-Target-URI": "http://www.vfds.com/blog/switching-it-up-igbt", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:b4891d90-c426-4c8e-a211-1bec3cd56fa5>" }, "warc_info": "robots: classic\r\nhostname: ip-10-166-40-216.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 23, 24, 101, 102, 476, 477, 985, 986, 1025, 1026, 1679, 1680, 2365, 2366, 2367, 2377, 2378, 2379, 2388, 2389, 3326, 3327, 4135, 4136, 4152, 4153, 4166, 4167, 4186, 4210, 4216, 4217, 4355, 4356, 4369, 4393, 4399, 4400, 4407, 4431, 4432, 4440, 4464, 4470, 4471, 4538, 4585, 4586, 4593, 4617, 4623, 4624, 4684, 4685, 4692, 4716, 4717, 4730, 4731, 4998, 4999, 5013, 5037, 5043, 5044, 5054, 5055, 5062, 5086, 5092, 5093, 5119, 5211, 5222, 5223, 5236, 5260, 5266, 5267, 5417, 5418, 5425, 5449, 5450, 5620, 5621, 5636, 5660, 5666, 5667, 5789, 5790, 5813, 5828, 5837, 5838, 6111, 6112, 6265, 6266, 6569, 6570, 6705, 6706, 6707, 6708, 6709, 6725, 6749, 6755, 6756, 6849, 6850, 7009, 7010, 7017, 7041, 7042, 7046, 7047, 7625, 7626 ], "line_end_idx": [ 23, 24, 101, 102, 476, 477, 985, 986, 1025, 1026, 1679, 1680, 2365, 2366, 2367, 2377, 2378, 2379, 2388, 2389, 3326, 3327, 4135, 4136, 4152, 4153, 4166, 4167, 4186, 4210, 4216, 4217, 4355, 4356, 4369, 4393, 4399, 4400, 4407, 4431, 4432, 4440, 4464, 4470, 4471, 4538, 4585, 4586, 4593, 4617, 4623, 4624, 4684, 4685, 4692, 4716, 4717, 4730, 4731, 4998, 4999, 5013, 5037, 5043, 5044, 5054, 5055, 5062, 5086, 5092, 5093, 5119, 5211, 5222, 5223, 5236, 5260, 5266, 5267, 5417, 5418, 5425, 5449, 5450, 5620, 5621, 5636, 5660, 5666, 5667, 5789, 5790, 5813, 5828, 5837, 5838, 6111, 6112, 6265, 6266, 6569, 6570, 6705, 6706, 6707, 6708, 6709, 6725, 6749, 6755, 6756, 6849, 6850, 7009, 7010, 7017, 7041, 7042, 7046, 7047, 7625, 7626, 7635 ] }
{ "red_pajama_v2": { "ccnet_original_length": 7635, "ccnet_original_nlines": 122, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.39030301570892334, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03999999910593033, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.20787878334522247, "rps_doc_frac_unique_words": 0.38767844438552856, "rps_doc_mean_word_length": 4.507137298583984, "rps_doc_num_sentences": 62, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.537811279296875, "rps_doc_word_count": 1331, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.04367395117878914, "rps_doc_frac_chars_dupe_6grams": 0.03400567173957825, "rps_doc_frac_chars_dupe_7grams": 0.009001499973237514, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.03200532868504524, "rps_doc_frac_chars_top_3gram": 0.006000999826937914, "rps_doc_frac_chars_top_4gram": 0.007501250132918358, "rps_doc_books_importance": -820.7470092773438, "rps_doc_books_importance_length_correction": -820.7470092773438, "rps_doc_openwebtext_importance": -444.4725036621094, "rps_doc_openwebtext_importance_length_correction": -444.4725036621094, "rps_doc_wikipedia_importance": -320.7889709472656, "rps_doc_wikipedia_importance_length_correction": -320.7889709472656 }, "fasttext": { "dclm": 0.11802166700363159, "english": 0.94809490442276, "fineweb_edu_approx": 2.5936310291290283, "eai_general_math": 0.6442808508872986, "eai_open_web_math": 0.47953760623931885, "eai_web_code": 0.052489638328552246 } }
{ "free_decimal_correspondence": { "primary": { "code": "621.31724", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } }, "secondary": { "code": "621.317", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
4,476,710,586,410,713,000
With a few simple tweaks, you can tailor the BlackBerry Motion so it looks and feels exactly how you want it to. Whether you just want the interface to fit your style, or you have a specific arrangement that will help you get things done quickly, these customization tips will be good to know. How to move home screen icons on the BlackBerry Motion 1. Tap and hold an icon on the screen. 2. Drag to a desired location. Move to either left or right edge to place on another home screen. 3. Release on desired location. How to remove home screen icons or widgets on the BlackBerry Motion 1. Tap and hold an icon or widget on the home screen. 2. Drag and release to the Remove section at the top-left of the screen. 3. Alternatively, flick upwards after holding and the icon or widget will be removed. How to make icon folders on the BlackBerry Motion 1. Tap and hold an icon on the home screen. 2. Drag it over another icon until a box appears around them. Do so quickly, otherwise the second icon will just shift position so the first can replace its spot. 3. Tap the folder to view all icons inside. Tap New Folder at the bottom to type in a label for the folder. How to add home screen icons on the BlackBerry Motion 1. Tap the All apps icon at the bottom in the middle of the screen. 2. Tap and hold the icon you wish to place. 3. Drag the icon to the desired position. Drag it to either edge of the screen to place it on a different home screen. A gray shadow of the icon will preview its position. Other icons and widgets will attempt to reposition to make room for it. 4. Release at the desired position. How to add home screen widgets on the BlackBerry Motion 1. Tap and hold a blank area of the home screen. 2. Tap Widgets in the bar along the bottom. 3. Swipe up and down through the list to view available widgets. 4. Tap and hold the widget you wish to place. 5. Drag the widget to the desired position. Drag it to either edge of the screen to place it on a different home screen. A gray shadow of the widget will preview its position. Other icons and widgets will attempt to reposition to make room for it. 6. Release at the desired position. 7. Some widgets can be resized. Press and hold a widget, then release. Each side of the widget will have dots that you can drag to resize. How to change BlackBerry Motion icons 1. Tap and hold a blank area of the home screen. 2. Tap Icon packs in the bar along the bottom. 3. Tap the icon pack. 4. A preview of the icon set will pop up. Tap Set in the bottom-right to make the pack active. 5. If you don't have any icon packs installed, tap the icon in the top-right to launch the Play Store and search for icon packs to download. How to turn on the dark theme on the BlackBerry Motion 1. Tap and hold a blank area of the home screen. 2. Tap Settings in the bar along the bottom. 3. Tap Theme. 4. Select Dark, or back to Light. View more BlackBerry Motion Help & How To Articles
{ "url": "https://crackberry.com/blackberry-motion-change-icons?amp", "source_domain": "crackberry.com", "snapshot_id": "crawl=CC-MAIN-2018-51", "warc_metadata": { "Content-Length": "84469", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:PLBLGXLPKXRYN2IXU5KE3VRGEJCJ37JA", "WARC-Concurrent-To": "<urn:uuid:dcce443a-a0a6-443e-88b2-2588dc9c21a3>", "WARC-Date": "2018-12-17T10:56:42Z", "WARC-IP-Address": "104.16.207.223", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:QXEV7DIYSLFH7FHSYEH4P63ORDEN5K42", "WARC-Record-ID": "<urn:uuid:e7444ea6-9ba6-4af8-9d2f-86cfa67a27b4>", "WARC-Target-URI": "https://crackberry.com/blackberry-motion-change-icons?amp", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:5757433a-02e9-4306-9ece-f3a8ae3982fb>" }, "warc_info": "isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-145-10-101.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 294, 295, 350, 351, 392, 492, 526, 527, 595, 596, 652, 727, 815, 816, 866, 867, 913, 1078, 1188, 1189, 1243, 1244, 1314, 1360, 1606, 1644, 1645, 1701, 1702, 1753, 1799, 1866, 1914, 2164, 2202, 2343, 2344, 2382, 2383, 2434, 2483, 2507, 2604, 2747, 2748, 2803, 2804, 2855, 2902, 2918, 2954, 2955 ], "line_end_idx": [ 294, 295, 350, 351, 392, 492, 526, 527, 595, 596, 652, 727, 815, 816, 866, 867, 913, 1078, 1188, 1189, 1243, 1244, 1314, 1360, 1606, 1644, 1645, 1701, 1702, 1753, 1799, 1866, 1914, 2164, 2202, 2343, 2344, 2382, 2383, 2434, 2483, 2507, 2604, 2747, 2748, 2803, 2804, 2855, 2902, 2918, 2954, 2955, 3005 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3005, "ccnet_original_nlines": 52, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.39361703395843506, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.004559270106256008, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.17325228452682495, "rps_doc_frac_unique_words": 0.2899824380874634, "rps_doc_mean_word_length": 4.003514766693115, "rps_doc_num_sentences": 73, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.419635772705078, "rps_doc_word_count": 569, "rps_doc_frac_chars_dupe_10grams": 0.2800702452659607, "rps_doc_frac_chars_dupe_5grams": 0.39376646280288696, "rps_doc_frac_chars_dupe_6grams": 0.3586479425430298, "rps_doc_frac_chars_dupe_7grams": 0.34328359365463257, "rps_doc_frac_chars_dupe_8grams": 0.3331870138645172, "rps_doc_frac_chars_dupe_9grams": 0.3103599548339844, "rps_doc_frac_chars_top_2gram": 0.05267779156565666, "rps_doc_frac_chars_top_3gram": 0.03511853143572807, "rps_doc_frac_chars_top_4gram": 0.05531167984008789, "rps_doc_books_importance": -285.3162536621094, "rps_doc_books_importance_length_correction": -285.3162536621094, "rps_doc_openwebtext_importance": -157.43252563476562, "rps_doc_openwebtext_importance_length_correction": -157.43252563476562, "rps_doc_wikipedia_importance": -119.43462371826172, "rps_doc_wikipedia_importance_length_correction": -119.43462371826172 }, "fasttext": { "dclm": 0.3896586298942566, "english": 0.8531997203826904, "fineweb_edu_approx": 1.1058645248413086, "eai_general_math": 0.0032994700595736504, "eai_open_web_math": 0.07435231655836105, "eai_web_code": 0.005834760144352913 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.16", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "1", "label": "Factual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "1", "label": "No Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-2,985,281,922,063,204,400
1. Are you ready for the Galaxy S20? Here is everything we know so far! Infamous&unresolved Wi-Fi error Discussion in 'Android Devices' started by nitestalkr, Aug 22, 2012. 1. nitestalkr nitestalkr Android Enthusiast Thread Starter Welp, title says it all. The infamous, unresolved issue of Wi-Fi saying "error" under it in the settings. Issue occurred first on unrooted stock(when I was give the phone), so I rooted it in hope I could somehow fix it via kernel flash, rom flash, or by other means. I've practically flashed every kernel, every rom, tried several apps, and still running into this issue. I would rely souly on Wi-Fi for internet access, seeing how I do not want Big Red up my arse with a contract(sticking to my Optimus V on Virgin Mobile running JellyBean). The phone has no SIMcard, a 2GB sd-card, and is running the newly leaked BAMF ICS rom(installed in hopes of at least using bluetooth tether with my Optimus V for internet, but BT is broken on the leak). I've searched every android forums on the web, read several dead end threads, saw even more that were unanswered. Its as if this issue is purposely avoided being resolved. I at least want someone to attempt to help, or give me the definitive answer of "you're poop out of luck, and there is no solution." sent from my Zom-"Bean'(CM10 JellyBean) Optimus V.   1. Download the Forums for Android™ app! Download   2. tensazan tensazan Android Enthusiast I had a similar issue with my wifi a while ago, but it was fixed by reflashing the rom. So far I haven't found any other solution than to reflash. Sorry I couldn't be of any help.   3. nitestalkr nitestalkr Android Enthusiast Thread Starter Its fine, I posted this in AC and XDA. Hopefully I can get this fixed.   4. scotty85 scotty85 Extreme Android User if the error appeared on a completely stock phone,then i would suspect the prollem to be some sort of hardware failure. the typical cause is a mismatch of the kernel and wifi module,but on a stock phone where nothing has changed,this should not have the issue. further,if something did happen,reinstalling either factory software,or rooting and properly installing custom firmware,should have fixed ths issues as well. have you tried running any factory RUUs? if not,it would be well worth a shot. the PG05IMG for 2.11.605.19 is available here: Shipped ROMs you could try installing it in hboot,but i suspect that your issue will remain. :(   HTC Thunderbolt Forum The HTC Thunderbolt release date was March 2011. Features and Specs include a 4.3" inch screen, 8MP camera, 768GB RAM, Snapdragon S2 processor, and 1400mAh battery. March 2011 Release Date 0 Reviews Loading... Share This Page Loading...
{ "url": "https://androidforums.com/threads/infamous-unresolved-wi-fi-error.605496/", "source_domain": "androidforums.com", "snapshot_id": "crawl=CC-MAIN-2022-40", "warc_metadata": { "Content-Length": "118498", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:IWH2WSYHPZZIDNCGS4BP3CFA3H47CMJB", "WARC-Concurrent-To": "<urn:uuid:69bd8127-0bfb-4ea6-acbf-d6ad3c07e4be>", "WARC-Date": "2022-10-05T05:29:10Z", "WARC-IP-Address": "157.230.209.131", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:DRXEUUUOBML63D7O4IHGA6OGXFVU5ZDT", "WARC-Record-ID": "<urn:uuid:a732f953-0cff-4d36-acf1-2e69269c18ea>", "WARC-Target-URI": "https://androidforums.com/threads/infamous-unresolved-wi-fi-error.605496/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:71998337-3007-4a71-afac-ccd77baa5e2f>" }, "warc_info": "isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 74, 75, 107, 108, 177, 178, 194, 195, 229, 248, 249, 278, 363, 528, 637, 812, 1019, 1137, 1199, 1336, 1337, 1392, 1398, 1399, 1400, 1401, 1446, 1447, 1448, 1463, 1464, 1472, 1486, 1487, 1519, 1520, 1704, 1710, 1726, 1727, 1761, 1780, 1781, 1824, 1860, 1866, 1880, 1881, 1915, 1916, 2040, 2041, 2344, 2345, 2488, 2489, 2576, 2582, 2583, 2605, 2606, 2771, 2772, 2783, 2796, 2798, 2806, 2817, 2818, 2834, 2835 ], "line_end_idx": [ 74, 75, 107, 108, 177, 178, 194, 195, 229, 248, 249, 278, 363, 528, 637, 812, 1019, 1137, 1199, 1336, 1337, 1392, 1398, 1399, 1400, 1401, 1446, 1447, 1448, 1463, 1464, 1472, 1486, 1487, 1519, 1520, 1704, 1710, 1726, 1727, 1761, 1780, 1781, 1824, 1860, 1866, 1880, 1881, 1915, 1916, 2040, 2041, 2344, 2345, 2488, 2489, 2576, 2582, 2583, 2605, 2606, 2771, 2772, 2783, 2796, 2798, 2806, 2817, 2818, 2834, 2835, 2845 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2845, "ccnet_original_nlines": 71, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3685121238231659, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.05363322049379349, "rps_doc_frac_lines_end_with_ellipsis": 0.0277777798473835, "rps_doc_frac_no_alph_words": 0.19723182916641235, "rps_doc_frac_unique_words": 0.5761589407920837, "rps_doc_mean_word_length": 4.668874263763428, "rps_doc_num_sentences": 39, "rps_doc_symbol_to_word_ratio": 0.0034602100495249033, "rps_doc_unigram_entropy": 5.262717247009277, "rps_doc_word_count": 453, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.04728132113814354, "rps_doc_frac_chars_dupe_6grams": 0.04728132113814354, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.024113480001688004, "rps_doc_frac_chars_top_3gram": 0.025531910359859467, "rps_doc_frac_chars_top_4gram": 0.03498817980289459, "rps_doc_books_importance": -235.8388214111328, "rps_doc_books_importance_length_correction": -235.8388214111328, "rps_doc_openwebtext_importance": -144.5795135498047, "rps_doc_openwebtext_importance_length_correction": -144.5795135498047, "rps_doc_wikipedia_importance": -98.6208267211914, "rps_doc_wikipedia_importance_length_correction": -98.6208267211914 }, "fasttext": { "dclm": 0.018424689769744873, "english": 0.9425236582756042, "fineweb_edu_approx": 0.9712864756584167, "eai_general_math": 0.014464019797742367, "eai_open_web_math": 0.20304256677627563, "eai_web_code": 0.0027765599079430103 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.68", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.457", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "2", "label": "Click Here References" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "2", "label": "Partially Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-1,573,819,923,954,720,000
Skip to main content Prevalence of Helicobacter pylori genotypes: cagA, vacA (m1), vacA (s1), babA2, dupA, iceA1, oipA and their association with gastrointestinal diseases. A cross-sectional study in Quito-Ecuador Abstract Background The most prevalent stomach infection in the world is caused by Helicobacter pylori (H. pylori). Several pathogenicity genes, including cagA, vacA, babA2, dupA, iceA, and oipA, are associated with an increased risk of gastrointestinal disease such as peptic ulcer and stomach cancer. This research aims to determine the prevalence of different H. pylori genotypes and correlate their risk in the development of gastrointestinal diseases in the Ecuadorian population. Methods A cross-sectional research of 225 patients at the Calderón Hospital in Quito, Ecuador, was conducted. End point PCRs were run to determine the presence of 16S rRNA, cagA, vacA (m1), vacA (s1), babA2, dupA, iceA1, and oipA virulence genes. Chi-square test, odds ratios (OR) and 95% confidence intervals (CI) were utilized for the statistical analysis. Results H. pylori infection was present in 62.7% of people. Peptic ulcers were seen in 22.2% and malignant lesions in 3.6% of patients. Genes oipA (93.6%), vacA (s1) (70.9%), and babA2 (70.2%) were the most prevalent. cagA/vacA (s1m1) and cagA/oipA (s1m1) combinations were found in 31.2% and 22.7% of the cases, respectively. Acute inflammation has a significant correlation with the genes cagA (OR = 4.96 95% CI: 1.1–22.41), babA2 (OR = 2.78 95% CI: 1.06–7.3), and the cagA/oipA combination (OR = 4.78, 95% CI: 1.06–21.62). Follicular hyperplasia was associated with iceA1 (OR = 3.13; 95% CI: 1.2–8.16), babA2 (OR = 2.56; 95% CI: 1.14–5.77), cagA (OR = 2.19; 95% CI: 1.06–4.52), and the cagA/oipA combination (OR = 2.32, 95% CI: 1.12–4.84). The vacA (m1) and vacA (s1m1) genes were associated with gastric intestinal metaplasia (OR = 2.71 95% CI: 1.17–6.29) (OR = 2.33 95% CI: 1.03–5.24). Finally, we showed that cagA/vacA (s1m1) gene combination increased the risk of duodenal ulcer development (OR = 2.89, 95% CI 1.10–7.58). Conclusion This study makes a significant contribution by offering genotypic information regarding H. pylori infection. The presence of several H. pylori genes was associated with the onset of gastrointestinal illness in the Ecuadorian population. Peer Review reports Introduction Helicobacter pylori (H. pylori) is the microorganism responsible for the most common stomach infection worldwide. Currently, its prevalence is higher in Africa, South America, and Western Asia and is related to an increased incidence of gastric cancer [1]. In Latin America and Caribbean, H. pylori infection affects 48.36% of children and adolescents, reaching a prevalence of 69.26% in adulthood [2]. The high rate of infection in these countries is related to a high percentage of chronic complications, becoming a health problem of transcendental importance [1]. H. pylori infection and the emergence of gastric and duodenal ulcers as well as gastric adenocarcinoma are closely related. The exact mechanisms are still unknown since they are long-term processes influenced by dietary factors, the host's genetic vulnerability, environment influence and the virulence of the H. pylori strains [3]. Seven distinct strains of H. pylori can be distinguished based on their geographic origin according to the structure's high genetic variability [4, 5]. European, Australian, Asian, East Asian, North African, South African, and West African. The Colombian Andes have been revealed to have the European genotype, which was probably brought from that continent thousands of years ago [6]. The virulence of H. pylori is correlated with several pathogenicity genes (cagA, vacA, babA2, dupA, iceA, and oipA), whose proteins take part in colonization procedures, immune response evasion, and the presence of these genes has been considered to be a predictor of severe clinical consequences [7]. For instance, cytotoxin associated with gene A (CagA) can alter the cell cycle, induce apoptosis, and cause the release of interleukins that promote inflammation. The epigenetic alterations brought on by this toxin, such as histone hypermethylation, can also result in the downregulation of tumor suppressor genes [8]. It appears that the EPIYA-A, EPIYA-B, EPIYA-C, and EPIYA-D motifs in its C-terminal region are associated for virulence and carcinogenesis [9]. Gastric cells undergo several changes as a result of the vacuolating cytotoxin linked to gene A (VacA), including the formation of cytoplasmic vacuoles, permeabilization of the plasma membrane, mitochondrial fragmentation, and activation of kinase enzymes [10]. VacA presents three polymorphic areas, the signal region (s), intermediate region (i), and middle region (m). It has been shown that the vacA s1m1 genotype is the most hazardous due to its high production of toxins that result in the release of inflammatory chemicals that alter the gastric mucosa and increase the risk of gastric adenocarcinoma [11]. The H. pylori outer membrane contains the blood group antigen-binding adhesin (BabA), which is encoded by the babA2 gene. BabA can detect the highly expressed Lewis b blood group antigen (Leb) in gastric cells [12]. BabA contributes to CagA's translocation via the type IV secretion system and signal transduction (T4SS), which causes the stomach mucosa to become severely inflamed. BabA has been linked to a higher incidence of chronic gastritis, distal gastric cancer, and peptic ulcers [13]. Duodenal ulcer risk has been linked to the gene dupA due to increased mucosal inflammation, neutrophil infiltration, and increased interleukin-8 (IL-8) expression in the antrum. Additionally, it has been linked to an increased risk of atrophy, gastric cancer, and intestinal metaplasia [14]. One candidate for a marker for peptic ulcer propensity is the A gene induced by contact with the epithelium (iceA). Although they share a location in the bacterial genome, their two variations, iceA1, and iceA2, are unrelated. Increased levels of IL-8 in the stomach mucosa have been related to peptic ulcer disease caused by infection with the iceA1 strain [15]. The oipA gene encodes an inflammatory outer membrane protein with activity for bacterial adhesion to the mucosa. Independent of other virulence factors, infection with the active OipA strain has been linked to an increased risk of duodenal ulcer [16]. Gastric cancer was the seventh leading cause of death in Ecuador in 2019 and was most prevalent in people between the ages of 30 and 64 [17]. Although H. pylori infection is a public health issue, in Ecuador, there is no research supporting the pathogenic role of the H. pylori virulence genes in the development of gastrointestinal diseases. Therefore, the purpose of this research is to determine the prevalence of different H. pylori genotypes and correlate their presence with the probability of developing gastrointestinal clinical and histological changes. Materials and methods Study design A total of 225 patients who underwent gastrointestinal endoscopies at the Calderón Hospital in Quito, Ecuador, between August 2020 and February 2021 were included in this observational, cross-sectional study. Inclusion and exclusion criteria The included patients were adults over the age of 18, had not received any antibiotics or proton pump inhibitors at least one month before the endoscopic procedure, nor had they received treatment to eradicate H. pylori during the previous 12 months (see Fig. 1). Fig. 1 figure 1 Chart flow with the summary of the methodology used in this study Data collection The sociodemographic and clinical information were obtained from the patients who voluntarily accepted participate in the study. Gastric biopsies of the antrum, body, and incisura angularis were taken during the endoscopic examination for histological analysis in the pathological anatomy laboratory of the Calderón Hospital, following the modified Sydney protocol [18]. The Central University of Ecuador's "Dr. Rodrigo Fierro Benitez" Biomedicine Research Institute conducted molecular diagnostics and genotyping. The study was approved by the Ethics Committee for Research in Human Beings of the Central University of Ecuador (0121-SEISH-UCE-20) and the National Directorate of Health Intelligence of the Ministry of Public Health of Ecuador (MSP-DIS 2020–0135-O). An informed consent was obtained from the participants. Legally Authorized Representatives of illiterate participants provided informed consent for the study. In this case, the details of the study were explained verbally in the company of the legally authorized representative of the illiterate participants and the participant's fingerprint was placed on the informed consent. Genotyping Following the manufacturer's instructions, DNA was extracted from the antrum biopsy using the PureLink Genomic DNA kit (Cat. K1820-02, Invitrogen). The samples were eluted in 50 uL of buffer, and Nanodrop One was used to assessing their quality. The DNA samples were kept at -40 °C in concentrations of 30 ng/L. Using primers designed for the hypervariable zone (V4-V9) of the 16SrRNA region, polymerase chain reaction (PCR) was used to detect the presence of H. pylori. The cagA, vacA (m1), vacA (s1), babA2, iceA1, dupA, and oipA genes were subsequently tested in samples that had previously tested positive for H. pylori (see Table 1). Table 1 Primers sequences The GoTaq Green Master Mix (2X) (Cat. M7123, Promega), 0.2 to 0.5 uM of each primer, and 1 μL of DNA were combined to prepare the PCR reactions with a final volume of 25 µL per reaction. The parameters used for PCR amplification were similar to the references in Table 1. The thermocycler used for the amplification was a GeneAmp System 2700. (Applied Biosystem, USA). The PCR results were observed using electrophoresis in 1.5% TBE 1X agarose gels, which were stained with Sybr Safe and ran for 60 min at 100 V to determine the size of the bands. Statistical analysis Data are presented as total numbers and percentages, as appropriate. The chi-square test was used to analyze significant differences between the frequencies of sociodemographic variables (sex, age, education and ethnicities) and the result of H. pylori diagnostic and clinical/histopathological characteristics. Odds ratios (OR) and 95% confidence intervals (CI) were calculated to assess the association between gastric diseases and the presence of H. pylori genes (cagA, vacA (m1), vacA (s1), babA2, iceA1, dupA, oipA). Statistics were considered to be significant at p < 0.05. Software IBM, SPSS version 23 was utilized for the statistical analysis. Results Sociodemographic characteristics The study included 225 patients who met the inclusion criteria. Histological diagnostic revealed H. pylori infection in 58.7% of the cases, in contrast to PCR where 62.7% of the participants confirmed the infection. Using the PCR results, we identified significant association between age and H. pylori infection, being more frequent in those under 40 years old. Gender, ethnicity, low level (illiterate, elementary and high school) and high level (University) of education did not appear to be significant factors (see Table 2). Table 2 Sociodemographic characteristics of the patients Clinical and histological features The endoscopic examination revealed that 22.2% of the patients had peptic ulcers (gastric or duodenal), which were more common in men (p = 0.042), in adults over 50 years (p = 0.034), and people with low level of education (p = 0.019). In particular, stomach ulcers occurred in 11.6% of patients, and duodenal ulcers in 13.8% (see Table 3). Table 3 Clinical and Histopathological characteristics of the patients 74.7% of the patients had acute gastritis, and neither gender, age, education level, nor ethnicity showed any significant differences. In 97.8% of the patients, the histological diagnostic of chronic gastritis was established; the frequency was higher in the indigenous population (p < 0.001) (data not shown). A higher prevalence of lymphoid follicular hyperplasia was seen in patients under 40 (p < 0.001) and in those with a high level of education (p = 0.044), accounting for 31.6% of the cases. In 61.3% of the cases, gastric atrophy was identified; it was significantly prevalent among individuals over 50 years (p = 0.011). Intestinal metaplasia was detected in 28.9% of cases, the elderly individuals exhibiting a greater prevalence (p = 0.001). Gastric cancer was diagnosed in 3.6% of the cases, showing significant differences in Afro-American ethnicity (p = 0.013) (see Table 3). Half of the cases with stomach cancer were revealed to have malignant lesions of Borrmann type 3 and the other half to have high-grade adenomas. H. pylori genotypes and clinical characteristics Greater prevalence was seen for the genes oipA (93.6%), vacA (s1) (70.9%), and babA2 (70.2%). cagA, vacA (m1), vacA (s1m1), iceA1, dupA and the combination cagA/oipA and cagA/vacA, (s1m1) were presented in less than 50% of the patients (see Table 4). The cagA gene was more common in adults between the ages of 40 and 50 (31.9%; p = 0.033) (data not shown). Moreover, we found that the cagA/vacA (s1m1) gene combination increased the risk of duodenal ulcer development (OR = 2.89, 95% CI 1.10–7.58). On the other hand, the presence of the genes cagA (OR = 0.22, 95% CI 0.05–0.98) and babA2 (OR = 0.25, 95% CI 0.09–0.67) were linked to a lower risk of developing stomach ulcers (see Table 4). Table 4 Association of clinical and histopathological characteristics with H. pylori virulence genes H. pylori genotypes and histopathological characteristics The presence of the genes cagA (OR = 4.96, 95% CI 1.10–22.41), babA2 (OR = 2.78, 95% CI 1.06–7.30), and the combination of cagA/oipA genes (OR = 4.78, 95% CI 1.06–21.62) were found to increase the risk of developing acute gastric inflammation. In addition, we found that the genes cagA (OR = 2.19, 95% CI 1.06–4.52), iceA1 (OR = 3.13, 95% CI 1.20–8.16), babA2 (OR = 2.56, 95% CI 1.14–5.77), and the cagA/oipA combination (OR = 2.32, 95% CI 1.12–4.84) all increased the likelihood of having lymphoid follicular hyperplasia (see Table 4). Finally, the odds of developing gastric intestinal metaplasia were considerably enhanced by the presence of the genes vacA (m1) (OR = 2.71, 95% CI 1.17–6.30) and vacA (s1m1) (OR = 2.33, 95% CI 1.03–5.24), while the odds of developing gastric atrophy were significantly decreased by the presence of iceA1 (OR = 0.33, 95% CI 0.12–0.91) (see Table 4). Discussion In this study, the prevalence of H. pylori infection was 58.7% when determined by histology and 62.7% when determined by PCR. Histology allows direct visualization of the bacteria and is recommended for primary diagnosis if upper endoscopy is required. PCR test offer comparable specificity and sensitivity to the histology test [24]. Previous studies conducted in Quito, Ecuador, found low prevalence rates of 40.2% and 42.4%, respectively [25, 26]. As in other studies, no gender-related differences were discovered. Moreover, our study did not find a link between H. pylori infection and low levels of education, in contrast to other studies that found such a correlation [27]. Importantly, we described a negative correlation between age and the prevalence of H. pylori; as a result, patients under the age of 40 had a higher frequency than those over the age of 50. This finding disagrees with a systematic review done in China that found that the prevalence increases with age [28]. This observation may be explained by the high rates of gastric atrophy and metaplasia also seen in our study, since these conditions reduce the stomach's bacterial burden due to the lack of sustenance [29]. Therefore, the early onset of gastric atrophy may account for the low incidence of H. pylori infection in elderly individuals. Several studies have shown a link between H. pylori infection and either acute or chronic gastritis [30]. In the current investigation, we were able to confirm that patients who had both acute and chronic inflammation were significantly more likely to have H. pylori. (74.7% and 97.8%, respectively). Additionally, we identified that individuals over 50 years of age had higher rates of peptic ulcer, atrophy, and stomach metaplasia. This finding was consistent with earlier research done in Peru and China [31, 32]. It has been noted that intestinal metaplasia and a reduction in gastric secretion are related to the absence of H. pylori infection [33]. We confirmed that H. pylori infection had a protective effect against the development of gastric intestine metaplasia (OR 0.41; 95% CI: 0.23–0.75). It is significant to note that MALT (mucosa-associated lymphoid tissue) lymphoma can develop as a result of the host's inflammatory immunological response to H. pylori infection. We found that lymphoid follicular hyperplasia was prevalent in this study at a frequency of 31.6%, which is consistent with other researchers' findings [34]. There is great geographic heterogeneity in the prevalence of H. pylori genotypes, which is linked to clinical manifestations that can be severe in some areas but less harmful or even non-aggressive in others [7]. A pathogenic strain's presence alone is insufficient to start a pathological process. For instance, several African cultures with a 100% prevalence of H. pylori infection and highly virulent strain (hspsafrica, hspwafrica, hpafrica2, hpneafrica) had low rates of stomach cancer. A condition referred to as " The African paradox" [35]. Due to their high virulence, the cagA and vacA genes are among the most studied. In our study, the cagA genotype, which is a marker of the existence and activity of the pathogenicity island (cagPAI), was uncommon (31.9%). The frequency of this gene varies greatly across the world between 60%—80% [36, 37]. We found a significant correlation between the cagA genotype and the emergence of acute gastric inflammation in this cohort (OR 4.96; 95% CI: 1.10—22.41). We also present evidence-linking cagA to stomach lymphoid follicular hyperplasia, which has the potential to develop into MALT lymphoma over time (OR 2.19; 95% CI: 1.06—4.52). Furthermore, numerous studies have shown a link between cagA and acid peptic disease, chronic atrophic gastritis, and stomach cancer [38, 39]. However, we did not find evidence of this relationship; we even found a protective effect of the presence of cagA gene and the development of gastric ulcer (OR 0.21; 95% CI: 0.04–0.98). This data might be related to the low prevalence found or the local strains' lower virulence. It is intriguing to learn that some H. pylori genes are apparently naturally disappearing from western populations, especially Cag-A positive strains, which are selectively eliminated because of their link to peptic ulcers [40]. In our research, the presence of the H. pylori vacA s1m1 genotype was 41.8%, which is quite comparable to the 42% reported by Shetty et al. in India [37]. Geographically, the m1 genotype is more common among the population of Africa and the m2 genotypes are equally distributed in Latin America and Europe [41]. The s1m1 genotype is crucial because of the large levels of toxin that this genotype secrets, which have been associated with serious lesions in the stomach. In this study, the development of gastric-intestinal metaplasia was linked to the vacA m1 and vacA s1m1 genotypes (OR 2.71, 95% CI: 1.17—6.30) (OR 2.33, 95% CI: 1.03—5.24). These findings are in line with research done in populations from Brazil and the Middle East, which links vacA s1 or m1 to the development of stomach cancer [38, 42].  iceA1 genotype has been linked to the onset of peptic ulcers due to the gene's ability to cause excessive production of the pro-inflammatory cytokine IL-8 [43]. When compared to studies from other nations, where its frequency is 53.3%, our study's prevalence of iceA1 (14.9%) is considerably low [36]. In the Brazilian population this gene was linked to the development of gastritis but not peptic ulcers [44]. In China and Egypt however, it was associated with peptic ulcers [15, 45]. In this research, we found that the iceA1 gene was associated with lymphoid follicular hyperplasia (OR 3.13; 95% CI: 1.20—8.16) rather than gastritis or peptic ulcer development. The prevalence of the dupA gene was 48.9% in this study, which is comparable to the prevalence estimates in Belgium (43.7%) and South Africa (53.4%) [46]. Despite the dupA gene being suggested as a marker for peptic ulcers, our research, like that of other authors, was unable to validate this association [47]. Our study found a prevalence of babA2 of 70.2%, comparable to that of an Iranian study [48], but lower than that of Thailand (92%) [49]. In Western nations, but not in Asian nations, babA gene is linked to an increased risk of acid peptic illness [50]. Intriguingly, babA2 in our study showed a protective effect against the occurrence of gastric ulcers (OR 0.24; 95% CI: 0, 09–0, 67), but on the other hand, it was associated with the occurrence of acute inflammation (OR 2.78; 95% CI: 1.06—7.30) and lymphoid follicular hyperplasia (OR 2.56, 95% CI: 1.14—5.77). This discovery supports the observation made by Chen et al. [50]. Finally, our study revealed a high prevalence of the oipA gene (93.6%), similar to studies carried out in Venezuela (93.8%) and China (88.1%—100%) [23, 51]. The oipA genotype is significantly associated with an increased risk of acid peptic disease (OR = 3.97) and gastric cancer (OR = 2.43) [52, 53]. However, unlike several studies conducted internationally, we did not show this association. The results of global genomic investigations are inconsistent and controversial. This study is another example of the genetic diversity of H. pylori observed by the different prevalences discovered. Which may be a reflection of demographic diversity, H. pylori strain-specific virulence factors, host genotype, and environmental factors such as diet [3]. Limitations Due to the fact that the current study was conducted in a single medical facility, we cannot rule out the possibility of selection bias. To acquire data that may be extrapolated to the Ecuadorian population, it is also important to conduct studies with a larger population. Technically speaking, the possibility of false negative findings should be a key factor to take into account. Factors including inaccurate biopsy taking, low bacterial DNA concentrations, and PCR failures might result in erroneous results. In this investigation, all procedures were carried out in accordance with defined handling and transport guidelines. The isolated DNA's quality and concentration were confirmed. Both positive and negative controls were used in the 16S rRNA-PCR (samples with and without H. pylori, as determined by histology and later confirmed by PCR). And, for genotyping, a specific band for each gene and non-amplification of the NTC (Non-template control) were the parameters used to validate the results. Additionally, in line with the argument of the validation of our results, the frequencies we discovered are comparable to those reported by other study groups. However, H. pylori's genetic diversity must be taken into consideration. Conclusion This study presents the genotypic prevalence of H. pylori existing in Ecuadorian patients. The histological presence of acute gastric inflammation and follicular hyperplasia are associated to the genes cagA, babA2, iceA1 and cagA/oipA. The presence of vacA (m1) and vacA (s1m1) increased the risk of intestinal metaplasia. Finally, cagA/vacA (s1m1) is related with duodenal ulcer. Our findings suggest that the clinical course of the disease is influenced by the host's immune response, the presence of H. pylori virulence genes, and environmental variables. Availability of data and materials All data generated or analyzed during this study are included in this published article. Abbreviations H. pylori : Helicobacter pylori CagA: Cytotoxin associated with gene A VacA: Vacuolating cytotoxin linked to gene A BabA: Blood group antigen-binding adhesin iceA : A gene induced by contact with the epithelium PCR: Polymerase chain reaction OR: Odds ratios CI: Confidence intervals MALT: Mucosa-associated lymphoid tissue cagPAI: Cag pathogenicity island References 1. Hooi JKY, et al. Global prevalence of Helicobacter pylori infection: systematic review and meta-analysis. Gastroenterology. 2017;153(2):420–9. https://doi.org/10.1053/j.gastro.2017.04.022. Article  PubMed  Google Scholar  2. Curado MP, de Oliveira MM, de Araújo Fagundes M. Prevalence of Helicobacter pylori infection in Latin America and the Caribbean populations: a systematic review and meta-analysis. Cancer Epidemiol. 2019;60:141–8. Article  PubMed  Google Scholar  3. Amieva M, Peek RM. Pathobiology of Helicobacter pylori-induced gastric cancer. Gastroenterology. 2016;150(1):64–78. https://doi.org/10.1053/J.GASTRO.2015.09.004. Article  CAS  PubMed  Google Scholar  4. Abadi AT, Ierardi E, Lee YY. Why do we still have Helicobacter Pylori in our Stomachs. Malays J Med Sci. 2015;22(5):70–5. PubMed  PubMed Central  Google Scholar  5. Hussain SA, Hamid S. Helicobacter pylori in humans: where are we now? Adv Biomed Res. 2014;3(1):63. https://doi.org/10.4103/2277-9175.125844. Article  PubMed  PubMed Central  Google Scholar  6. Falush D, et al. Traces of human migrations in Helicobacter pylori populations. Science  (80- ). 2003;299(5612):1582–5. https://doi.org/10.1126/science.1080857. Article  CAS  Google Scholar  7. Sharndama HC, Mba IE. Helicobacter pylori: an up-to-date overview on the virulence and pathogenesis mechanisms. Braz J Microbiol. 2022;53(1):33–50. https://doi.org/10.1007/S42770-021-00675-0. Article  CAS  PubMed  PubMed Central  Google Scholar  8. Hayashi Y, et al. CagA mediates epigenetic regulation to attenuate let-7 expression in Helicobacter pylori-related carcinogenesis. Gut. 2013;62(11):1536–46. https://doi.org/10.1136/gutjnl-2011-301625. Article  CAS  PubMed  Google Scholar  9. Takahashi-Kanemitsu A, Knight CT, Hatakeyama M. Molecular anatomy and pathogenic actions of Helicobacter pylori CagA that underpin gastric carcinogenesis. Cell Mol Immunol. 2020;17(1):50–63. https://doi.org/10.1038/S41423-019-0339-5. Article  CAS  PubMed  Google Scholar  10. Kim IJ, Blanke SR. Remodeling the host environment: modulation of the gastric epithelium by the Helicobacter pylori vacuolating toxin (VacA). Front Cell Infect Microbiol. 2012;2:37. https://doi.org/10.3389/FCIMB.2012.00037. Article  PubMed  PubMed Central  Google Scholar  11. Ricci. “Relationship between VacA toxin and host cell autophagy in Helicobacter pylori infection of the human stomach: a few answers, many questions,.” Toxins (Basel). 2016;8(7):203. Article  PubMed  Google Scholar  12. Roy R, Jonniya NA, Sk MF, Kar P. Comparative structural dynamics of isoforms of Helicobacter pylori adhesin baba bound to lewis b hexasaccharide via multiple replica molecular dynamics simulations. Front Mol Biosci. 2022;9:852895. Article  CAS  PubMed  PubMed Central  Google Scholar  13. Ansari S, Yamaoka Y. Helicobacter pylori BabA in adaptation for gastric colonization. World J Gastroenterol. 2017;23(23):4158–69. https://doi.org/10.3748/wjg.v23.i23.4158. Article  CAS  PubMed  PubMed Central  Google Scholar  14. Abadi ATB, Perez-Perez G. Role of dupA in virulence of Helicobacter pylori. World J Gastroenterol. 2016;22(46):10118–23. https://doi.org/10.3748/wjg.v22.i46.10118. Article  CAS  Google Scholar  15. Abu-Taleb AMF, et al. Prevalence of Helicobacter pylori cagA and iceA genes and their association with gastrointestinal diseases. Int J Microbiol. 2018;2018:4809093. https://doi.org/10.1155/2018/4809093. Article  CAS  PubMed  PubMed Central  Google Scholar  16. Matsuo Y, Kido Y, Yamaoka Y. Helicobacter pylori outer membrane protein-related pathogenesis. Toxins (Basel). 2017;9(3):101. https://doi.org/10.3390/TOXINS9030101. Article  PubMed  Google Scholar  17. Carrera S, Llumiquinga R. Registro Estadístico de Defunciones Generales INEC JUNIO 2020. Instituto Nacional de Estadística y Censos. 2020. https://www.ecuadorencifras.gob.ec. Accessed 14 June 2022. 18. Dixon MF, et al. Classification and grading of gastritis. the updated Sydney system. international workshop on the histopathology of gastritis, Houston 1994. Am J Surg Pathol. 1996;20(10):1161–81. https://doi.org/10.1097/00000478-199610000-00001. Article  CAS  PubMed  Google Scholar  19. Valenzuela S. Estudio epidemiológico en la población ecuatoriana de los factores de riesgo asociados a la infección con Helicobacter pylori. Repositorio Digital USFQ. 2016. https://repositorio.usfq.edu.ec/handle/23000/5905. Accessed 20 May 2020. 20. Chattopadhyay S, et al. Multiplex PCR assay for rapid detection and genotyping of Helicobacter pylori directly from biopsy specimens. J Clin Microbiol. 2004;42(6):2821–4. https://doi.org/10.1128/JCM.42.6.2821-2824.2004. Article  CAS  PubMed  PubMed Central  Google Scholar  21. Atherton JC, Cao P, Peek RM, Tummuru MKR, Blaser MJ, Cover TL. Mosaicism in vacuolating cytotoxin alleles of helicobacter pylori. association of specific vacA types with cytotoxin production and peptic ulceration. J Biol Chem. 1995;270(30):17771–7. https://doi.org/10.1074/jbc.270.30.17771. Article  CAS  PubMed  Google Scholar  22. Delgado F. Comparación de genes de virulencia entre Helicobacter pylori y otras especies de Helicobacter en pacientes Ecuatorianos. Repositorio Digital USFQ. 2018. https://repositorio.usfq.edu.ec/handle/23000/7987. Accessed 20 May 2020. 23. Torres K, Valderrama E, Sayegh M, Ramírez JL, Chiurillo MA. Study of the oipA genetic diversity and EPIYA motif patterns in cagA-positive Helicobacter pylori strains from Venezuelan patients with chronic gastritis. Microb Pathog. 2014;76:26–32. https://doi.org/10.1016/j.micpath.2014.09.006. Article  CAS  PubMed  Google Scholar  24. Bordin DS, Voynovan IN, Andreev DN, Maev IV. Current Helicobacter pylori diagnostics. Diagnostics. 2021;11(8):1458. https://doi.org/10.3390/DIAGNOSTICS11081458. Article  CAS  PubMed  PubMed Central  Google Scholar  25. Reyes Chacón J. A., et al. “Susceptibilidad antibiótica de Helicobacter pylori: un estudio de prevalencia en pacientes con dispepsia en Quito-Ecuador,.” Rev Colomb Gastroenterol. 2017;32(4):305. Article  Google Scholar  26. Vázquez P. Prevalencia por infección por Helicobacter pylori y asociación con patalogías gástricas en pacientes adultos de chequeo ejecutivo desde enero del 2010 hasta septiembre del 2012 del Hospital Metropolitano de Quito-Ecuador. 2013. https://repositorio.usfq.edu.ec/handle/23000/1503. Accessed 22 Oct 2022. 27. Bastos J, et al. Sociodemographic determinants of prevalence and incidence of Helicobacter pylori infection in Portuguese adults. Helicobacter. 2013;18(6):413–22. https://doi.org/10.1111/HEL.12061. Article  PubMed  Google Scholar  28. Ren S, et al. Prevalence of Helicobacter pylori infection in China: a systematic review and meta-analysis. J Gastroenterol Hepatol. 2022;37(3):464–70. https://doi.org/10.1111/JGH.15751. Article  PubMed  Google Scholar  29. Konturek PC, Kania J, Konturek JW, Nikiforuk A, Konturek SJ, Hahn EGH. pylori infection, atrophic gastritis, cytokines, gastrin, COX-2, PPAR gamma and impaired apoptosis in gastric carcinogenesis. Med Sci Monit. 2003;9(7):SR53–66. Google Scholar  30. Azer S, Akhondi H. Gastritis. StatPearls. 2022. https://www.ncbi.nlm.nih.gov/books/NBK544250/. Accessed 17 June 2022. 31. Montes P, Salazar S, Monge E. Cambios en la Epidemiologia de la Úlcera Péptica y su Relación con la Infección con Helicobacter Pylori. Hospital Daniel Carrion 2000–2005. 2007;27(4):382–388. 32. Lin S, et al. Association of dietary patterns and endoscopic gastric mucosal atrophy in an adult Chinese population. Sci Rep. 2019;9(1):16567. https://doi.org/10.1038/S41598-019-52951-7. Article  PubMed  PubMed Central  Google Scholar  33. Craanen ME, Blok P, Dekker W, Ferwerda J, Tytgat GNJ. Subtypes of intestinal metaplasia and Helicobacter pylori. Gut. 1992;33(5):597–600. https://doi.org/10.1136/GUT.33.5.597. Article  CAS  PubMed  PubMed Central  Google Scholar  34. Bashiri H, Esmaeilzadeh A, Vossoughinia H, Ghaffarzadegan K, Raziei HR, Bozorgomid A. Association between gastric lymphoid follicles (Precursor of malt lymphomas) and h. pylori infection at a referral hospital in Iran. Clin Exp Gastroenterol. 2019;12:409–13. https://doi.org/10.2147/CEG.S224823. Article  PubMed  PubMed Central  Google Scholar  35. Holcombe C. Helicobacter pylori: the African enigma. Gut. 1992;33(4):429–31. https://doi.org/10.1136/GUT.33.4.429. Article  CAS  PubMed  PubMed Central  Google Scholar  36. Feliciano O, et al. Prevalence of Helicobacter pylori vacA, cagA, and iceA Genotypes in Cuban patients with upper gastrointestinal diseases. Biomed Res Int. 2015;2015:753710. Article  PubMed  PubMed Central  Google Scholar  37. Shetty V, Lingadakai R, Pai GC, Ballal M. Profile of Helicobacter pylori cagA & vacA genotypes and its association with the spectrum of gastroduodenal disease. Indian J Med Microbiol. 2021;39(4):495–9. https://doi.org/10.1016/j.ijmmb.2021.06.001. Article  CAS  PubMed  Google Scholar  38. Matos JI, De Sousa HAC, Marcos-Pinto R, Dinis-Ribeiro M. Helicobacter pylori CagA and VacA genotypes and gastric phenotype: a meta-analysis. Eur J Gastroenterol Hepatol. 2013;25(12):1431–41. https://doi.org/10.1097/MEG.0b013e328364b53e. Article  CAS  PubMed  Google Scholar  39. Park JY, Forman D, Waskito LA, Yamaoka Y, Crabtree JE. Epidemiology of Helicobacter pylori and CagA-positive infections and global variations in gastric cancer. Toxins (Basel). 2018;10(4):163. https://doi.org/10.3390/TOXINS10040163. Article  CAS  PubMed  Google Scholar  40. Konráðsson A, Andersen L, Oddsson E, Guðjónsson H, Thornjóðleifsson B. Prevalence of Helicobacter pylori and Cag-A strains in patients with duodenal ulcer in Iceland. Laeknabladid. 2003;89(7–8):595–7. PubMed  Google Scholar  41. Ghose C, Perez-Perez GI, Van Doorn LJ, Domínguez-Bello MG, Blaser MJ. High frequency of gastric colonization with multiple Helicobacter pylori strains in Venezuelan subjects. J Clin Microbiol. 2005;43(6):2635–41. https://doi.org/10.1128/JCM.43.6.2635-2641.2005. Article  CAS  PubMed  PubMed Central  Google Scholar  42. Pereira WN, et al. Association among H. pylori virulence markers dupA, cagA and vacAin Brazilian patients. J Venom Anim Toxins Incl Trop Dis. 2014;20(1):1. https://doi.org/10.1186/1678-9199-20-1/TABLES/2. Article  CAS  PubMed  PubMed Central  Google Scholar  43. Xu Q, Blaser MJ. Promoters of the CATG-specific methyltransferase gene hpyIM differ between iceA1 and iceA2 Helicobacter pylori strains. J Bacteriol. 2001;183(13):3875–84. https://doi.org/10.1128/JB.183.13.3875-3884.2001. Article  CAS  PubMed  PubMed Central  Google Scholar  44. Gatti LL, et al. Prevalence of Helicobacter pylori cagA, iceA and babA2 alleles in Brazilian patients with upper gastrointestinal diseases. Acta Trop. 2006;100(3):232–40. https://doi.org/10.1016/J.ACTATROPICA.2006.08.014. Article  CAS  PubMed  Google Scholar  45. Huang X, Deng Z, Zhang Q, Li W, Wang B, Li M. Relationship between the iceA gene of Helicobacter pylori and clinical outcomes. Ther Clin Risk Manag. 2016;12:1085–92. https://doi.org/10.2147/TCRM.S107991. Article  PubMed  PubMed Central  Google Scholar  46. Idowu A, et al. Detection of Helicobacter pylori and its virulence genes (cagA, dupA, and vacA) among patients with gastroduodenal diseases in Chris Hani Baragwanath Academic Hospital, South Africa. BMC Gastroenterol. 2019;19(1):73. https://doi.org/10.1186/S12876-019-0986-0. Article  PubMed  PubMed Central  Google Scholar  47. Argent R. H., Burette A, Miendje Deyi V. Y., Atherton J. C. “The presence of dupA in Helicobacter pylori is not significantly associated with duodenal ulceration in Belgium, South Africa, China, or North America,.” Clin Infect Dis. 2007;45(9):1204–6. Article  CAS  PubMed  Google Scholar  48. Dabiri H, et al. Prevalence of Helicobacter pylori vacA, cagA, cagE, oipA, iceA, babA2 and babB genotypes in Iranian dyspeptic patients. Microb Pathog. 2017;105:226–30. https://doi.org/10.1016/J.MICPATH.2017.02.018. Article  CAS  PubMed  Google Scholar  49. Chomvarin C, et al. Prevalence of Helicobacter pylori vacA, cagA, cagE, iceA and babA2 genotypes in Thai dyspeptic patients. Int J Infect Dis. 2008;12(1):30–6. https://doi.org/10.1016/J.IJID.2007.03.012. Article  CAS  PubMed  Google Scholar  50. Chen MY, He CY, Meng X, Yuan Y. Association of Helicobacter pylori babA2 with peptic ulcer disease and gastric cancer. World J Gastroenterol. 2013;19(26):4242–51. https://doi.org/10.3748/wjg.v19.i26.4242. Article  CAS  PubMed  PubMed Central  Google Scholar  51. Zhao Q, et al. Prevalence of Helicobacter pylori babA, oipA, sabA, and homB genes in isolates from Chinese patients with different gastroduodenal diseases. Med Microbiol Immunol. 2020;209(5):565–77. https://doi.org/10.1007/S00430-020-00666-2. Article  CAS  PubMed  Google Scholar  52. Yamaoka Y, Kikuchi S, ElZimaity HMT, Gutierrez O, Osato MS, Graham DY. Importance of Helicobacter pylori oipA in clinical presentation, gastric inflammation, and mucosal interleukin 8 production. Gastroenterology. 2002;123(2):414–24. https://doi.org/10.1053/GAST.2002.34781. Article  CAS  PubMed  Google Scholar  53. Liu J, He C, Chen M, Wang Z, Xing C, Yuan Y. Association of presence/absence and on/off patterns of Helicobacter pylori oipA gene with peptic ulcer disease and gastric cancer risks: a meta-analysis. BMC Infect Dis. 2013;13:555. https://doi.org/10.1186/1471-2334-13-555. Article  CAS  PubMed  PubMed Central  Google Scholar  Download references Acknowledgements To the Central University of Ecuador for its financial support. To Dr. Manuel Baldeón for his expertise and advice. Funding This work was supported by Central University of Ecuador. Author information Authors and Affiliations Authors Contributions SBF: Conceptualization. Formal analysis. Writing-Original Draft. Writing-Reviewing and Editing. MSP: Investigation. Formal analysis. Writing-Original Draft. Writing-Reviewing and Editing. YVA: Investigation. Project administration. Formal analysis. Writing-Original Draft. RBO: Conceptualization. Writing-Reviewing and Editing. LBR: Supervision. Writing-Original Draft. Writing-Reviewing and Editing. All authors read and approved the final manuscript. Corresponding author Correspondence to Marco Salinas-Pinta. Ethics declarations Ethics approval and consent to participate This study was performed in line with the principles of the Declaration of Helsinki. Approval was granted by the Ethics Committee for Research in Human Beings of the Central University of Ecuador (February 2020; 0121-SEISH-UCE-20) and the National Directorate of Health Intelligence of the Ministry of Public Health of Ecuador (March 2020; MSP-DIS 2020–0135-O). An informed consent was obtained from the participants. Legally Authorized Representatives of illiterate participants provided informed consent for the study. In this case, the details of the study were explained verbally in the company of the legally authorized representative of the illiterate participants and the participant's fingerprint was placed on the informed consent. Consent for publication Not applicable. Competing interests The authors declare that they have no competing interests. Additional information Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Rights and permissions Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data. Reprints and permissions About this article Check for updates. Verify currency and authenticity via CrossMark Cite this article Bustos-Fraga, S., Salinas-Pinta, M., Vicuña-Almeida, Y. et al. Prevalence of Helicobacter pylori genotypes: cagA, vacA (m1), vacA (s1), babA2, dupA, iceA1, oipA and their association with gastrointestinal diseases. A cross-sectional study in Quito-Ecuador. BMC Gastroenterol 23, 197 (2023). https://doi.org/10.1186/s12876-023-02838-9 Download citation • Received: • Accepted: • Published: • DOI: https://doi.org/10.1186/s12876-023-02838-9 Keywords
{ "url": "https://bmcgastroenterol.biomedcentral.com/articles/10.1186/s12876-023-02838-9", "source_domain": "bmcgastroenterol.biomedcentral.com", "snapshot_id": "CC-MAIN-2024-10", "warc_metadata": { "Content-Length": "434094", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:3VZ64JYSKCQI2QFHSONSJD6I7HKEUQ3S", "WARC-Concurrent-To": "<urn:uuid:420faf59-4edd-4e1f-a1bd-beb491193734>", "WARC-Date": "2024-03-04T00:45:08Z", "WARC-IP-Address": "146.75.36.95", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:G223P2ISYA33EP57HM674VAFACEAME47", "WARC-Record-ID": "<urn:uuid:562fb0e6-ad1c-49cc-86f1-d94f72336502>", "WARC-Target-URI": "https://bmcgastroenterol.biomedcentral.com/articles/10.1186/s12876-023-02838-9", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:db8b1ead-9cf4-4c02-b3aa-17db6067418e>" }, "warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-144\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 21, 22, 215, 216, 225, 226, 237, 238, 704, 705, 713, 714, 1065, 1066, 1074, 1075, 2096, 2097, 2108, 2109, 2346, 2347, 2367, 2368, 2381, 2382, 2949, 2950, 3669, 3670, 4435, 4436, 5050, 5051, 5546, 5547, 5839, 5840, 6204, 6205, 6457, 6458, 7021, 7022, 7044, 7045, 7058, 7059, 7268, 7269, 7302, 7303, 7567, 7568, 7575, 7584, 7585, 7651, 7652, 7668, 7669, 8815, 8816, 8827, 8828, 9467, 9468, 9494, 9495, 10043, 10044, 10065, 10066, 10719, 10720, 10728, 10729, 10762, 10763, 11293, 11294, 11351, 11352, 11387, 11388, 11729, 11730, 11801, 11802, 12838, 12839, 12888, 12889, 13581, 13582, 13683, 13684, 13742, 13743, 14280, 14281, 14630, 14631, 14642, 14643, 15966, 15967, 16770, 16771, 17108, 17109, 17657, 17658, 18948, 18949, 19760, 19761, 20426, 20427, 20739, 20740, 21370, 21371, 21766, 21767, 22122, 22123, 22135, 22136, 22410, 22411, 23145, 23146, 23379, 23380, 23391, 23392, 23951, 23952, 23987, 23988, 24077, 24078, 24092, 24093, 24105, 24106, 24126, 24127, 24133, 24134, 24167, 24168, 24174, 24175, 24214, 24215, 24221, 24222, 24258, 24259, 24266, 24267, 24313, 24314, 24319, 24320, 24346, 24347, 24351, 24352, 24364, 24365, 24369, 24370, 24391, 24392, 24398, 24399, 24433, 24434, 24442, 24443, 24468, 24469, 24480, 24481, 24675, 24676, 24713, 24714, 24932, 24933, 24970, 24971, 25138, 25139, 25181, 25182, 25309, 25310, 25354, 25355, 25502, 25503, 25556, 25557, 25723, 25724, 25758, 25759, 25956, 25957, 26015, 26016, 26222, 26223, 26265, 26266, 26505, 26506, 26548, 26549, 26779, 26780, 26833, 26834, 27023, 27024, 27061, 27062, 27299, 27300, 27358, 27359, 27537, 27538, 27596, 27597, 27767, 27768, 27802, 27803, 28013, 28014, 28072, 28073, 28243, 28244, 28281, 28282, 28486, 28487, 28740, 28741, 28783, 28784, 29036, 29037, 29263, 29264, 29322, 29323, 29620, 29621, 29663, 29664, 29907, 29908, 30206, 30207, 30249, 30250, 30417, 30418, 30476, 30477, 30678, 30679, 30708, 30709, 31027, 31028, 31232, 31233, 31270, 31271, 31463, 31464, 31501, 31502, 31739, 31740, 31760, 31761, 31885, 31886, 32082, 32083, 32276, 32277, 32330, 32331, 32513, 32514, 32572, 32573, 32875, 32876, 32929, 32930, 33051, 33052, 33110, 33111, 33292, 33293, 33346, 33347, 33600, 33601, 33643, 33644, 33887, 33888, 33930, 33931, 34170, 34171, 34213, 34214, 34421, 34422, 34450, 34451, 34719, 34720, 34778, 34779, 34990, 34991, 35049, 35050, 35278, 35279, 35337, 35338, 35566, 35567, 35609, 35610, 35820, 35821, 35874, 35875, 36157, 36158, 36211, 36212, 36469, 36470, 36512, 36513, 36735, 36736, 36778, 36779, 36989, 36990, 37032, 37033, 37244, 37245, 37303, 37304, 37553, 37554, 37596, 37597, 37878, 37879, 37921, 37922, 38198, 38199, 38257, 38258, 38278, 38279, 38296, 38297, 38413, 38414, 38422, 38423, 38481, 38482, 38501, 38502, 38527, 38528, 38536, 38537, 38551, 38552, 39005, 39006, 39027, 39028, 39067, 39068, 39088, 39089, 39132, 39133, 39874, 39875, 39899, 39900, 39916, 39917, 39937, 39938, 39997, 39998, 40021, 40022, 40039, 40040, 40159, 40160, 40183, 40184, 41246, 41247, 41272, 41273, 41292, 41293, 41359, 41360, 41378, 41379, 41713, 41714, 41732, 41733, 41747, 41748, 41762, 41763, 41778, 41779, 41831, 41832 ], "line_end_idx": [ 21, 22, 215, 216, 225, 226, 237, 238, 704, 705, 713, 714, 1065, 1066, 1074, 1075, 2096, 2097, 2108, 2109, 2346, 2347, 2367, 2368, 2381, 2382, 2949, 2950, 3669, 3670, 4435, 4436, 5050, 5051, 5546, 5547, 5839, 5840, 6204, 6205, 6457, 6458, 7021, 7022, 7044, 7045, 7058, 7059, 7268, 7269, 7302, 7303, 7567, 7568, 7575, 7584, 7585, 7651, 7652, 7668, 7669, 8815, 8816, 8827, 8828, 9467, 9468, 9494, 9495, 10043, 10044, 10065, 10066, 10719, 10720, 10728, 10729, 10762, 10763, 11293, 11294, 11351, 11352, 11387, 11388, 11729, 11730, 11801, 11802, 12838, 12839, 12888, 12889, 13581, 13582, 13683, 13684, 13742, 13743, 14280, 14281, 14630, 14631, 14642, 14643, 15966, 15967, 16770, 16771, 17108, 17109, 17657, 17658, 18948, 18949, 19760, 19761, 20426, 20427, 20739, 20740, 21370, 21371, 21766, 21767, 22122, 22123, 22135, 22136, 22410, 22411, 23145, 23146, 23379, 23380, 23391, 23392, 23951, 23952, 23987, 23988, 24077, 24078, 24092, 24093, 24105, 24106, 24126, 24127, 24133, 24134, 24167, 24168, 24174, 24175, 24214, 24215, 24221, 24222, 24258, 24259, 24266, 24267, 24313, 24314, 24319, 24320, 24346, 24347, 24351, 24352, 24364, 24365, 24369, 24370, 24391, 24392, 24398, 24399, 24433, 24434, 24442, 24443, 24468, 24469, 24480, 24481, 24675, 24676, 24713, 24714, 24932, 24933, 24970, 24971, 25138, 25139, 25181, 25182, 25309, 25310, 25354, 25355, 25502, 25503, 25556, 25557, 25723, 25724, 25758, 25759, 25956, 25957, 26015, 26016, 26222, 26223, 26265, 26266, 26505, 26506, 26548, 26549, 26779, 26780, 26833, 26834, 27023, 27024, 27061, 27062, 27299, 27300, 27358, 27359, 27537, 27538, 27596, 27597, 27767, 27768, 27802, 27803, 28013, 28014, 28072, 28073, 28243, 28244, 28281, 28282, 28486, 28487, 28740, 28741, 28783, 28784, 29036, 29037, 29263, 29264, 29322, 29323, 29620, 29621, 29663, 29664, 29907, 29908, 30206, 30207, 30249, 30250, 30417, 30418, 30476, 30477, 30678, 30679, 30708, 30709, 31027, 31028, 31232, 31233, 31270, 31271, 31463, 31464, 31501, 31502, 31739, 31740, 31760, 31761, 31885, 31886, 32082, 32083, 32276, 32277, 32330, 32331, 32513, 32514, 32572, 32573, 32875, 32876, 32929, 32930, 33051, 33052, 33110, 33111, 33292, 33293, 33346, 33347, 33600, 33601, 33643, 33644, 33887, 33888, 33930, 33931, 34170, 34171, 34213, 34214, 34421, 34422, 34450, 34451, 34719, 34720, 34778, 34779, 34990, 34991, 35049, 35050, 35278, 35279, 35337, 35338, 35566, 35567, 35609, 35610, 35820, 35821, 35874, 35875, 36157, 36158, 36211, 36212, 36469, 36470, 36512, 36513, 36735, 36736, 36778, 36779, 36989, 36990, 37032, 37033, 37244, 37245, 37303, 37304, 37553, 37554, 37596, 37597, 37878, 37879, 37921, 37922, 38198, 38199, 38257, 38258, 38278, 38279, 38296, 38297, 38413, 38414, 38422, 38423, 38481, 38482, 38501, 38502, 38527, 38528, 38536, 38537, 38551, 38552, 39005, 39006, 39027, 39028, 39067, 39068, 39088, 39089, 39132, 39133, 39874, 39875, 39899, 39900, 39916, 39917, 39937, 39938, 39997, 39998, 40021, 40022, 40039, 40040, 40159, 40160, 40183, 40184, 41246, 41247, 41272, 41273, 41292, 41293, 41359, 41360, 41378, 41379, 41713, 41714, 41732, 41733, 41747, 41748, 41762, 41763, 41778, 41779, 41831, 41832, 41840 ] }
{ "red_pajama_v2": { "ccnet_original_length": 41840, "ccnet_original_nlines": 455, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.1991051435470581, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.04910514876246452, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3610738217830658, "rps_doc_frac_unique_words": 0.28996917605400085, "rps_doc_mean_word_length": 5.611948013305664, "rps_doc_num_sentences": 909, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 6.246959686279297, "rps_doc_word_count": 5842, "rps_doc_frac_chars_dupe_10grams": 0.049656860530376434, "rps_doc_frac_chars_dupe_5grams": 0.17626963555812836, "rps_doc_frac_chars_dupe_6grams": 0.13362817466259003, "rps_doc_frac_chars_dupe_7grams": 0.103644959628582, "rps_doc_frac_chars_dupe_8grams": 0.06777489930391312, "rps_doc_frac_chars_dupe_9grams": 0.05947842076420784, "rps_doc_frac_chars_top_2gram": 0.00823547039180994, "rps_doc_frac_chars_top_3gram": 0.0136647904291749, "rps_doc_frac_chars_top_4gram": 0.01601341925561428, "rps_doc_books_importance": -4074.9541015625, "rps_doc_books_importance_length_correction": -4074.9541015625, "rps_doc_openwebtext_importance": -1818.1470947265625, "rps_doc_openwebtext_importance_length_correction": -1818.1470947265625, "rps_doc_wikipedia_importance": -1561.135009765625, "rps_doc_wikipedia_importance_length_correction": -1561.135009765625 }, "fasttext": { "dclm": 0.023084279149770737, "english": 0.8269163370132446, "fineweb_edu_approx": 2.75677490234375, "eai_general_math": 0.11612694710493088, "eai_open_web_math": 0.4273325204849243, "eai_web_code": 0.004515829961746931 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.994", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.9", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-3,435,612,188,278,509,000
The acetyltransferase HAT1 moderates the NF-?B response by regulating the transcription factor PLZF Anthony John Sadler, Bandar Ali Suliman, Liang Yu, Xiang-Liang Yuan, Die Wang, Aaron Trent Irving, Soroush Sarvestani, Ashish Banerjee, Ashley Scott Mansell, Jun-Ping Liu, Steven Demetrious Gerondakis, Bryan Raymond George Williams, Dakang Xu Research output: Contribution to journalArticleResearchpeer-review 52 Citations (Scopus) Abstract To date, the activities of protein kinases have formed the core of our understanding of cell signal transduction. Comprehension of the extent of protein acetylation has raised expectations that this alternate post-transcriptional modification will be shown to rival phosphorylation in its importance in mediating cellular responses. However, limited instances have been identified. Here we show that signalling from Toll-like or TNF-alpha receptors triggers the calcium/calmodulin-dependent protein kinase (CaMK2) to activate histone acetyltransferase-1 (HAT1), which then acetylates the transcriptional regulator PLZF. Acetylation of PLZF promotes the assembly of a repressor complex incorporating HDAC3 and the NF-kappaB p50 subunit that limits the NF-kappaB response. Accordingly, diminishing the activity of CaMK2, the expression levels of PLZF or HAT1, or mutating key residues that are covalently modified in PLZF and HAT1, curtails control of the production of inflammatory cytokines. These results identify a central role for acetylation in controlling the inflammatory NF-kappaB transcriptional programme. Original languageEnglish Pages (from-to)1 - 11 Number of pages11 JournalNature Communications Volume6 Issue number13 (Art. ID: 6795) DOIs Publication statusPublished - 2015 Cite this
{ "url": "https://research.monash.edu/en/publications/the-acetyltransferase-hat1-moderates-the-nf-b-response-by-regulat", "source_domain": "research.monash.edu", "snapshot_id": "CC-MAIN-2023-06", "warc_metadata": { "Content-Length": "49799", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:ERREFMJTXJNYYPARI64MV52TCQKYD25X", "WARC-Concurrent-To": "<urn:uuid:e3f24e65-98c9-4ccc-9db9-58ea66c72c48>", "WARC-Date": "2023-02-07T18:18:42Z", "WARC-IP-Address": "18.139.148.124", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:TZ3ZQQBLENSRL2Q2WIJNVC4JLHBWUIIO", "WARC-Record-ID": "<urn:uuid:c28942ef-21e6-4511-b606-4e2e0c3ab35f>", "WARC-Target-URI": "https://research.monash.edu/en/publications/the-acetyltransferase-hat1-moderates-the-nf-b-response-by-regulat", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:eaed1309-5760-4cfa-82a8-ba968f35fd7d>" }, "warc_info": "isPartOf: CC-MAIN-2023-06\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January/February 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-16\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 100, 101, 344, 345, 412, 413, 435, 436, 445, 446, 1561, 1586, 1608, 1626, 1655, 1663, 1694, 1699, 1734, 1735 ], "line_end_idx": [ 100, 101, 344, 345, 412, 413, 435, 436, 445, 446, 1561, 1586, 1608, 1626, 1655, 1663, 1694, 1699, 1734, 1735, 1744 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1744, "ccnet_original_nlines": 20, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.21621622145175934, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.05743243172764778, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.20270270109176636, "rps_doc_frac_unique_words": 0.7488986849784851, "rps_doc_mean_word_length": 6.4052863121032715, "rps_doc_num_sentences": 10, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.874547958374023, "rps_doc_word_count": 227, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.012379639782011509, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -126.23056030273438, "rps_doc_books_importance_length_correction": -116.74461364746094, "rps_doc_openwebtext_importance": -54.381473541259766, "rps_doc_openwebtext_importance_length_correction": -54.381473541259766, "rps_doc_wikipedia_importance": -48.897560119628906, "rps_doc_wikipedia_importance_length_correction": -43.515052795410156 }, "fasttext": { "dclm": 0.019679490476846695, "english": 0.793470025062561, "fineweb_edu_approx": 1.9032719135284424, "eai_general_math": 0.001564500038512051, "eai_open_web_math": 0.2058621048927307, "eai_web_code": 0.0012039500288665295 } }
{ "free_decimal_correspondence": { "primary": { "code": "572.622", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Anthropology" } }, "secondary": { "code": "572.6", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Anthropology" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
151,515,623,453,599,940
تمام کارهای مربوط به برد مدار چاپی را به ما بسپارید :) ۴ مطلب با موضوع «مقالات خارجی» ثبت شده است Practical PCB Layout Tips Practical PCB Layout Tips Engineers tend to pay most attention to circuits, the latest components, and code as important parts of an electronics project, but sometimes a critical component of electronics, the PCB layout, is neglected. Poor PCB layout can cause function and reliability problems. This article contains practical PCB layout tips that can help your PCB projects work correctly and reliably. ۰ نظر موافقین ۰ مخالفین ۰ علی پاداش ?What's a PCB Overview One of the key concepts in electronics is the printed circuit board or PCB. It's so fundamental that people often forget to explain what a PCB is. This tutorial will breakdown what makes up a PCB and some of the common terms used in the PCB world. Blank PCB from the ClockIt Kit Over the next few pages, we'll discuss the composition of a printed circuit board, cover some terminology, a look at methods of assembly, and discuss briefly the design process behind creating a new PCB. What's a PCB? Printed circuit board is the most common name but may also be called "printed wiring boards" or "printed wiring cards". Before the advent of the PCB circuits were constructed through a laborious process of point-to-point wiring. This led to frequent failures at wire junctions and short circuits when wire insulation began to age and crack. -> Mass of wire wrap courtesy Wikipedia user Wikinaut <- A significant advance was the development of wire wrapping, where a small gauge wire is literally wrapped around a post at each connection point, creating a gas-tight connection that is highly durable and easily changeable. As electronics moved from vacuum tubes and relays to silicon and integrated circuits, the size and cost of electronic components began to decrease. Electronics became more prevalent in consumer goods, and the pressure to reduce the size and manufacturing costs of electronic products drove manufacturers to look for better solutions. Thus was born the PCB. LilyPad PCB PCB is an acronym for the printed circuit board. It is a board that has lines and pads that connect various points together. In the picture above, there are traces that electrically connect the various connectors and components to each other. A PCB allows signals and power to be routed between physical devices. Solder is the metal that makes the electrical connections between the surface of the PCB and the electronic components. Being metal, the solder also serves as a strong mechanical adhesive. Composition A PCB is sort of like a layer cake or lasagna- there are alternating layers of Continue ...  ۰ نظر موافقین ۰ مخالفین ۰ علی پاداش Six Things to Consider When Designing Your PCB Unless your PCB is designed correctly in the first place, you are going to run into issues sooner or later. Designing a PCB for one of today's products can be very complex, but this aspect of things is often overlooked. Instead, the focus falls upon the more "interesting" aspects of the product, like the FPGAs or MCUs. The fact remains, however, that unless the board is designed correctly in the first place, you are going to run into issues sooner or later. ۰ نظر موافقین ۰ مخالفین ۰ علی پاداش The Importance Of IPC Standards For PCB Manufacturing Technological advances have ensured that Printed Circuit Boards cannot only perform complex functions they can also be produced inexpensively. This is the exact reason why PCBs are an integral part of so many devices. However, the quality of the device is directly proportional to the quality of the PCB used. PCB failure can, therefore, have debilitating consequences wherein entire systems can fail. It is therefore extremely important to stick to some quality measures in the PCB design and manufacturing process. ۰ نظر موافقین ۰ مخالفین ۰ علی پاداش
{ "url": "http://pcbdesign.ir/category/%D9%85%D9%82%D8%A7%D9%84%D8%A7%D8%AA-%D8%AE%D8%A7%D8%B1%D8%AC%DB%8C/", "source_domain": "pcbdesign.ir", "snapshot_id": "crawl=CC-MAIN-2020-10", "warc_metadata": { "Content-Length": "37705", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:SJCA4ZH2ELZ2OA7BEOPI3HMCFSOKTM4Z", "WARC-Concurrent-To": "<urn:uuid:8f62b255-f636-4200-9368-e3e354cc8960>", "WARC-Date": "2020-02-27T16:42:55Z", "WARC-IP-Address": "91.98.29.218", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:BIR3NGYYAPGTC2KSPHYUYYSKPDF3QJ2E", "WARC-Record-ID": "<urn:uuid:53425c1d-21af-47a1-b499-d74a7a786769>", "WARC-Target-URI": "http://pcbdesign.ir/category/%D9%85%D9%82%D8%A7%D9%84%D8%A7%D8%AA-%D8%AE%D8%A7%D8%B1%D8%AC%DB%8C/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:f79fbed3-d9c6-4483-8c85-bf1966a89405>" }, "warc_info": "isPartOf: CC-MAIN-2020-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-233.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 55, 56, 99, 100, 126, 127, 153, 154, 533, 534, 560, 570, 571, 585, 586, 595, 596, 844, 845, 876, 877, 1081, 1082, 1096, 1097, 1438, 1439, 1460, 1496, 1497, 1721, 1722, 2079, 2080, 2092, 2093, 2595, 2596, 2608, 2609, 2702, 2703, 2729, 2739, 2740, 2787, 2788, 2896, 2897, 3251, 3252, 3278, 3288, 3289, 3343, 3344, 3861, 3862, 3888 ], "line_end_idx": [ 55, 56, 99, 100, 126, 127, 153, 154, 533, 534, 560, 570, 571, 585, 586, 595, 596, 844, 845, 876, 877, 1081, 1082, 1096, 1097, 1438, 1439, 1460, 1496, 1497, 1721, 1722, 2079, 2080, 2092, 2093, 2595, 2596, 2608, 2609, 2702, 2703, 2729, 2739, 2740, 2787, 2788, 2896, 2897, 3251, 3252, 3278, 3288, 3289, 3343, 3344, 3861, 3862, 3888, 3897 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3897, "ccnet_original_nlines": 59, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.36986300349235535, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.04383562132716179, "rps_doc_frac_lines_end_with_ellipsis": 0.01666666939854622, "rps_doc_frac_no_alph_words": 0.17534247040748596, "rps_doc_frac_unique_words": 0.4829721450805664, "rps_doc_mean_word_length": 4.860681056976318, "rps_doc_num_sentences": 33, "rps_doc_symbol_to_word_ratio": 0.0013698600232601166, "rps_doc_unigram_entropy": 5.158745765686035, "rps_doc_word_count": 646, "rps_doc_frac_chars_dupe_10grams": 0.04649681970477104, "rps_doc_frac_chars_dupe_5grams": 0.08216560631990433, "rps_doc_frac_chars_dupe_6grams": 0.08216560631990433, "rps_doc_frac_chars_dupe_7grams": 0.08216560631990433, "rps_doc_frac_chars_dupe_8grams": 0.08216560631990433, "rps_doc_frac_chars_dupe_9grams": 0.04649681970477104, "rps_doc_frac_chars_top_2gram": 0.013375800102949142, "rps_doc_frac_chars_top_3gram": 0.01401273999363184, "rps_doc_frac_chars_top_4gram": 0.015286619774997234, "rps_doc_books_importance": -310.71270751953125, "rps_doc_books_importance_length_correction": -310.71270751953125, "rps_doc_openwebtext_importance": -168.48020935058594, "rps_doc_openwebtext_importance_length_correction": -168.48020935058594, "rps_doc_wikipedia_importance": -99.32505798339844, "rps_doc_wikipedia_importance_length_correction": -99.32505798339844 }, "fasttext": { "dclm": 0.37208032608032227, "english": 0.9050617814064026, "fineweb_edu_approx": 3.3185133934020996, "eai_general_math": 0.2520511746406555, "eai_open_web_math": 0.27843546867370605, "eai_web_code": 0.17885971069335938 } }
{ "free_decimal_correspondence": { "primary": { "code": "621.3815", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } }, "secondary": { "code": "621.312", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
5,813,585,177,773,439,000
Wednesday 29 November 2023 Get Fresh & Clean Water through RO Water Purifier Water that is natural or untreated contains contaminants that are classified under Physical, Chemical and Biological categories. Visible contaminants like mud or dirt, sediment or suspended materials are included by physical contaminants. Naturally organic chemicals, salts, metals, pesticides etc. are included in Chemical contaminants. Microbes like bacteria, viruses and parasites (cysts) come under Biological contaminants. Basic pre-filtration techniques are used to remove physical contaminants and is commonly used in many water purifiers. Various technologies like UV, ozonation, ultrafiltration, biocidal resins and allied materials are used to remove biological contaminants. All these chemicals can be removed but removing the dissolved chemicals/solids is a challenge because of its size and complex nature. Activated carbon is able to remove some organic chemicals and chlorine but cannot remove heavy metals as well as pesticides effectively. This is where Reverse Osmosis is required. RO is a membrane separation where water is passed under high pressure, through a semi-permeable membrane. The process removes excess TDS (Total Dissolved Solids), chemical contaminants such as Nitrate, Fluoride, Arsenic and some other heavy metals as well as pesticides from water so it becomes safe for drinking. 20-30% of the water that is purified is achieved and 70-80% of water, which has high contaminant concentration, is drained. RO, however, is not applicable to all types of water because of the key technology limitations. It works on very tiny-pore sized membranes that molecularly separate all the dissolved chemical contaminants. Its design, however, cannot discriminate between the ‘good’ and the ‘bad’ chemicals. It is important that RO technology be used only for waters where resulting benefits exceed its limitations. Because of deterioration of freshwater sources and the colossal increase in population, groundwater usage that is high in dissolved solids has become more common. There is heaviness or salinity in water that many people complain about. This happens when the TDS exceeds 500 mg/L or hardness i.e. Calcium and Magnesium exceeds 200 mg/L. In order to make this water potable according to the BIS norms, as well as to achieve acceptable taste, the usage of RO is very important. If such high TDS water is consumed for long-term, will result in an excess agglomeration that causes stress on kidneys. This might lead to kidney stone i.e. an acute health issue. Because of anthropogenic activities, high levels of heavy metals such as lead, arsenic and some other contaminants in water that should be removed by RO in a household application in order to render safe drinking water. Some other available technologies such as UV, boiling or resin-based) are not able to remove these heavy metals to acceptable global standards. However, it is very important to use RO technology in correct water conditions. Do not use it indiscriminately. The customer must be made aware of all positives as well as the limitations of RO technology. Educating customers about the use is very important as the selection of water purifier for home must be as per their household requirements, preferences and the quality of input water. The water quality in India keeps changing due to both human and natural factors. Therefore, it is very necessary for you to test the water source while purchasing a water purifier. After a good research, you are ready to buy water purifier or RO water purifier. Share 2 comments Comments are closed.
{ "url": "https://www.blogswow.com/get-fresh-clean-water-through-ro-water-purifier/", "source_domain": "www.blogswow.com", "snapshot_id": "CC-MAIN-2023-50", "warc_metadata": { "Content-Length": "114576", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:BUIC365ASJ2EFDYYZGXMUFXBRHLSV4HA", "WARC-Concurrent-To": "<urn:uuid:4b896821-5e8d-4287-9c20-429169637bb1>", "WARC-Date": "2023-11-29T07:55:55Z", "WARC-IP-Address": "104.21.66.179", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:SGWMGZGYI6VRHDBMX3E65R6ISJR77HAD", "WARC-Record-ID": "<urn:uuid:4d7160ef-abc2-485a-8650-1e58622b8ae3>", "WARC-Target-URI": "https://www.blogswow.com/get-fresh-clean-water-through-ro-water-purifier/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:7642d4c6-b9bf-4953-a498-0d1c9634dbc0>" }, "warc_info": "isPartOf: CC-MAIN-2023-50\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-11\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 27, 28, 78, 79, 507, 508, 1518, 1519, 1918, 1919, 2574, 2575, 2939, 2940, 3593, 3594, 3600, 3601, 3612, 3613 ], "line_end_idx": [ 27, 28, 78, 79, 507, 508, 1518, 1519, 1918, 1919, 2574, 2575, 2939, 2940, 3593, 3594, 3600, 3601, 3612, 3613, 3633 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3633, "ccnet_original_nlines": 20, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.37707391381263733, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.025641029700636864, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1463046818971634, "rps_doc_frac_unique_words": 0.47246891260147095, "rps_doc_mean_word_length": 5.284191608428955, "rps_doc_num_sentences": 37, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.102149963378906, "rps_doc_word_count": 563, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.019495800137519836, "rps_doc_frac_chars_dupe_6grams": 0.019495800137519836, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.021848740056157112, "rps_doc_frac_chars_top_3gram": 0.010756299830973148, "rps_doc_frac_chars_top_4gram": 0.010084030218422413, "rps_doc_books_importance": -308.5158996582031, "rps_doc_books_importance_length_correction": -308.5158996582031, "rps_doc_openwebtext_importance": -172.06593322753906, "rps_doc_openwebtext_importance_length_correction": -172.06593322753906, "rps_doc_wikipedia_importance": -97.28193664550781, "rps_doc_wikipedia_importance_length_correction": -97.28193664550781 }, "fasttext": { "dclm": 0.04185599088668823, "english": 0.9530774354934692, "fineweb_edu_approx": 3.1352810859680176, "eai_general_math": 0.23223841190338135, "eai_open_web_math": 0.4128275513648987, "eai_web_code": 0.007999120280146599 } }
{ "free_decimal_correspondence": { "primary": { "code": "628.1", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Sanitary engineering, Sanitation, and Water-supply" } }, "secondary": { "code": "664.7", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Chemistry, Technical and Chemical engineering", "level_3": "Food" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "6", "label": "Promotional/Advertisement" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
444,834,929,501,778,400
Prediction: South-Facing Ivy Growth Smaller than North-Facing Ivy I predict that the ivy plant that grows on the south side of the wall will be smaller than the north facing ivy. This is because they have less limiting factors affecting them such as availability of light. The south side ivy have no problem with availability of light as the earth is tilted on its axis facing the sun, so this side has more sunlight. The purpose of the leaves to be able to photosynthesise, so I think that the north leaves will be bigger in size as they need a larger surface area in order to photosynthesise at the same rate as the smaller south ivy. Conclusion: For the ivy growing on the north side of the wall the results are generally very varied. The graphs show skewed results, as there is an uneven distribution of growth by the plant, and there is no pattern between the data collected. Between 50-80mm on the north petiole length there are more results, with the highest amount being 6 petioles at 75-80mm in length. Get quality help now Marrie pro writer Marrie pro writer checked Verified writer Proficient in: Chemistry star star star star 5 (204) “ She followed all my directions. It was really easy to contact her and respond very fast as well. ” avatar avatar avatar +84 relevant experts are online Hire writer The north leaf length has the most in the group 30-35mm with 11 petioles in this category. Again there is an uneven distribution, but the numbers seem to decline, as the length gets bigger. The common width is between 40-45mm with 9 and most of the ivy plants having a leaf width of 35-70mm before we see a significant decline at 70-75mm with only one plant. The ivy growing on the south side has results, which aren't as varied as the north side ivy. Get to Know The Price Estimate For Your Paper Topic Number of pages Email Invalid email By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email "You must agree to out terms of services and privacy policy" Write my paper You won’t be charged yet! There is a much more even distribution amongst the plants. This suggests to me that they have less limiting factors acting against them. These limiting factors can affect he rate of photosynthesis in a plant, these factors can be light intensity, carbon dioxide levels and temperature. The equation for photosynthesis is: Light CO2 + H2O O2 + C6H12O6 This equation shows that you need the input variables, which in this case is carbon dioxide and water to produce the output variables that are oxygen and glucose. Both light intensity and carbon dioxide levels feature in the equation but temperature doesn't. However photosynthesis is driven by enzymes that work better in warmer conditions, but if the temperature is too hot they become denatured and therefore cannot carry out their function. The south petiole length of 25-30 mm and 30-35mm have the same number of ivy, which is 11. With 20-25mm and 35-40mm with 9 and 8. This instantly shows a different picture to the north graphs as their results didn't steadily increase and decrease but grew statically and erratically. The south leaf width between 30-35mm there was 14 plants, this was the highest number in the group and the south leaf length had also 14 plants but this time in the 35-40mm group. If I compare the highest number of results for leaf length, with and petiole for the north and south. I can see that there is a considerable amount of difference in the sizes of the leaf. North South Petiole 75-80mm 6/50 25-30mm 30-35mm 11/50 Width 40-45mm 9/50 30-35mm 14/50 Length 30-35mm 11/50 35-40mm 14/50 Using this table I can see that the south side growing ivy has grown at similar sizes ranging from about 25-40mm. Whilst the north side ivy ranges from 30-80mm which is a 50mm difference on the north side and 15mm on the south side. This tells me that there are more limiting factors affecting the ivy plants on the north side of the wall. Factors affecting the growth of the ivy on the north side of the wall can be temperature, water and carbon dioxide. All these factors are needed in photosynthesis as shown by the equation. Light CO2 + H2O O2 + C6H12O6 Plants need to photosynthesise they use the energy for carbohydrates, proteins and fats. If there is an increase or decrease in temperature the enzymes that catalyse this process are denatured. This means that photosynthesis is affected. Also plants need sunlight to photosynthesise so as there is more sunlight on the south side of the wall. I know this as the sun tilts towards the sun like this: This can show why the petiole lengths are longer as they need to grow longer so that their leaves can reach the sunlight to photosynthesise. This agrees with my prediction as I said that the south side plants would be smaller than the north side plants. This is also proven by the averages of each category shown below in a table. Averages North ivy South ivy Petiole length 75.1 31.8 Leaf length 46.9 34.66 Leaf width 61.36 31.96 In each category the averages show that the North ivy has a larger petiole length, leaf length and width, as it has had to adapt to its surroundings due to factors affecting it. So this table of results shows that my prediction is correct, as the ivy on the south side of the wall is smaller than the north facing ivy. Transpiration can also be another limiting factor in this process. Transpiration is the loss of water from a plant. It is caused by evaporation of water from inside the leaves via the stomata. The biggest rate of transpiration occurs in hot, dry and windy conditions. To prevent this from occurring plants have a waxy layer (cuticle) on their leaves, which stops them losing too much water. You will find the plants in hot climates have to adapt by having a thicker layer of wax. This can affect the ivy leave because there will be more water vapour on the south side as temperature is higher, so the air is more saturated causing less transpiration to occur. The north leaves have a large surface area that can aid transpiration but they have long petioles that restrict surface area to make transpiration more difficult, this is an example of a plant adapting to its environment. So the north ivy leaves are more varied than the south as shown by the results, proving my prediction correct. The results confirm that my prediction is correct. This is due to the earth's tilt on its axis causing the availability of sunlight to be more limited on the north side. This caused the north ivy to grow larger leaves and petioles to deal with the situation, as they would need a bigger surface area to trap the sunlight for the photosynthesis process and longer petioles to reach the sunlight on the south side of the wall. This is shown by the results, which is portrayed by the graphs. In conclusion the petiole lengths, leaf widths and lengths are larger on the north facing ivy wall than the south facing ivy wall, due to the North side being in shadow because of the Earth's axis. Which in turn causes the lengths to be longer and bigger to be able to complete the photosynthesis reaction with the sunlight obtained. Evaluation The results show that the generally the sizes of the south ivy are smaller than the north ivy. This is due to the position of the leaves on the wall and what factors have affected their growth. The most important factor that I think caused a difference in these plants is the availability of sunlight due to their position, north or south. This is devised on the fact that my results only show the sizes that the leaves and petioles grew to. If the experiment was done again, then temperature and availability of sunlight could be measured. I would measure sunlight and temperature levels with the use of a solar meter. If the levels recorded were different for example the south receives more sunlight and has a higher temperature this would justify my conclusion. As I said that there are more limiting factors affecting the north ivy plant and sunlight is needed for photosynthesis, and temperature to catalyse the enzymes needed for photosynthesis. This is shown by the results, as the north petiole lengths are longer as they need to grow further to reach the sunlight. As I myself did not carry out the experiment I have to take into consideration that it was done as a fair test and with the same variables used each time, for example the same ivy plant used to measure leaf length and width and petiole length. From my graphs I can see that there are some anomalous results, the results of the north petiole length for example. The results seem to increase to a peak of 6 between 75-80mm but the next group between 80-85mm there are no results. But this could be to due to inaccurate measurement of the plant or an error in the data collected. Also another reason for anomalous results is genetic difference, which could be due to the limiting factors that have affect the north ivy plants. As the leaves generally have to grow longer and larger to obtain sunlight for photosynthesis, so some of the leaves may grow to excess, likewise they may not even grow to the average size at all because of this. Also if the leaves were picked randomly from the top or bottom of the plant this would too make a difference as the top leaves would have more sunlight available meaning they would have a smaller surface area. Finally the results given were as whole numbers so there could be a degree of inaccuracy if decimal places were not used. However as my prediction agreed with the results obtained, I would say that the experiment was successful as my hypothesis that the south side ivy plant would be smaller was correct. This enabled me to write a conclusion with the scientific evidence needed to prove my prediction correct. There was enough data given for me to have some good graphs with many different groups and sizes. This too helped to conclude that my hypothesis is correct; as I could determine a ratio, averages and percentages, and also see whether the south plants were smaller than the north plants or vice versa. To ensure that the measurements recorded were accurate, if I were to do the experiment again, I would increase the sample size from fifty to hundred to get a wider range of results that can prove to be more accurate. Again the averages, ratios and percentages would be recorded to see if they coincided with the prediction. Also I could test the pH of the soil where the ivy plants grow as this too can be a factor that can limit or aid growth, for example if the soil was to acidic or alkaline. I would collect soil samples from each side of the wall and filter them through filter paper into a water beaker. I would then use universal indicator and see what colour the soil changes. I would compare the colours against a pH chart. If they were different then this result would support the conclusion as this could affect the process of photosynthesis. The colour of the leaves can be recorded against for example a colour chart also the total height can be measured, this can also show the amount of chlorophyll in the plant, which is also needed in photosynthesis. This too can support the conclusion, as I know from my results that the north ivy leaves were bigger in size thus having a larger surface area. The larger surface area could mean that there is more chlorophyll present or the same amount present as the smaller south ivy leaf, if that is the case than genetic variation has occurred and the plant has had to adapt to its surroundings. The total height of the north and south ivy plants can be subtracted to note the difference. Also the location where the plant is growing for example under a tree at the top or bottom of a hill. All these factors can help further the investigation to determine why the dimensions of the north and south ivy plants differ. Updated: Apr 29, 2023 Cite this page Prediction: South-Facing Ivy Growth Smaller than North-Facing Ivy. (2020, Jun 02). Retrieved from https://studymoose.com/ivy-plants-new-essay Prediction: South-Facing Ivy Growth Smaller than North-Facing Ivy essay Live chat  with support 24/7 👋 Hi! I’m your smart assistant Amy! Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes. get help with your assignment
{ "url": "https://studymoose.com/ivy-plants-new-essay", "source_domain": "studymoose.com", "snapshot_id": "CC-MAIN-2024-38", "warc_metadata": { "Content-Length": "221814", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:C4WNCUOYHYUTQ64KO3RJEHEU3TVIKYMG", "WARC-Concurrent-To": "<urn:uuid:e89400ee-9f46-4c53-a8f1-ad6590ffc850>", "WARC-Date": "2024-09-14T07:38:43Z", "WARC-IP-Address": "104.26.2.224", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:DNQTKGCCS4EUKPD2IUXENGBZXKEPOUCE", "WARC-Record-ID": "<urn:uuid:4418b040-54f0-4ad2-b21a-95c2391535ed>", "WARC-Target-URI": "https://studymoose.com/ivy-plants-new-essay", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:562ed95f-54de-40ca-bbfe-7885a06ebf42>" }, "warc_info": "isPartOf: CC-MAIN-2024-38\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-228\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 66, 67, 638, 639, 651, 652, 741, 742, 1016, 1017, 1038, 1056, 1074, 1098, 1099, 1124, 1125, 1153, 1154, 1255, 1256, 1277, 1309, 1321, 1322, 1681, 1682, 1775, 1776, 1822, 1828, 1844, 1864, 1865, 2016, 2017, 2078, 2093, 2094, 2120, 2121, 2443, 2444, 2450, 2451, 2474, 2475, 2920, 2921, 3384, 3385, 3573, 3574, 3580, 3581, 3587, 3588, 3596, 3597, 3605, 3606, 3611, 3612, 3628, 3629, 3635, 3636, 3642, 3643, 3651, 3652, 3657, 3658, 3666, 3667, 3673, 3674, 3681, 3682, 3690, 3691, 3697, 3698, 3706, 3707, 3713, 3714, 4054, 4055, 4250, 4251, 4274, 4275, 4674, 4675, 5006, 5007, 5016, 5017, 5027, 5028, 5038, 5039, 5054, 5055, 5060, 5061, 5066, 5067, 5079, 5080, 5085, 5086, 5092, 5093, 5104, 5105, 5111, 5112, 5118, 5119, 5438, 5439, 6432, 6433, 7256, 7257, 7268, 7269, 8344, 8345, 9281, 9282, 10204, 10205, 11059, 11060, 11980, 11981, 12003, 12018, 12019, 12161, 12162, 12234, 12263, 12264, 12300, 12301, 12412, 12413 ], "line_end_idx": [ 66, 67, 638, 639, 651, 652, 741, 742, 1016, 1017, 1038, 1056, 1074, 1098, 1099, 1124, 1125, 1153, 1154, 1255, 1256, 1277, 1309, 1321, 1322, 1681, 1682, 1775, 1776, 1822, 1828, 1844, 1864, 1865, 2016, 2017, 2078, 2093, 2094, 2120, 2121, 2443, 2444, 2450, 2451, 2474, 2475, 2920, 2921, 3384, 3385, 3573, 3574, 3580, 3581, 3587, 3588, 3596, 3597, 3605, 3606, 3611, 3612, 3628, 3629, 3635, 3636, 3642, 3643, 3651, 3652, 3657, 3658, 3666, 3667, 3673, 3674, 3681, 3682, 3690, 3691, 3697, 3698, 3706, 3707, 3713, 3714, 4054, 4055, 4250, 4251, 4274, 4275, 4674, 4675, 5006, 5007, 5016, 5017, 5027, 5028, 5038, 5039, 5054, 5055, 5060, 5061, 5066, 5067, 5079, 5080, 5085, 5086, 5092, 5093, 5104, 5105, 5111, 5112, 5118, 5119, 5438, 5439, 6432, 6433, 7256, 7257, 7268, 7269, 8344, 8345, 9281, 9282, 10204, 10205, 11059, 11060, 11980, 11981, 12003, 12018, 12019, 12161, 12162, 12234, 12263, 12264, 12300, 12301, 12412, 12413, 12442 ] }
{ "red_pajama_v2": { "ccnet_original_length": 12442, "ccnet_original_nlines": 151, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.43651115894317627, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.012981739826500416, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1212981715798378, "rps_doc_frac_unique_words": 0.24609734117984772, "rps_doc_mean_word_length": 4.575298309326172, "rps_doc_num_sentences": 104, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.30724573135376, "rps_doc_word_count": 2178, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.11098846048116684, "rps_doc_frac_chars_dupe_6grams": 0.0724535882472992, "rps_doc_frac_chars_dupe_7grams": 0.06221776083111763, "rps_doc_frac_chars_dupe_8grams": 0.039237331598997116, "rps_doc_frac_chars_dupe_9grams": 0.007827400229871273, "rps_doc_frac_chars_top_2gram": 0.02408429980278015, "rps_doc_frac_chars_top_3gram": 0.01324636023491621, "rps_doc_frac_chars_top_4gram": 0.010436530224978924, "rps_doc_books_importance": -911.412841796875, "rps_doc_books_importance_length_correction": -911.412841796875, "rps_doc_openwebtext_importance": -488.06591796875, "rps_doc_openwebtext_importance_length_correction": -488.06591796875, "rps_doc_wikipedia_importance": -469.2440185546875, "rps_doc_wikipedia_importance_length_correction": -469.2440185546875 }, "fasttext": { "dclm": 0.7327812910079956, "english": 0.971025288105011, "fineweb_edu_approx": 2.8890628814697266, "eai_general_math": 0.8252589702606201, "eai_open_web_math": 0.41729503870010376, "eai_web_code": 0.07293534278869629 } }
{ "free_decimal_correspondence": { "primary": { "code": "581.4", "labels": { "level_1": "Science and Natural history", "level_2": "Botany", "level_3": "Plant physiology and Plant anatomy" } }, "secondary": { "code": "577.1", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Life (Biology)" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "2", "label": "Partially Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-8,818,584,900,190,665,000
What/Sphinx是什么 定义:Sphinx是一个全文检索引擎。 特性: • 索引和性能优异 • 易于集成SQL和XML数据源,并可使用SphinxAPI、SphinxQL或者SphinxSE搜索接口 • 易于通过分布式搜索进行扩展 • 高速的索引建立(在当代CPU上,峰值性能可达到10 ~ 15MB/秒) • 高性能的搜索 (在1.2G文本,100万条文档上进行搜索,支持高达每秒150~250次查询) Why/为什么使用Sphinx 遇到的使用场景 遇到一个类似这样的需求:用户可以通过文章标题和文章搜索到一片文章的内容,而文章的标题和文章的内容分别保存在不同的库,而且是跨机房的。 可选方案 A、直接在数据库实现跨库LIKE查询 优点:简单操作 缺点:效率较低,会造成较大的网络开销 B、结合Sphinx中文分词搜索引擎 优点:效率较高,具有较高的扩展性 缺点:不负责数据存储 使用Sphinx搜索引擎对数据做索引,数据一次性加载进来,然后做了所以之后保存在内存。这样用户进行搜索的时候就只需要在Sphinx服务器上检索数据即可。而且,Sphinx没有MySQL的伴随机磁盘I/O的缺陷,性能更佳。 其他典型使用场景 1、快速、高效、可扩展和核心的全文检索 数据量大的时候,比MyISAM和InnoDB都要快。 能对多个源表的混合数据创建索引,不限于单个表上的字段。 能将来自多个索引的搜索结果进行整合。 能根据属性上的附加条件对全文搜索进行优化。 2、高效地使用WHERE子句和LIMIT字句 当在多个WHERE条件做SELECT查询时,索引选择性较差或者根本没有索引支持的字段,性能较差。sphinx可以对关键字做索引。区别是,MySQL中,是内部引擎决定使用索引还是全扫描,而sphinx是让你自己选择使用哪一种访问方法。因为sphinx是把数据保存到RAM中,所以sphinx不会做太多的I/O操作。而mysql有一种叫半随机I/O磁盘读,把记录一行一行地读到排序缓冲区里,然后再进行排序,最后丢弃其中的绝大多数行。所以sphinx使用了更少的内存和磁盘I/O。 3、优化GROUP BY查询 在sphinx中的排序和分组都是用固定的内存,它的效率比类似数据集全部可以放在RAM的MySQL查询要稍微高些。 4、并行地产生结果集 sphinx可以让你从相同数据中同时产生几份结果,同样是使用固定量的内存。作为对比,传统SQL方法要么运行两个查询,要么对每个搜索结果集创建一个临时表。而sphinx用一个multi-query机制来完成这项任务。不是一个接一个地发起查询,而是把几个查询做成一个批处理,然后在一个请求里提交。 5、向上扩展和向外扩展 向上扩展:增加CPU/内核、扩展磁盘I/O 向外扩展:多个机器,即分布式sphinx 6、聚合分片数据 适合用在将数据分布在不同物理MySQL服务器间的情况。 例子:有一个1TB大小的表,其中有10亿篇文章,通过用户ID分片到10个MySQL服务器上,在单个用户的查询下当然很快,如果需要实现一个归档分页功能,展示某个用户的所有朋友发表的文章。那么就要同事访问多台MySQL服务器了。这样会很慢。而sphinx只需要创建几个实例,在每个表里映射出经常访问的文章属性,然后就可以进行分页查询了,总共就三行代码的配置。 How/如何使用Sphinx Sphinx工作流程图: Sphinx工作流程图 流程图解释: • Database:数据源,是Sphinx做索引的数据来源。因为Sphinx是无关存储引擎、数据库的,所以数据源可以是MySQL、PostgreSQL、XML等数据。 • Indexer:索引程序,从数据源中获取数据,并将数据生成全文索引。可以根据需求,定期运行Indexer达到定时更新索引的需求。 • Searchd:Searchd直接与客户端程序进行对话,并使用Indexer程序构建好的索引来快速地处理搜索查询。 • APP:客户端程序。接收来自用户输入的搜索字符串,发送查询给Searchd程序并显示返回结果。 Sphinx的工作原理 Sphinx的整个工作流程就是Indexer程序到数据库里面提取数据,对数据进行分词,然后根据生成的分词生成单个或多个索引,并将它们传递给searchd程序。然后客户端可以通过API调用进行搜索。 介绍了Sphinx的工作原理后,那么接下来就要让Sphinx工作起来,先来看看Sphinx的配置。 Sphinx的配置 数据源配置 先来看一份数据源的配置文件示例: source test { type = mysql sql_host = 127.0.0.1 sql_user = root sql_pass = root sql_db = test sql_port = 3306 # optional, default is 3306 sql_query_pre = SET NAMES utf8 sql_query      = SELECT id, name, add_time FROM tbl_test sql_attr_timestamp = add_time    sql_query_info_pre = SET NAMES utf8 sql_query_info = SELECT * FROM tbl_test WHERE id=$id } 其中 source后面跟着的是数据源的名字,后面做索引的时候会用到; type:数据源类型,可以为MySQL,PostreSQL,Oracle等等; sql_host、sql_user、sql_pass、sql_db、sql_port是连接数据库的认证信息; sql_query_pre:定义查询时的编码 sql_query:数据源配置核心语句,sphinx使用此语句从数据库中拉取数据; sql_attr_*:索引属性,附加在每个文档上的额外的信息(值),可以在搜索的时候用于过滤和排序。设置了属性之后,在调用Sphinx搜索API时,Sphinx会返回已设置了的属性; sql_query_info_pre:设置查询编码,如果在命令行下调试出现问号乱码时,可以设置此项; sql_query_info:设置命令行下返回的信息。 索引配置 index test_index { source = test path = /usr/local/coreseek/var/data/test docinfo = extern charset_dictpath = /usr/local/mmseg3/etc/ charset_type = zh_cn.utf-8 ngram_len = 1 ngram_chars = U+3000..U+2FA1F } 其中 index后面跟的test_index是索引名称 source:数据源名称; path:索引文件基本名,indexer程序会将这个路径作为前缀生成出索引文件名。例如,属性集会存在/usr/local/sphinx/data/test1.spa中,等等。 docinfo:索引文档属性值存储模式; charset_dictpath:中文分词时启用词典文件的目录,该目录下必须要有uni.lib词典文件存在; charset_type:数据编码类型; ngram_len:分词长度; ngram_chars:要进行一元字符切分模式认可的有效字符集。 中文分词核心配置 一元分词 charset_type = utf8 ngram_len = 1 ngram_chars = U+3000..U+2FA1F mmseg分词 charset_type = utf8 charset_dictpath = /usr/local/mmseg3/etc/ ngram_len = 0 运行示例 数据库数据 数据 使用indexer程序做索引 sphinx indexer 查询 sphinx 搜索示例 可以看到,配置文件中的add_time被返回了,如上图的1所示。而sql_query_info返回的信息如上图的2所示。 Sphinx的配置不是很灵活,此处根据工作流程给出各部分的配置,更多的高级配置可以在使用时查阅文档。 介绍了Sphinx的配置之后,继续介绍在Sphinx中,负责做索引的程序Indexer是如何做索引的。 sphinx使用配置文件从数据库读出数据之后,就将数据传递给Indexer程序,然后Indexer就会逐条读取记录,根据分词算法对每条记录建立索引,分词算法可以是一元分词/mmseg分词。下面先介绍Indexer做索引时使用的数据结构和算法。 倒排索引 倒排索引是一种数据结构,用来存储在全文搜索下某个单词在一个文档或者一组文档中的存储位置的映射。它是文档检索系统中最常用的数据结构。 倒排索引(Inverted Index):倒排索引是实现“单词-文档矩阵”的一种具体存储形式,通过倒排索引,可以根据单词快速获取包含这个单词的文档列表。 传统的索引是:索引ID->文档内容,而倒排索引是:文档内容(分词)->索引ID。可以类比正向代理和反向代理的区别来理解。正向代理把内部请求代理到外部,反向代理把外部请求代理到内部。所以应该理解为转置索引比较合适。 倒排索引主要由两个部分组成:“单词词典”和“倒排文件”。 单词词典是倒排索引中非常重要的组成部分,它用来维护文档集合中出现过的所有单词的相关信息,同时用来记载某个单词对应的倒排列表在倒排文件中的位置信息。在支持搜索时,根据用户的查询词,去单词词典里查询,就能够获得相应的倒排列表,并以此作为后续排序的基础。 对于一个规模很大的文档集合来说,可能包含几十万甚至上百万的不同单词,能否快速定位某个单词直接影响搜索时的响应速度,所以需要高效的数据结构来对单词词典进行构建和查找,常用的数据结构包括哈希加链表结构和树形词典结构。 倒排索引基础知识 • 文档(Document):一般搜索引擎的处理对象是互联网网页,而文档这个概念要更宽泛些,代表以文本形式存在的存储对象,相比网页来说,涵盖更多种形式,比如Word,PDF,html,XML等不同格式的文件都可以称之为文档。再比如一封邮件,一条短信,一条微博也可以称之为文档。在本书后续内容,很多情况下会使用文档来表征文本信息。 • 文档集合(Document Collection):由若干文档构成的集合称之为文档集合。比如海量的互联网网页或者说大量的电子邮件都是文档集合的具体例子。 • 文档编号(Document ID):在搜索引擎内部,会将文档集合内每个文档赋予一个唯一的内部编号,以此编号来作为这个文档的唯一标识,这样方便内部处理,每个文档的内部编号即称之为“文档编号”,后文有时会用DocID来便捷地代表文档编号。 • 单词编号(Word ID):与文档编号类似,搜索引擎内部以唯一的编号来表征某个单词,单词编号可以作为某个单词的唯一表征。 Indexer程序就是根据配置好地分词算法,将获取到的记录进行分词,然后用倒排索引做数据结构保存起来。 分词算法 一元分词 一元分词的核心配置 charsey_type = zh_cn.utf8 ngram_len = 1 ugram_chars = U+4E00..U+9FBF ngram_len是分词的长度。 ngram_chars标识要进行一元分词切分模式的字符集。 原生的Sphinx支持的分词算法是一元分词,这种分词算法是对记录的每个词切割后做索引,这种索引的优点就是覆盖率高,保证每个记录都能被搜索到。缺点就是会生成很大的索引文件,更新索引时会消耗很多的资源。所以,如果不是特殊需求,而且数据不是特别少的时候,都不建议使用一元分词。 国人在sphinx的基础上开发了支持中文分词的Coreseek。Coreseek与Sphinx唯一的不同就是Coreseek还支持mmseg分词算法做中文分词。 mmseg分词 mmseg分词算法是基于统计模型的,所以算法的规则也是来自对语料库的分析和数学归纳,因为中文字符没有明确的分界,会导致大量的字符分界歧义,而且,中文里面,词和短语也很难界定,因此,算法除了要做统计和数学归纳之外,还要做歧义的解决。 在mmseg分词中,有一个叫chunk的概念。 chunk,是一句话的分词方式。包括一个词条数组和四个规则。 如:研究生命,有“研究/生命”和“研究生/命”两种分词方式,这就是两个chunk。 一个chunk有四个属性:长度、平均长度(长度/分词数)、方差、单字自由度(各单词条词频的对数之和)。 做好分词之后,会得到多种分词方式,这时候就要使用一些过滤规则来完成歧义的解决,以得到最终的分词方式。 歧义解决规则: 1、最大匹配 匹配最大长度的词。如“国际化”,有“国际/化”、“国际化”两种分词方式,选择后者。 2、最大平均词长度 匹配平均词最大的chunk。如“南京市长江大桥”,有“南京市/长江大桥”、“南京/市长/江大桥”三种分词方式,前者平均词长度是7/2=3.5,后者是7/3=2.3,故选择前者的分词方式。 3、最大方差 去方差最大的chunk。如“研究生命科学”,有“研究生/命/科学”、“研究/生命/科学“两种分词方式,而它们的词长都一样是2。所以需要继续过滤,前者方差是0.82,后者方差是0。所以选择第一种分词方式。 4、最大单字自由度 选择单个字出现最高频率的chunk。比如”主要是因为“,有”主要/是/因为“,”主/要是/因为“两种分词方式,它们的词长、方差都一样,而”是“的词频较高,所以选择第一种分词方式。 如果经过上述四个规则的过滤,剩下的chunk仍然大于一,那这个算法也无能为力了,只能自己写扩展完成。 最后的最后 当然,有人会说数据库的索引也可以做到sphinx索引,只是数据结构不一样而已,但是,最大的不同是sphinx就像一张没有任何关系查询支持的单表数据库。而且,索引主要用在搜索功能的实现而不是主要的数据来源。因此,你的数据库也许是符合第三范式的,但索引会完全被非规范化而且主要包含需要被搜索的数据。 另外一点,大部分数据库都会遭遇一个内部碎片的问题,它们需要在一个大请求里遭遇太多的半随机I/O任务。那就是说,考虑一个在数据库的索引中,查询指向索引,索引指向数据,如果数据因为碎片问题被分开在不同的磁盘中,那么此次查询将占用很长的时间。 总结 通过一个项目的实践,发现sphinx的使用要点主要在配置文件上,如果懂得配置了,那么基本用法很容易掌握。如果要深入研究,比如研究其工作原理,那就得查阅更多的资料。高级特性还没有用到,日后用到再做分享。最后,如果还想扩展sphinx,定制更强大的功能,可以直接阅读源代码,然后编写扩展。使用sphinx也有弊端,如果需要保证高质量的搜索,那么就要经常手动维护词库。如果不能保持经常更新词库,那么可以考虑百度搜索之类的插件。如果可以加入机器学习的话,那么会更好。 原创文章,文笔有限,才疏学浅,文中若有不正之处,万望告知。 如果本文对你有帮助,请点下推荐,写文章不容易。
{ "url": "https://www.hoohack.me/2016/04/21/introduce-sphinx-and-study-theory", "source_domain": "www.hoohack.me", "snapshot_id": "crawl=CC-MAIN-2019-18", "warc_metadata": { "Content-Length": "23285", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:H6T6TRZLOJC4W3XPK6EWRV4WL5KJYTSF", "WARC-Concurrent-To": "<urn:uuid:58e28da7-e0df-4571-b9e2-67b170cbe6b9>", "WARC-Date": "2019-04-19T18:20:35Z", "WARC-IP-Address": "185.199.108.153", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:3SU6YSQRSU3KL7KDWSHV53F2F6DNDI7U", "WARC-Record-ID": "<urn:uuid:676423bc-ea12-42ef-baba-3dcc5443c074>", "WARC-Target-URI": "https://www.hoohack.me/2016/04/21/introduce-sphinx-and-study-theory", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:982db63d-f5c5-44b5-86b6-9ce019eca160>" }, "warc_info": "isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-141-34-30.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 15, 16, 36, 37, 41, 42, 54, 110, 128, 168, 219, 220, 236, 237, 245, 246, 313, 314, 319, 320, 339, 340, 367, 368, 387, 388, 416, 417, 528, 529, 538, 539, 559, 560, 656, 657, 680, 681, 919, 920, 935, 936, 993, 994, 1005, 1006, 1153, 1154, 1166, 1167, 1210, 1211, 1220, 1221, 1427, 1428, 1443, 1444, 1457, 1458, 1470, 1471, 1478, 1479, 1566, 1635, 1697, 1749, 1750, 1762, 1763, 1862, 1863, 1913, 1914, 1924, 1925, 1931, 1932, 1949, 1950, 1962, 1964, 2002, 2005, 2047, 2084, 2121, 2158, 2226, 2229, 2276, 2345, 2348, 2389, 2392, 2437, 2505, 2507, 2508, 2511, 2512, 2544, 2545, 2585, 2586, 2641, 2642, 2665, 2666, 2708, 2709, 2801, 2802, 2853, 2854, 2882, 2883, 2888, 2889, 2906, 2908, 2946, 3013, 3053, 3109, 3154, 3189, 3239, 3241, 3242, 3245, 3246, 3271, 3272, 3286, 3287, 3375, 3376, 3397, 3398, 3453, 3454, 3475, 3476, 3492, 3493, 3526, 3527, 3536, 3537, 3542, 3543, 3563, 3577, 3607, 3608, 3616, 3617, 3637, 3679, 3693, 3694, 3699, 3700, 3706, 3707, 3710, 3711, 3726, 3727, 3742, 3743, 3746, 3747, 3759, 3760, 3821, 3822, 3873, 3874, 3926, 3927, 4049, 4050, 4055, 4056, 4122, 4123, 4200, 4201, 4308, 4309, 4338, 4339, 4464, 4465, 4572, 4573, 4582, 4583, 4750, 4831, 4953, 5018, 5019, 5071, 5072, 5077, 5078, 5083, 5084, 5094, 5095, 5121, 5135, 5164, 5181, 5182, 5212, 5213, 5349, 5350, 5431, 5432, 5440, 5441, 5557, 5558, 5582, 5583, 5614, 5615, 5657, 5658, 5710, 5711, 5762, 5763, 5771, 5772, 5821, 5822, 5926, 5927, 6036, 6037, 6137, 6138, 6189, 6190, 6196, 6197, 6464, 6465, 6468, 6469, 6699, 6700, 6730, 6731 ], "line_end_idx": [ 15, 16, 36, 37, 41, 42, 54, 110, 128, 168, 219, 220, 236, 237, 245, 246, 313, 314, 319, 320, 339, 340, 367, 368, 387, 388, 416, 417, 528, 529, 538, 539, 559, 560, 656, 657, 680, 681, 919, 920, 935, 936, 993, 994, 1005, 1006, 1153, 1154, 1166, 1167, 1210, 1211, 1220, 1221, 1427, 1428, 1443, 1444, 1457, 1458, 1470, 1471, 1478, 1479, 1566, 1635, 1697, 1749, 1750, 1762, 1763, 1862, 1863, 1913, 1914, 1924, 1925, 1931, 1932, 1949, 1950, 1962, 1964, 2002, 2005, 2047, 2084, 2121, 2158, 2226, 2229, 2276, 2345, 2348, 2389, 2392, 2437, 2505, 2507, 2508, 2511, 2512, 2544, 2545, 2585, 2586, 2641, 2642, 2665, 2666, 2708, 2709, 2801, 2802, 2853, 2854, 2882, 2883, 2888, 2889, 2906, 2908, 2946, 3013, 3053, 3109, 3154, 3189, 3239, 3241, 3242, 3245, 3246, 3271, 3272, 3286, 3287, 3375, 3376, 3397, 3398, 3453, 3454, 3475, 3476, 3492, 3493, 3526, 3527, 3536, 3537, 3542, 3543, 3563, 3577, 3607, 3608, 3616, 3617, 3637, 3679, 3693, 3694, 3699, 3700, 3706, 3707, 3710, 3711, 3726, 3727, 3742, 3743, 3746, 3747, 3759, 3760, 3821, 3822, 3873, 3874, 3926, 3927, 4049, 4050, 4055, 4056, 4122, 4123, 4200, 4201, 4308, 4309, 4338, 4339, 4464, 4465, 4572, 4573, 4582, 4583, 4750, 4831, 4953, 5018, 5019, 5071, 5072, 5077, 5078, 5083, 5084, 5094, 5095, 5121, 5135, 5164, 5181, 5182, 5212, 5213, 5349, 5350, 5431, 5432, 5440, 5441, 5557, 5558, 5582, 5583, 5614, 5615, 5657, 5658, 5710, 5711, 5762, 5763, 5771, 5772, 5821, 5822, 5926, 5927, 6036, 6037, 6137, 6138, 6189, 6190, 6196, 6197, 6464, 6465, 6468, 6469, 6699, 6700, 6730, 6731, 6754 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6754, "ccnet_original_nlines": 261, "rps_doc_curly_bracket": 0.000592240015976131, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.0034662000834941864, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.043327558785676956, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.7798960208892822, "rps_doc_frac_unique_words": 0.8133333325386047, "rps_doc_mean_word_length": 25.786666870117188, "rps_doc_num_sentences": 15, "rps_doc_symbol_to_word_ratio": 0.0008665500208735466, "rps_doc_unigram_entropy": 5.063765048980713, "rps_doc_word_count": 225, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.0046535697765648365, "rps_doc_frac_chars_top_3gram": 0.00413649994879961, "rps_doc_frac_chars_top_4gram": 0.010341259650886059, "rps_doc_books_importance": -518.005126953125, "rps_doc_books_importance_length_correction": -518.005126953125, "rps_doc_openwebtext_importance": -240.55136108398438, "rps_doc_openwebtext_importance_length_correction": -240.55136108398438, "rps_doc_wikipedia_importance": -207.1552734375, "rps_doc_wikipedia_importance_length_correction": -207.1552734375 }, "fasttext": { "dclm": 0.9330471754074097, "english": 0.0018908500205725431, "fineweb_edu_approx": 3.7843236923217773, "eai_general_math": 0.3874399662017822, "eai_open_web_math": 0.29218316078186035, "eai_web_code": 0.14012783765792847 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.74", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-485,156,988,757,957,400
Tuesday, November 15, 2011 Clojure/conj: The Talks The previous mammoth post was about the questions and answers I found at the Clojure/conj conference and training.  This mammoth post is my notes from the talks. Thanks to my employer, Canonical, for the opportunity to go to the conference.  When Canonical gives employees time to go to a conference, we have to summarize it.  The summaries are often company-internal emails, but I like blogging about them.  So here we are. I went to all of the officially scheduled talks.  With the exception of one presentation that I simply didn't follow largely because of my own limitations, I enjoyed them all.  For most talks, the slides are available in a git repository and the videos will be up soon (presumably on the conference website?), so you can go and get the information you want yourself if you like. I'll summarize the points that I personally took away from them. Stuart Sierra Clojure: Next Steps Slides are in the git repository. After reading books, doing Clojure koans, and solving on-line Clojure exercises, what should you tackle next?  A project!  Stuart gave some ideas of interesting Clojure corners that might lead to cool projects.  I took a number of notes, but I think the slides are the best summary if you are interested. Among many other ideas, Stuart talked about how Clojure's reader could be used to make a data serialization format.  He described the parts of Clojure that would be used to do this (the reader and the printer). The abstract serialization in the reader that he mentioned ("#=(...)") also struck me as the tool necessary to potentially serialize anything, including references to functions.  That would then give the building block equivalent to Python's pickle, from which an object database could be built.... Check out the slides for many other interesting project ideas. David McNeil Concurrent Stream Processing Slides are in git repository. David's project was interesting--he's dividing up a SPARQL query across databases, and reassembling the results as they stream back.  The stream processing is via a complex tree pipeline that can split and join; the assembly is all done in a single process using a fork-join pool, and he was presenting a DSL and tool for describing and building that tree. Interestingly, he can interpret the same code tree describing a given processing pipeline in one of three different ways.  He can process it to define the node structure, he can process it to convert the description into code for each node to run, and he can process it to define some kind of records that are generated. He accomplishes this either via a macro namespace trick, or a more strightforward use of a zipper to walk around the code tree and build the desired result.  The macro trick is cool: he has different namespaces for the different interpretations of the code tree, each providing the same function names; and his code switches the namespace of the code to be processed depending on what result he wants.  It was the kind of trick that he said he couldn't decide if he preferred or not, but it's a neat idea. Anthony Grimes Clojail Slides are in git repository. Anthony is among the more impressive 17-year-olds that I've seen.  He talked about the code he uses to provide the sandbox that lets anonymous web users more-or-less safely evaluate Clojure on his JVM.  You can see this by playing around with Clojure on the web at Try Clojure, or by solving some Clojure puzzes on the web at 4Clojure, or by interacting with clojure on IRC via lazybot. Chris Houser ClojureScript The single big svg is in the git repository. This was an interesting talk about the internals of ClojureScript.  In my notes I have a couple of random points that struck me. • [As with adapters,] using Clojure protocols is probably safe from conflicts with other library code if you own the data structure or the protocol.  If you are a middle-man, gluing one person's data structure with another person's protocol, the likelihood is somewhat higher that conflicts will occur. [This observation struck me as profound when I heard it, but in retrospect I'm a bit less convinced.  :-)] • The data structures in Clojure copy on write up to a certain size (32 elements, I heard later), and then begin to use the clever code to share structure.  The JavaScript code always copies on write, at this time.  That might adversely affect the performance of certain applications. Lunch I had a nice conversation with Frank Gerhardt.  A couple of interesting points came up. • The nice tools Clojure provides for thread-safe code are not inherently useful tools for using the resources of multiple machines.  For applications that must spread across multiple machines anyway, would it always be simpler/better to have multiple single-threaded processes all communicating in the same way, ignoring whether they share a machine or not?  It seemed so to me, on the face of it.  If so, the limitations of the Python GIL are unimportant for these sorts of use cases. • Clojure's STM does not have any conflict resolution tools, as far as we could tell, beyond commute.  That, like the inability of other code to participate in the transaction that I mentioned in the previous post, limits the utility. Phil Bagwell Striving to Make Things Simple and Fast The paper about the primary data structure he presented is here. Something I learned at the conference is that Scala and Clojure, as two functional languages on the JVM, share several goals, and are able to share a number of ideas for their persistent (read "persistent" as immutable and structural-sharing-on-write) data structures.  Phil Bagwell works with the team developing Scala.  He wrote a paper years ago that was the basis for Rich Hickey's implementation of persistent vectors.  At this year's conj, he mentioned some other cool persistent data structures. The one he spent the most time talking about was one that could concatenate two vectors at essentially constant time, which is not much of a trick for linked lists but very nice for an array deque.  See the paper I linked to for information on it.  Other goodies he mentioned in passing were collections for parallel work (as in Java's fork-join) that allowed work to be stolen from other parts of the tree without conflict; and, if I took my notes correctly, non-blocking resizing concurrent hash tries, which will shrink memory usage as they shrink in size, unlike other similar data structures. He also spent a bit of time at the beginning of the talk talking about Clojure advocacy.  He emphasized that it is important to reduce the imagery of the risk of a new technology.  He showed a (as far as I could see, data-less) graph indicating that people generally consider new technologies to be riskier than they really are before they have been integrated into a company or community; and that people generally consider formerly new technologies to be more valuable than they really are after they have been accepted and integrated.  I may be misrepresenting that, but that's how I read it.  It appeals to my cynical side. Ambrose Bonnaire-Sergeant Introduction to Logic Programming Slides are in git repository, and you can work through much of the same material here. A lot of people in the Clojure community are excited by core.logic, which is essentially Prolog reimplemented in Clojure.  It is based on work described in The Reasoned Schemer, the authors of which were in the audience.  They gave what was reported to have been an amazing after-hours talk.  I understand that it was videotaped; I intend to watch it when it comes out. Ambrose did a very nice job.  I don't have much to add that you can't get better by following the link I gave above.  I've played with stuff like this years ago and I'm a bit skeptical of its practical utility, but I'm interested enough that I plan to set aside some time and give it a whirl. Arnoldo Jose Muller-Molina Hacking the Human Genome with Clojure and Similarity Search Slides in the git repository.  The author recommended this description to me as background for the kind of work he did. I was blown away with this presentation.  I learned more practical information from other talks, but this was one of the highlights of the conference for me. In part, it was because he explained the scope of the problem that genome researchers are trying to solve in a way that seemed clear to me, and it was so grand, and so promising.  He described the problem as trying to solve a substitution code in a message written in a language for which you have a dictionary of only 10% of the words, no grammar, and a majority of irrelevant, garbage characters mixed in-between the words.  If we get it right, we learn how to grow hearts and lungs. The presentation was also a highlight because the presentation was so visually rich (this was among the more compelling Prezi presentations I've seen). And finally, the approach he took to solving the gigantic problem he had was interesting, and reportedly worked well.  I linked above to the description he gave me of the "quality threshhold clustering algorithm."  He's starting a company now with the belief that his process can be usefully applied to a number of problem sets.  I don't think I work on those problems right now, but I bet more of them exist. I was going to dig into the analysis steps he described, but as I started to, I realized I simply didn't really understand them well enough for it to be of value.  He gathered possible results, filtered and refined them, ranked them, removed overlapping results, and had his answer.  Said at that high of a level, it sounds like good advice for many generic data-informed activities, such as buying a car, so I have to assume I'm missing some secret sauce in there. :-) Stuart Halloway Ousterhout's Dichotomy Isn't Slides are not up yet as of this writing. Clojure's community sometimes represents Clojure as an optimal combination of simplicity, power, and focus.  This talk was about the "power" part of the triumvirate. • Clojure is good at "scripting" and "system" tasks, despite being a dynamic interpretive language, and so it is (another) example showing that Ousterhout's Dichotomy is arbitrary. • What is a "powerful" language?  He argues that power is work per unit time, and so a language that gives you concision and simplicity to produce good things quickly is a powerful language. • The W3C has some advice to choose the language with the "least power."  Given the definition of power as work per unit time, this seems silly.  [That said, I looked at the document, and it actually seems like it's the start of a reasonable idea to me.  Their definition of "power" is something akin to "complexity" though, because they regard imperative languages as more "powerful" than functional languages, and prefer functional languages for this reason.] • Making Clojure development a bit easier is a way to bring more power, because it can make people work faster. He'd love to see better error messages, more sample code, findable libraries, automated deployment, and a beginner-friendly environment.  Much of this can be done in libraries, and he encourages developers to work on it. [+1000!  And yes, I know I am an encouraged developer.] Neal Ford Neal's Master Plan for Clojure World Domination Slides are not up yet as of this writing. Neal's talk centered around how to get Clojure into the "enterprise"--big companies with lots of money. How do things become popular in enterprises?  "Rain down or sprout up."  Mollify CTO's fears by becoming pervasive and a politically acceptable alternative, or make it easy for developers to bring you into the company by having a vehicle that carries the technology in on the back of some desired feature. How do you make something popular? Propagandize, decide on a message and stay on it, and stay relentlessly positive. How do you build a bridge to popularity? Fight the status quo, and recognize that people who are also disrupting the status quo are competitors, not enemies. David Nolen Predicate Dispatch Slides not up yet as of this writing. We have core.logic (Prolog-in-Clojure) and core.match (pattern matching), so we ought to be able to have a very efficient predicate dispatch instead of Clojure multimethods.  The principal advantage is openness: users will be able to adjust predicate dispatch outcomes more easily than they can with multimethods. David outlined some of the challenges and some possible solutions.  Rich Hickey (Clojure creator) replied that he is in favor of some of the solutions, and that we ought to do it.  People are happy.  Sounds good to me! Kevin Lynagh Extending JavaScript Libraries from ClojureScript Kevin appears to have been the only person at the conj with production code using ClojureScript (Clojure compiled to Javascript).  He reported on how it was to use the tool. • Using ClojureScript instead of JavaScript is like using the metric system instead of the imperial measurement system: it's simpler, easier, and more fun. • He objects to the characterization that "only geniuses use functional languages": there are simple rules to follow, and he found them easier. • Interop with Javascript is interesting because sometimes you want to get references to methods.  (.aMethod js/an_object) gives you the reference.  (. js/an_object (aMethod)) calls the method. • A Javascript literal is coming as #js(...). • The "thread-left" macro ("->") works well with Javascript APIs that link together.  "item.select(...).append(...).text(...)" becomes "(-> item (.select ...) (.append ...) (.text ...))".  Moreover, the "thread-left" syntax lets you feed in other functions nicely, unlike the native Javascript spelling.  For example, "(-> item (.select ...) (myfunc) (.append ...) (.text ...))" has inserted "myfunc" to operate on the item (or even create a new one) and then the rest of the call proceeds as before. • Using the same language on client and server is very nice, but it's a lot nicer when that language is Clojure than Javascript (e.g. Node.js). • ClojureScript + Google Closure compiler + a Javascript library + your code makes for a lot of steps, and when something goes wrong inside, it can be hard to debug.  The "this" binding problem bit them. • Final thought: Tools don't make the artist.  We sent people to the moon with sliderules and the imperial measurement system.   Do good stuff with what you have. Cristophe Grande From Linear to Incremental I know from having looked at blog posts of his that Christophe is a programmer to learn from.  However, I had a lot of trouble understanding him.  This was the one talk that I really simply didn't follow.  I intend to look at his slides and try again. Mark McGranaghan Logs as Data I think Launchpad's Technical Architect, Robert Collins, would agree violently with the main thrust of this presentation.  He's been working in this direction quite a bit lately. Mark pointed out that one of Clojure's strengths is viewing everything as data, so that everything is simple abstractions with a general API.  Code is data, HTTP requests are data, HTML structure is data, SQL queries are data, and so on. Our logs are data too, and yet logging is usually synonymous with writing to a file.  We should instead focus on events, data, generality, and openness.  Log crunching should become event processing, with events aggregated and consumed by many possible services. Heroku's pulse is an example.  It is a real-time metrics service.  The demo was very cool, with lots of tiny live graphs. :-) I asked if they were using a message queue for their event aggregator (which is what Robert is doing).  They wrote their own, because they said they did not need or want routing.  That seems questionable on the face of it, but I have no idea what the problem really looks like from the inside. Chas Emerick Modeling the World Probabilistically Using Bayesian Networks in Clojure Bayesian networks are a nice kind of AI because there are no black boxes: the simplicity means that you can determine the cause of inferences, and affect them.  The speaker explained how Bayesian networks work.  He has been developing a Clojure-native Bayesian model named Raposo, though it is not released yet. Daniel Solano Gómez Clojure and Android Daniel has done some amazing work to get Clojure working on Dalvik, the Android VM.  The differences between Dalvik and the JVM do not sound trivial.  Clojure can work on Android, thanks to his work, but Scala and Java are faster to start and lower in memory.  He has improved this, but more work needs to be done. Clojure has the potential to be a first-class Android language.  Dynamic development on Android is a killer feature.  It needs better community and tools. The author is working on an O'Reilly book called "Decaffeinated Android," due out next year, about Scala and Clojure on Android. From the Q & A, startup time of Clojure applications on Google App Engine is also an issue; it's possible that the optimizations that Daniel made for Clojure might be of interest for that purpose as well. (I took a lot more notes on this one, but I suspect the slides are sufficient if you want more.) Rich Hickey Keynote (Areas of Interest for Clojure's Core) Slides not yet available. I took a lot of notes on this talk, but I'm just going to include some things that particularly interested me.  If you want a lot of details, the video will be up soon enough, hopefully. Rich is interested in giving Clojure multiple build targets, some providing leaner performance characteristics, some providing better debugging, and so on.  I hope these are mix and match, at least to some degree. He has been thinking for some time about a way to rethink transients, which are a way to have temporary mutables within a function for performance.  They combine policy with basic behavior, and he wants to separate the policy out.  He's considered "pods," which would handle threads and locks for you.  That might still conflate too much in one concept.  He discussed making "accumulators" but I didn't take good enough notes on how they might work. He agrees that Clojure's reader might provide a data format that could be superior to JSON and XML.  To do that, we need to have the "X" in XML: extensible.  We could maybe do that with a metadata tag describing how to read normal data structures.  An example might be #instant "1985-04-12T23:20:50.52Z", which tags a string as something that would be parsed as an instant in time.  Custom tags could be namespace-delimited.  Configuration could describe how to map a particular tag to a particular data structure within a given application.  Maybe this is a grass-roots way of getting Clojure in to some areas? Nathan Marz Cascalog Cascalog (code) is a high-level abstraction above Hadoop map/reduce.  It is tedious and verbose to express a problem in map/reduce.  Cascalog's abstractions provide an opportunity for composition. This looks like a very nice project.  I like his emphasis on composition: you can define functions that compose parts of your query, to make a collection of helpers for your domain and needs. Here's an example of a query to make a Hadoop map/reduce cluster print people younger than 30 to stdout (from some data set that I didn't clarify in my notes): (?<- (stdout) [?person] (age ?person ?age) (< ?age 30)).  If I remember correctly, the (age ?person ?age) represents an implicit join.  You can build your queries with predicates, filters, aggregators, generators, and sub-queries. Nathan works at Twitter and recently made another splash with his Storm project: a Hadoop for real-time data, that allows for distributed and fault-tolerant real-time computation.  For example, if you want to process tweets coming from Twitter and generate constant statistics from a flow of data, that's one of Storm's use cases.  I found the introductory slides to be helpful in understanding the applicability.  It is written in Clojure, but has the ability to connect to many languages, including Python. Daniel Spiewak Functional Data Structures in Scala Code (Scala) available here, with a link to the slides. In large part, this was a bit of a remedial review of basic functional data structures shared by Scala and Clojure.  I had studied much of this before, but forgotten a lot of it, so I appreciated it.  He covered linked lists, bankers deques, 2-3 finger trees, red-black trees, and the bitmapped vector trie that Phil Bagwell (Scala) and Rich Hickey (Clojure) worked on. The most interesting thing to me was his discussion of how modern computer architectures affect the performance of these data structures.  He used the phrase "locality of reference" to describe the idea that architectures optimize for arrays and loops by getting chunks of memory together. Practically, this means that the bitmapped vector trie performs very well, because information is divided in memory into sequential chunks of 32 elements.  The JVM or Java (unclear to me) does special tricks so that linked lists can take advantage of the same memory chunk optimization.  2-3 finger trees, while a very cool data structure and with good performance characteristics from a big-O perspective, are comparatively very slow practically because they cannot take advantage of this.  I suspect the same design characteristics would lead to similar performance characteristics for Chris Houser's finger trees. Michael Fogus Macronomicon Slides in the git repository, but it looks like they are Keynote (Mac only).  He also mentioned http://macronomicon.org/ but none of the links there work for me at this time. This talk focused on the "why" of Lisp macros.  He began with this lesson (paraphrased, but hopefully in the right ballpark). The apprentice came before the Macro master.  The master asked, "what are macros good for?"  The apprentice put his finger to his lips in thought.  The master drew his sword and severed the finger.  Before the apprentice could run away in terror, the master commanded, "Stop!  I ask again, what are macros good for?"  The apprentice controlled his shock and fear.  Thinking, he tried to put his finger to his lips...and he was enlightened. Nothing like a good finger-severing to catch my attention. In Q & A, the speaker refused to explain the story.  My interpretation is that macros let you do something that you could not otherwise do in any way.  In any case... He discussed possible use cases for Macros. • Binding forms and control flow are cited by others as use cases, but macros are not necessary (he cited a Ruby example). • Icing? For amusement, he showed a Scheme Scala macro in use that interpreted code inside it similarly to Commodore-64-era Basic, complete with line numbers and gotos. • Anything in a language that is semantically useful can eventually become syntax. • Macros are good at giving first class control of second class data (e.g. Clojure metadata). Lightning talks Alex Redington talked about scheduled events and his Monotony project. A RedHat employee talked about Immutant, an application server for Clojure that they are developing.  I captured these soundbites: "...Ruby in front, Clojure in back..." "inter-language messaging" "uniform deployment" "simple horizontal scaling" Alan Dipert and John Distad have a (another?!) Lisp on an Arduino!  They gave a quick demo of flashing lights, which was cool.  AFAICT they actually had a REPL running on the Arduino, or at least controlling it. Chris Granger talked about his Korma SQL query tool.  I've seen it before and it looks interesting.  Like Nathan Marz in his discussion of Cascalog (above), he emphasized composability as a key feature of why you would want to use Korma rather than, say, raw SQL, or some other tool.  He also mentioned that Korma is divided up into two parts: code that assembles a data structure that represents the SQL, and code that converts the data structure to SQL.  The clear delineation means that you can easily control the output by controlling the data structure, and you can use as much or as little of his actual syntax as makes sense for your purpose. Craig Andera Performance in the Wild: Faster, Baby Slides are not up as of this writing. This talk was the one that hit closest to home for me practically: it was about optimizing database-driven transactional web-based systems, and didn't have a lot to do with Clojure specifically.  I thought he had a lot of good points, and I took a lot of notes. Craig was describing a way of approaching performance engineering: a model-based optimization loop. Models of your traffic are important, and always wrong.  Performance is not a scalar quantity, and the world is not deterministic but stochastic.  How wrong does your model have to be to not be useful? When generating models, consider a distribution of latencies at a given load for a given transaction mix (reads, writes, tables accessed, etc.)  Consider other constraints, such as how old cached content is allowed to be, under what conditions.  Perform load testing with simulated users based on your models, and determine the slowest speed of your application for, say, 80% of requests, 90% of requests, and 98%. Work within an optimization loop: benchmark, analyze, recommend, optimize, and benchmark again.  Analysis may lead you to say you are done because you have met your goals; or coming up with recommendations may lead you to say you are done, because the remaining available optimizations are not cost-effective. When benchmarking, understand what you are measuring, because your assumptions are often wrong.  Start benchmarking early in the project, not late [this is my favorite piece of advice].  This can give you immediate feedback as to whether a particular change causes problems.  Watch for errors--count them.  They have experience creating load for benchmarks with jmeter, ab, and httperf. When analyzing, empirically identify the biggest factor in the performance of your system using a profiler. When optimizing, fix just one thing.  Remember and recognize that a redesign may be necessary. They have had success with always having two cards on the board, with one active at a time.  One is for "Benchmark, Analyze, and Recommend" and one is for "Optimize." Sam Aaron Programming Music with Overtone: Notes on the Synthesis of Music This was a really fun presentation, and seemed to be a crowd favorite.  He showed how he and other researchers are using Clojure to build Overtone.  This project is trying to help make new ways for people and computers to collaborate on music, and in particular on live music performance.  There's a parallel between this effort and computer-assisted chess games.  He demonstrated a variety of live music making with tracks and synthesis, using a monome and using the Clojure REPL.  It was really cool, and it sounds like a fascinating effort. Things I missed • More lightning talks after-hours. • An after-hours presentation by Byrd and Friedman about logic programming.  This was supposed to be fantastic; I hope to watch the video when it is released. • Some other after-hours unconference bits. In summary... This was a fantastic conference.  I'm really glad I went, and I'd love to be able to go again next year. 2 comments: Jake McCrary said... David Nolen gave a similar presentation at a NYC Clojure users group meeting. Should be able to hold over anyone until video and slides from from the Conj are posted. http://vimeo.com/27860102 Minor correction, Fogus's BASIC DSL was implemented in Scala. http://blog.fogus.me/2009/03/26/baysick-a-scala-dsl-implementing-basic/ Unknown said... Thanks, Jake. I made the correction.
{ "url": "https://codesinger.blogspot.com/2011/11/clojureconj-talks.html", "source_domain": "codesinger.blogspot.com", "snapshot_id": "crawl=CC-MAIN-2021-25", "warc_metadata": { "Content-Length": "92905", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:BXM3XCL2XDA4CL4EBMDREJMQVMFAF3ZO", "WARC-Concurrent-To": "<urn:uuid:1145e2ae-ae43-4fcd-b55b-c65e0ed071a2>", "WARC-Date": "2021-06-14T05:39:25Z", "WARC-IP-Address": "172.217.9.193", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:ZZBHCHVUR3DUZG47CI5MP3M6JSEMR5DA", "WARC-Record-ID": "<urn:uuid:c6fd9fc7-7e17-4e7c-9f62-6fb6fff0aac6>", "WARC-Target-URI": "https://codesinger.blogspot.com/2011/11/clojureconj-talks.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:19e7563d-4ca3-4be1-955a-69b8bdb528d0>" }, "warc_info": "isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-234.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 27, 28, 52, 53, 215, 216, 479, 480, 859, 860, 925, 926, 927, 928, 942, 962, 963, 964, 998, 999, 1000, 1305, 1306, 1517, 1518, 1817, 1818, 1881, 1882, 1895, 1924, 1925, 1926, 1956, 1957, 2314, 2315, 2636, 2637, 3143, 3144, 3159, 3167, 3168, 3198, 3199, 3586, 3587, 3600, 3614, 3615, 3616, 3661, 3662, 3791, 3792, 4204, 4491, 4497, 4585, 5074, 5311, 5324, 5364, 5365, 5430, 5431, 5934, 5935, 6533, 6534, 7162, 7163, 7189, 7223, 7224, 7311, 7312, 7682, 7683, 7976, 7977, 8004, 8064, 8065, 8185, 8186, 8344, 8345, 8831, 8832, 8984, 8985, 9395, 9396, 9866, 9867, 9883, 9912, 9913, 9955, 9956, 10122, 10123, 10306, 10499, 10963, 11354, 11364, 11412, 11413, 11455, 11456, 11560, 11561, 11867, 11868, 11985, 11986, 12144, 12145, 12157, 12176, 12177, 12215, 12216, 12530, 12531, 12750, 12751, 12764, 12814, 12815, 12816, 12990, 13148, 13294, 13490, 13538, 14041, 14187, 14393, 14558, 14575, 14602, 14603, 14604, 14856, 14857, 14874, 14887, 14888, 14889, 15068, 15069, 15307, 15308, 15571, 15572, 15698, 15699, 15993, 15994, 16007, 16079, 16080, 16081, 16393, 16394, 16414, 16434, 16435, 16436, 16751, 16752, 16907, 16908, 17037, 17038, 17243, 17244, 17341, 17342, 17354, 17401, 17402, 17428, 17429, 17616, 17617, 17831, 17832, 18282, 18283, 18895, 18896, 18908, 18917, 18918, 18919, 19116, 19117, 19309, 19310, 19701, 19702, 20211, 20212, 20227, 20263, 20264, 20320, 20321, 20691, 20692, 20982, 20983, 21600, 21601, 21615, 21628, 21629, 21804, 21805, 21931, 22371, 22430, 22431, 22598, 22599, 22643, 22768, 22939, 23024, 23120, 23136, 23137, 23208, 23209, 23455, 23456, 23668, 23669, 24319, 24320, 24333, 24371, 24372, 24410, 24411, 24673, 24674, 24774, 24775, 24977, 24978, 25393, 25394, 25704, 25705, 26092, 26093, 26201, 26202, 26297, 26298, 26465, 26466, 26476, 26541, 26542, 26543, 27087, 27088, 27104, 27142, 27303, 27349, 27363, 27468, 27469, 27481, 27482, 27503, 27504, 27697, 27698, 27832, 27833, 27849, 27850 ], "line_end_idx": [ 27, 28, 52, 53, 215, 216, 479, 480, 859, 860, 925, 926, 927, 928, 942, 962, 963, 964, 998, 999, 1000, 1305, 1306, 1517, 1518, 1817, 1818, 1881, 1882, 1895, 1924, 1925, 1926, 1956, 1957, 2314, 2315, 2636, 2637, 3143, 3144, 3159, 3167, 3168, 3198, 3199, 3586, 3587, 3600, 3614, 3615, 3616, 3661, 3662, 3791, 3792, 4204, 4491, 4497, 4585, 5074, 5311, 5324, 5364, 5365, 5430, 5431, 5934, 5935, 6533, 6534, 7162, 7163, 7189, 7223, 7224, 7311, 7312, 7682, 7683, 7976, 7977, 8004, 8064, 8065, 8185, 8186, 8344, 8345, 8831, 8832, 8984, 8985, 9395, 9396, 9866, 9867, 9883, 9912, 9913, 9955, 9956, 10122, 10123, 10306, 10499, 10963, 11354, 11364, 11412, 11413, 11455, 11456, 11560, 11561, 11867, 11868, 11985, 11986, 12144, 12145, 12157, 12176, 12177, 12215, 12216, 12530, 12531, 12750, 12751, 12764, 12814, 12815, 12816, 12990, 13148, 13294, 13490, 13538, 14041, 14187, 14393, 14558, 14575, 14602, 14603, 14604, 14856, 14857, 14874, 14887, 14888, 14889, 15068, 15069, 15307, 15308, 15571, 15572, 15698, 15699, 15993, 15994, 16007, 16079, 16080, 16081, 16393, 16394, 16414, 16434, 16435, 16436, 16751, 16752, 16907, 16908, 17037, 17038, 17243, 17244, 17341, 17342, 17354, 17401, 17402, 17428, 17429, 17616, 17617, 17831, 17832, 18282, 18283, 18895, 18896, 18908, 18917, 18918, 18919, 19116, 19117, 19309, 19310, 19701, 19702, 20211, 20212, 20227, 20263, 20264, 20320, 20321, 20691, 20692, 20982, 20983, 21600, 21601, 21615, 21628, 21629, 21804, 21805, 21931, 22371, 22430, 22431, 22598, 22599, 22643, 22768, 22939, 23024, 23120, 23136, 23137, 23208, 23209, 23455, 23456, 23668, 23669, 24319, 24320, 24333, 24371, 24372, 24410, 24411, 24673, 24674, 24774, 24775, 24977, 24978, 25393, 25394, 25704, 25705, 26092, 26093, 26201, 26202, 26297, 26298, 26465, 26466, 26476, 26541, 26542, 26543, 27087, 27088, 27104, 27142, 27303, 27349, 27363, 27468, 27469, 27481, 27482, 27503, 27504, 27697, 27698, 27832, 27833, 27849, 27850, 27886 ] }
{ "red_pajama_v2": { "ccnet_original_length": 27886, "ccnet_original_nlines": 291, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.4233589768409729, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.021641919389367104, "rps_doc_frac_lines_end_with_ellipsis": 0.01712328940629959, "rps_doc_frac_no_alph_words": 0.16079412400722504, "rps_doc_frac_unique_words": 0.29653066396713257, "rps_doc_mean_word_length": 4.790530204772949, "rps_doc_num_sentences": 315, "rps_doc_symbol_to_word_ratio": 0.003934899810701609, "rps_doc_unigram_entropy": 6.100811958312988, "rps_doc_word_count": 4583, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.022272830829024315, "rps_doc_frac_chars_dupe_6grams": 0.013345479965209961, "rps_doc_frac_chars_dupe_7grams": 0.009883849881589413, "rps_doc_frac_chars_dupe_8grams": 0.005830110050737858, "rps_doc_frac_chars_dupe_9grams": 0.005830110050737858, "rps_doc_frac_chars_top_2gram": 0.004554769955575466, "rps_doc_frac_chars_top_3gram": 0.0021862899884581566, "rps_doc_frac_chars_top_4gram": 0.0032794401049613953, "rps_doc_books_importance": -1802.44482421875, "rps_doc_books_importance_length_correction": -1802.44482421875, "rps_doc_openwebtext_importance": -1207.7022705078125, "rps_doc_openwebtext_importance_length_correction": -1207.7022705078125, "rps_doc_wikipedia_importance": -931.1586303710938, "rps_doc_wikipedia_importance_length_correction": -931.1586303710938 }, "fasttext": { "dclm": 0.07145755738019943, "english": 0.9544664025306702, "fineweb_edu_approx": 2.0577807426452637, "eai_general_math": 0.727492094039917, "eai_open_web_math": 0.34064602851867676, "eai_web_code": 0.34046101570129395 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.133", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.452", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "2", "label": "Click Here References" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "16", "label": "Personal Blog" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "6", "label": "Not Applicable/Indeterminate" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-1,425,368,536,726,995,700
© ebm-papst The formula for the overall effi­ciency of turbo­com­pres­sors The higher the overall effi­ciency of a turbo compressor, the less elec­trical energy it needs to do the same work, but the effi­ciency of each indi­vidual compo­nent is crucial. Ahmet Çokşen, Group Leader Product Manage­ment (Photo | ebm-papst) If you want to save money and energy with your fans, motors, and turbo compres­sors, effi­ciency – or η – is prob­ably the most impor­tant indi­cator. After all, it shows how effi­ciently machines can convert power input into useful power output. If effi­ciency is high, a large propor­tion of power input gets to where it is supposed to go. If, on the other hand, it is low, power is mainly lost as waste heat. The effi­ciency referred to in this attrac­tive formula is the overall effi­ciency ηoverall of an oil-free turbo compressor. It is the math­e­mat­ical product of many other effi­cien­cies, namely of each indi­vidual compo­nent that delivers power when compressing refrig­er­ants and other gases. This includes upstream power elec­tronics ­(ηPower­Elec­tronics), which control and transmit the elec­tric current to the motor, as well as the motor (ηMotor), which converts the elec­trical energy into mechan­ical energy. The effi­ciency of the oil-free gas bear­ings (­ηGasBearing) is also impor­tant. This is because it provides infor­ma­tion on how smoothly the rotor is running, in terms of power loss and wear, with the compressor impeller in the bearing, in order to rotate at up to 300,000 revo­lu­tions per minute and compress gases effi­ciently. The last piece of the puzzle for calcu­lating the overall effi­ciency of a compressor is the effi­ciency of the compressor stage with the compressor impeller (­PAero­dy­namics). Compared with the other compo­nents, this formula breaks down exactly how this effi­ciency is made up. First, the ideal power consump­tion of the compressor stage (PAero,isen) – i.e. the power that the stage could provide if there were no losses. This compressor map for the refrig­erant propane (R290) shows the overall effi­ciency of a compressor, with red repre­senting high effi­ciency, and blue low effi­ciency. The diagram shows the speeds (black lines), pres­sure ratios (Y-axis) and refrig­erant flow rates per second (X-axis) at which the compressor works most effi­ciently. (Photo | ebm-papst) Second, the actual power consump­tion (PAero) and the power loss due to leakage (PLeakage). The ratio of the ideal power to the power actu­ally used, including leakage, is then used to describe the effi­ciency of the compressor stage. Finally, the effi­cien­cies of all the compo­nents can be multi­plied together. The result is the overall effi­ciency of the turbo compressor: a value between 0 and 1. A result of 0.7 means that the turbo compressor uses 70 percent of the power used to compress gases. Required fields: Comment, Name & Mail (Mail will not be published). Please also take note of our Privacy protection.
{ "url": "https://mag.ebmpapst.com/en/insights/the-formula-for-the-overall-efficiency-of-turbocompressors_19168/", "source_domain": "mag.ebmpapst.com", "snapshot_id": "CC-MAIN-2024-22", "warc_metadata": { "Content-Length": "60443", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:AD7CBILFGMCYUAJXKDVJJUZ2OA5VYNAQ", "WARC-Concurrent-To": "<urn:uuid:00db0560-cb1f-4cca-bc54-8386b120b97b>", "WARC-Date": "2024-05-22T02:58:50Z", "WARC-IP-Address": "178.77.84.232", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:6LPL6CUL7JT3O44HTJOFI5OPQB4I5SQ5", "WARC-Record-ID": "<urn:uuid:6759c3b8-20d4-421f-8cce-f909a75e45e5>", "WARC-Target-URI": "https://mag.ebmpapst.com/en/insights/the-formula-for-the-overall-efficiency-of-turbocompressors_19168/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c9ac29d8-4a04-43e9-8924-91a3033e676f>" }, "warc_info": "isPartOf: CC-MAIN-2024-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-184\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 12, 13, 76, 77, 256, 257, 258, 325, 326, 738, 739, 1035, 1036, 1592, 1593, 2018, 2019, 2376, 2377, 2881, 2882 ], "line_end_idx": [ 12, 13, 76, 77, 256, 257, 258, 325, 326, 738, 739, 1035, 1036, 1592, 1593, 2018, 2019, 2376, 2377, 2881, 2882, 2998 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2998, "ccnet_original_nlines": 21, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3104434907436371, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.005722459871321917, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.24177396297454834, "rps_doc_frac_unique_words": 0.4708423316478729, "rps_doc_mean_word_length": 5.246220111846924, "rps_doc_num_sentences": 25, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.742300033569336, "rps_doc_word_count": 463, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.0658707320690155, "rps_doc_frac_chars_dupe_6grams": 0.05599011853337288, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.04816797003149986, "rps_doc_frac_chars_top_3gram": 0.05187319964170456, "rps_doc_frac_chars_top_4gram": 0.04734459146857262, "rps_doc_books_importance": -318.3034973144531, "rps_doc_books_importance_length_correction": -318.3034973144531, "rps_doc_openwebtext_importance": -171.56170654296875, "rps_doc_openwebtext_importance_length_correction": -171.56170654296875, "rps_doc_wikipedia_importance": -129.3864288330078, "rps_doc_wikipedia_importance_length_correction": -129.3864288330078 }, "fasttext": { "dclm": 0.6736148595809937, "english": 0.899413526058197, "fineweb_edu_approx": 2.375976085662842, "eai_general_math": 0.8536497354507446, "eai_open_web_math": 0.5588661432266235, "eai_web_code": 0.07183439284563065 } }
{ "free_decimal_correspondence": { "primary": { "code": "621.8322", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } }, "secondary": { "code": "621.832", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-1,190,892,622,769,207,000
Stack Overflow is a community of 4.7 million programmers, just like you, helping each other. Join them; it only takes a minute: Sign up Join the Stack Overflow community to: 1. Ask programming questions 2. Answer and help your peers 3. Get recognized for your expertise I'm working with a process that uses the Drive API to upload plain text files to Google Drive. The process frequently hits rate limit exceptions even though the actual number of requests is nowhere near the per-user limit for the Drive API set in the APIs console. In fact, setting the per-user limit doesn't seem to affect the rate in which we receive exceptions. Is there some other limit (other than the per-user limit) that is governing how many requests can be made per second? Can it be adjusted? The process uses exponential back-off on these exceptions, so the actions are eventually successful. We're only making about 5 or so requests per second and the per-user limit is set to 100. Caused by: com.google.api.client.googleapis.json.GoogleJsonResponseException: 403 Forbidden { "code" : 403, "errors" : [ { "domain" : "usageLimits", "message" : "Rate Limit Exceeded", "reason" : "rateLimitExceeded" } ], "message" : "Rate Limit Exceeded" } EDIT: Here is a "simplified" version of the code from the developer. We are using the service account with domain delegation as described at: https://developers.google.com/drive/delegation. package com.seto.fs.daemon; import java.io.File; import java.io.FileOutputStream; import java.io.IOException; import java.util.ArrayList; import java.util.Arrays; import java.util.Collections; import java.util.List; import java.util.concurrent.atomic.AtomicInteger; import com.google.api.client.auth.oauth2.Credential; import com.google.api.client.googleapis.auth.oauth2.GoogleCredential; import com.google.api.client.googleapis.javanet.GoogleNetHttpTransport; import com.google.api.client.googleapis.json.GoogleJsonResponseException; import com.google.api.client.http.FileContent; import com.google.api.client.http.HttpBackOffIOExceptionHandler; import com.google.api.client.http.HttpBackOffUnsuccessfulResponseHandler; import com.google.api.client.http.HttpBackOffUnsuccessfulResponseHandler.BackOffRequired; import com.google.api.client.http.HttpRequest; import com.google.api.client.http.HttpRequestInitializer; import com.google.api.client.http.HttpResponse; import com.google.api.client.http.HttpTransport; import com.google.api.client.json.JsonFactory; import com.google.api.client.json.jackson2.JacksonFactory; import com.google.api.client.testing.util.MockBackOff; import com.google.api.client.util.DateTime; import com.google.api.client.util.ExponentialBackOff; import com.google.api.services.drive.Drive; import com.google.api.services.drive.Drive.Files.Insert; import com.google.api.services.drive.DriveScopes; import com.google.api.services.drive.model.ChildList; import com.google.api.services.drive.model.ChildReference; import com.google.api.services.drive.model.File.Labels; import com.google.api.services.drive.model.ParentReference; public class Test { private static final int testFilesCount = 100; private static final int threadsCount = 3; private static final AtomicInteger rateLimitErrorsCount = new AtomicInteger(0); private static final String impersonatedUser = "<impersonatedUserEmail>"; private static final String serviceAccountID = "<some-id>@developer.gserviceaccount.com"; private static final String serviceAccountPK = "/path/to/<public_key_fingerprint>-privatekey.p12"; public static void main(String[] args) throws Exception { // Create HTTP transport HttpTransport httpTransport = GoogleNetHttpTransport.newTrustedTransport(); // Create JsonFactory final JsonFactory jsonFactory = new JacksonFactory(); // Create Google credential for service account final Credential credential = new GoogleCredential.Builder() .setTransport(httpTransport) .setJsonFactory(jsonFactory) .setServiceAccountScopes(Arrays.asList(DriveScopes.DRIVE)) .setServiceAccountUser(impersonatedUser) .setServiceAccountId(serviceAccountID) .setServiceAccountPrivateKeyFromP12File(new File(serviceAccountPK)) .build(); // Create Drive client final Drive drive = new Drive.Builder(httpTransport, jsonFactory, new HttpRequestInitializer() { public void initialize(HttpRequest request) throws IOException { request.setContentLoggingLimit(0); request.setCurlLoggingEnabled(false); // Authorization initialization credential.initialize(request); // Exponential Back-off for 5xx response and 403 rate limit exceeded error HttpBackOffUnsuccessfulResponseHandler serverErrorHandler = new HttpBackOffUnsuccessfulResponseHandler(new ExponentialBackOff.Builder().build()); serverErrorHandler.setBackOffRequired(new BackOffRequired() { public boolean isRequired(HttpResponse response) { return response.getStatusCode() / 100 == 5 || (response.getStatusCode() == 403 && isRateLimitExceeded( GoogleJsonResponseException.from(jsonFactory, response))); } }); request.setUnsuccessfulResponseHandler(serverErrorHandler); // Back-off for socket connection error MockBackOff backOff = new MockBackOff(); backOff.setBackOffMillis(2000); backOff.setMaxTries(5); request.setIOExceptionHandler(new HttpBackOffIOExceptionHandler(backOff)); } }).setApplicationName("GoogleDriveUploadFile/1.0").build(); // Get root folder id final String rootFolderId = drive.about().get().execute().getRootFolderId(); // Query all children under root folder ChildList result = drive.children().list(rootFolderId).execute(); // Delete all children under root folder for (ChildReference child : result.getItems()) { System.out.println("Delete child: " + child.getId()); drive.files().delete(child.getId()).execute(); } // Create a drive folder com.google.api.services.drive.model.File folderMetadata = new com.google.api.services.drive.model.File(); folderMetadata.setMimeType("application/vnd.google-apps.folder") .setParents(Arrays.asList(new ParentReference().setId(rootFolderId))) .setTitle("DriveTestFolder"); final com.google.api.services.drive.model.File driveTestFolder = drive.files().insert(folderMetadata).execute(); // Create test files final List<File> testFiles = Collections.synchronizedList(createTestFiles()); // Run threads to upload files to drive List<Thread> threads = new ArrayList<Thread>(); for (int i = 0; i < threadsCount; i++) { Thread thread = new Thread(new Runnable() { public void run() { while (testFiles.size() > 0) { try { File testFile = testFiles.remove(0); // The file meta data com.google.api.services.drive.model.File fileMetadata = new com.google.api.services.drive.model.File() .setTitle(testFile.getName()).setParents(Arrays.asList(new ParentReference().setId(driveTestFolder.getId()))) .setLabels(new Labels().setRestricted(false)).setMimeType("text/plain") .setModifiedDate(new DateTime(testFile.lastModified())) .setDescription("folder:MyDrive " + testFile.getName()); // Insert to drive FileContent fileContent = new FileContent("text/plain", testFile); Insert insertFileCommand = drive.files().insert(fileMetadata, fileContent) .setUseContentAsIndexableText(true); insertFileCommand.getMediaHttpUploader().setDirectUploadEnabled(true); insertFileCommand.execute(); System.out.println(testFile.getName() + " is uploaded"); } catch (IOException e) { e.printStackTrace(); } catch (IndexOutOfBoundsException e) { // ignore } } } }); threads.add(thread); } long startTime = System.currentTimeMillis(); for (Thread thread : threads) { thread.start(); } for (Thread thread : threads) { thread.join(); } System.out.println("Total time spent: " + (System.currentTimeMillis() - startTime) + "ms for " + testFilesCount + " files with " + threadsCount + " threads"); System.out.println("Rate limit errors hit: " + rateLimitErrorsCount.intValue()); } private static List<File> createTestFiles() throws Exception { // Create test files directory File testFolder = new File("TestFiles"); testFolder.mkdir(); // Create test files List<File> testFiles = new ArrayList<File>(); for (int i = 0; i < testFilesCount; i++) { File testFile = new File("TestFiles/" + i + ".txt"); FileOutputStream fops = new FileOutputStream(testFile); fops.write(testFile.getAbsolutePath().getBytes()); fops.close(); testFiles.add(testFile); } return testFiles; } private static boolean isRateLimitExceeded(GoogleJsonResponseException ex) { boolean result = false; if (ex.getDetails() != null && ex.getDetails().getErrors() != null && ex.getDetails().getErrors().size() > 0) { String reason = ex.getDetails().getErrors().get(0).getReason(); result = "rateLimitExceeded".equals(reason) || "userRateLimitExceeded".equals(reason); if (result) { rateLimitErrorsCount.incrementAndGet(); System.err.println("Rate limit error"); } } return result; } } EDIT: We hit this exception when we use a single thread and put a 500 millisecond delay between each call. It looks like it is impossible to get anywhere near the per-user rate we have configured. Even the default 10 requests per second looks to be impossible. Why? share|improve this question      Did you find a fix for this? I'm having the same problem, and Steve's accepted answer below is a little light on detail :-) – davidf2281 Oct 18 '13 at 19:13      At the time, the lower limit was declared to be 3 requests per second for uploads. Unfortunately there's also double counting occurring on requests, so the effective upload limit is 1.5 upload requests per second. I am unsure if this has changed at all recently. – Juggler Kris Oct 18 '13 at 22:32      Thanks for the reply; I've spent the day today transitioning the whole app to Amazon S3 instead. The API is fantastic and everything now just works. It absolutely c**ps on Google Drive. – davidf2281 Oct 20 '13 at 1:24      any update on this? I'm in the same boat... nowhere near the allowed usage quota I see in the console, yet getting many errors. – mmcrae Feb 3 '15 at 20:47 up vote 2 down vote accepted There is a lower limit specifically for uploads, and it's per-user across all apps. Will see if we can post the limit in docs. share|improve this answer      What are the per-user upload limit? I can't find it. Is it possible to configure or change this? As a paying domain customer, is this possible to change? – Andreas Mattisson Apr 22 '14 at 19:47      any update on this? I check in the API console and everything looks well below the allowes requests/sec -- yet I'm getting an inordinate amount of 403 rateLimit exceptions. I'm honestly stunned it's not shown in the docs rather than have people figure it out on their own.... – mmcrae Feb 3 '15 at 20:45      is this present in the docs now? – mmcrae Apr 29 '15 at 22:11 It means something is wrong in your configuration. You can use Drive API with low quota like what you are experiencing even when your API configuration is wrong. 1. Please check if you turned on Drive API in APIs Console > Services 2. Please check if you use correct API key or authorization flow. If you still cannot find what causes you this error, please attach minimum code to reproduce this error. share|improve this answer      Thanks for your reply! The Drive API is turned on. Without that on we wouldn't be able to adjust the quotas. We'll look again at the API keys. – Juggler Kris Jul 9 '13 at 19:47      What could be wrong that would still allow some of the requests to be successful? What should we be looking for? – Juggler Kris Jul 9 '13 at 20:20      Please validate your access token by GETing googleapis.com/oauth2/v1/tokeninfo?access_token=[yourtoken] – Burcu Dogan Jul 10 '13 at 9:16      I hit that URL with the token the process requested. It returns the following. { "issued_to": "46454168024.apps.googleusercontent.com", "audience": "46454168024.apps.googleusercontent.com", "scope": "googleapis.com/auth/drive";, "expires_in": 3426, "access_type": "offline" } – Juggler Kris Jul 10 '13 at 18:15 1   @BurcuDogan, would it help if we requested more drive quota using the user interface even though we're not getting anywhere close to what our current setting is? – Juggler Kris Jul 12 '13 at 20:40 Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
{ "url": "http://stackoverflow.com/questions/17536416/raising-google-drive-api-per-user-limit-does-not-prevent-rate-limit-exceptions?answertab=votes", "source_domain": "stackoverflow.com", "snapshot_id": "crawl=CC-MAIN-2016-07", "warc_metadata": { "Content-Length": "103812", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:H4EZ3MUF2UNP563B76Q2B5TSIBYOOA64", "WARC-Concurrent-To": "<urn:uuid:a2223003-b688-4f4c-a434-e77d5255b6fd>", "WARC-Date": "2016-02-14T19:01:55Z", "WARC-IP-Address": "104.16.36.249", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:NM5GHLDL54HJACGEV6TMQYO3O2PEX3Z2", "WARC-Record-ID": "<urn:uuid:2c9008d3-2061-4c2f-9624-406d3aa53015>", "WARC-Target-URI": "http://stackoverflow.com/questions/17536416/raising-google-drive-api-per-user-limit-does-not-prevent-rate-limit-exceptions?answertab=votes", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:ff6ae940-fe89-492f-9f60-7e8644e25640>" }, "warc_info": "robots: classic\r\nhostname: ip-10-236-182-209.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-07\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for February 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 93, 94, 129, 130, 138, 176, 207, 239, 278, 279, 782, 783, 974, 975, 1067, 1069, 1085, 1102, 1132, 1171, 1206, 1213, 1249, 1251, 1252, 1442, 1443, 1471, 1472, 1493, 1526, 1554, 1582, 1607, 1637, 1660, 1710, 1711, 1764, 1834, 1906, 1980, 2027, 2092, 2166, 2256, 2303, 2361, 2409, 2458, 2505, 2564, 2619, 2663, 2717, 2761, 2818, 2868, 2922, 2981, 3037, 3097, 3098, 3099, 3119, 3170, 3217, 3301, 3302, 3380, 3474, 3577, 3578, 3640, 3673, 3757, 3787, 3849, 3850, 3906, 3975, 4020, 4065, 4140, 4197, 4252, 4336, 4362, 4363, 4394, 4499, 4576, 4627, 4681, 4682, 4730, 4778, 4779, 4870, 4944, 5052, 5130, 5201, 5268, 5356, 5451, 5473, 5493, 5569, 5570, 5626, 5683, 5731, 5771, 5862, 5876, 5944, 5945, 5975, 6060, 6061, 6109, 6183, 6184, 6233, 6290, 6356, 6415, 6425, 6426, 6459, 6523, 6585, 6658, 6740, 6782, 6903, 6904, 6933, 7019, 7020, 7068, 7124, 7173, 7229, 7265, 7316, 7346, 7411, 7412, 7462, 7546, 7625, 7767, 7871, 7959, 8048, 8049, 8096, 8191, 8294, 8367, 8466, 8467, 8524, 8525, 8610, 8660, 8709, 8773, 8811, 8837, 8859, 8877, 8893, 8926, 8936, 8937, 8990, 8991, 9031, 9059, 9069, 9070, 9110, 9137, 9147, 9148, 9239, 9331, 9420, 9426, 9427, 9494, 9495, 9534, 9583, 9611, 9612, 9641, 9695, 9746, 9811, 9879, 9942, 9968, 10005, 10015, 10041, 10047, 10048, 10129, 10161, 10236, 10297, 10373, 10472, 10498, 10554, 10610, 10624, 10634, 10635, 10658, 10664, 10665, 10667, 10668, 10934, 10935, 10963, 10968, 11125, 11130, 11428, 11433, 11651, 11656, 11812, 11841, 11842, 11969, 11970, 11996, 12001, 12195, 12200, 12504, 12509, 12571, 12572, 12734, 12735, 12807, 12875, 12876, 12981, 12982, 13008, 13013, 13190, 13195, 13342, 13347, 13484, 13489, 13800, 13804, 14001, 14002, 14014, 14015, 14017, 14025, 14026, 14104, 14105 ], "line_end_idx": [ 93, 94, 129, 130, 138, 176, 207, 239, 278, 279, 782, 783, 974, 975, 1067, 1069, 1085, 1102, 1132, 1171, 1206, 1213, 1249, 1251, 1252, 1442, 1443, 1471, 1472, 1493, 1526, 1554, 1582, 1607, 1637, 1660, 1710, 1711, 1764, 1834, 1906, 1980, 2027, 2092, 2166, 2256, 2303, 2361, 2409, 2458, 2505, 2564, 2619, 2663, 2717, 2761, 2818, 2868, 2922, 2981, 3037, 3097, 3098, 3099, 3119, 3170, 3217, 3301, 3302, 3380, 3474, 3577, 3578, 3640, 3673, 3757, 3787, 3849, 3850, 3906, 3975, 4020, 4065, 4140, 4197, 4252, 4336, 4362, 4363, 4394, 4499, 4576, 4627, 4681, 4682, 4730, 4778, 4779, 4870, 4944, 5052, 5130, 5201, 5268, 5356, 5451, 5473, 5493, 5569, 5570, 5626, 5683, 5731, 5771, 5862, 5876, 5944, 5945, 5975, 6060, 6061, 6109, 6183, 6184, 6233, 6290, 6356, 6415, 6425, 6426, 6459, 6523, 6585, 6658, 6740, 6782, 6903, 6904, 6933, 7019, 7020, 7068, 7124, 7173, 7229, 7265, 7316, 7346, 7411, 7412, 7462, 7546, 7625, 7767, 7871, 7959, 8048, 8049, 8096, 8191, 8294, 8367, 8466, 8467, 8524, 8525, 8610, 8660, 8709, 8773, 8811, 8837, 8859, 8877, 8893, 8926, 8936, 8937, 8990, 8991, 9031, 9059, 9069, 9070, 9110, 9137, 9147, 9148, 9239, 9331, 9420, 9426, 9427, 9494, 9495, 9534, 9583, 9611, 9612, 9641, 9695, 9746, 9811, 9879, 9942, 9968, 10005, 10015, 10041, 10047, 10048, 10129, 10161, 10236, 10297, 10373, 10472, 10498, 10554, 10610, 10624, 10634, 10635, 10658, 10664, 10665, 10667, 10668, 10934, 10935, 10963, 10968, 11125, 11130, 11428, 11433, 11651, 11656, 11812, 11841, 11842, 11969, 11970, 11996, 12001, 12195, 12200, 12504, 12509, 12571, 12572, 12734, 12735, 12807, 12875, 12876, 12981, 12982, 13008, 13013, 13190, 13195, 13342, 13347, 13484, 13489, 13800, 13804, 14001, 14002, 14014, 14015, 14017, 14025, 14026, 14104, 14105, 14195 ] }
{ "red_pajama_v2": { "ccnet_original_length": 14195, "ccnet_original_nlines": 277, "rps_doc_curly_bracket": 0.0033814699854701757, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.1919230818748474, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.010384620167315006, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.38769230246543884, "rps_doc_frac_unique_words": 0.4465709626674652, "rps_doc_mean_word_length": 7.654705047607422, "rps_doc_num_sentences": 376, "rps_doc_symbol_to_word_ratio": 0.0007692300132475793, "rps_doc_unigram_entropy": 5.8194684982299805, "rps_doc_word_count": 1254, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.014584849588572979, "rps_doc_frac_chars_dupe_6grams": 0.00729242991656065, "rps_doc_frac_chars_dupe_7grams": 0.004167099948972464, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.010834460146725178, "rps_doc_frac_chars_top_3gram": 0.011251170188188553, "rps_doc_frac_chars_top_4gram": 0.006250650156289339, "rps_doc_books_importance": -1218.7310791015625, "rps_doc_books_importance_length_correction": -1218.7310791015625, "rps_doc_openwebtext_importance": -549.7752685546875, "rps_doc_openwebtext_importance_length_correction": -549.7752685546875, "rps_doc_wikipedia_importance": -254.95065307617188, "rps_doc_wikipedia_importance_length_correction": -254.95065307617188 }, "fasttext": { "dclm": 0.519159197807312, "english": 0.6077381372451782, "fineweb_edu_approx": 1.4119387865066528, "eai_general_math": 0.06096458062529564, "eai_open_web_math": 0.08410102128982544, "eai_web_code": 0.023240510374307632 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.678", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
2,524,219,744,429,636,600
5 Moves That Could Help You Get A Perkier Chest Work the muscles everyone else is ignoring. July 7, 2017 best chest exercises for women over 40 Dolly Renick/Model Susanna Kalnes After a certain age, many women start to notice that some things—and two things in particular—start going south. A bit of breast sagging is, unfortunately, a fact of life, because the tissue that helps the girls hold their shape naturally changes as you get older: Ligaments stretch out, gravity takes its toll, and hormonal changes (especially once you're past menopause, around age 50) make breast tissue less dense. But all is not lost. While breasts themselves don't contain muscle, there are muscles behind them—and exercising them can make all the difference. The problem is that women often ignore chest muscles in their regular workout routines, says Susanna Kalnes a certified Master Trainer (she trains trainers!) based in San Francisco. "I think women might feel like if they work their chest muscles they'll lose their breasts," says Kalnes, "but if you build those muscles you actually get a perkier bust!" Considering that you also naturally lose some muscle tone as you age, ignoring the chest muscles only leads to worse sagging, she says. So what are you waiting for? Try doing these five exercises three times a week, with at least a day off in between. If you're not used to exercising these crucial chest muscles, don't be surprised if you're sore at the beginning, Kalnes says. Try to do 3 sets of 8 to 12 reps of each move using weights that feel heavy but that allow you to maintain good form throughout the exercise. (Hit the reset button—and burn fat like crazy with The Body Clock Diet!) bench press 1/5 Dolly Renick/Model Susanna Kalnes 1. Bench Press Lie on your back on a bench, step, BOSU ball (like this one from amazon.com), or exercise ball with knees bent. With your knuckles facing up, push the dumbbells away, then bend your elbows to bring your arms down to your sides, allowing your elbows to dip slightly below your bench or ball. "Instead of thinking about lifting the weight, really focus on pushing, which will put more emphasis on your chest muscles than your arms," Kalnes says. RELATED: 8 Most Effective Exercises For Weight Loss chest fly 2/5 Dolly Renick/Model Susanna Kalnes 2. Chest Fly Starting in the same position, bring your arms out to the side with a slight bend in the elbows, palms facing up. Squeeze the chest muscles together to lift the weights, bringing your arms toward each other to tap the weights together in front of you. "This will give you great cleavage," Kalnes says. (Add this super effective triceps move to tone up and burn fat.) straight arm pullover 3/5 Dolly Renick/Model Susanna Kalnes 3. Straight Arm Pullover While on your back, lower one dumbbell and grasp the other with both hands in front of you. With elbows locked, slowly lower your hands behind your head until your ears are between your biceps, then lift back up with the chest muscles. This is a challenging move, so use a lighter weight if this feels too difficult, says Kalnes. RELATED: 4 Foods That Burn Belly Fat incline pushup 4/5 Dolly Renick/Model Susanna Kalnes 4. Incline Push-ups Elevating your hands makes this riff on the classic push-up a little bit easier. Place your hands on a bench or step slightly further than shoulder-width apart to target the chest muscles instead of the triceps. Your legs should be straight behind you in plank position. Keep your core tight and lower your body down, then push back up. You don't need a lot of equipment—or any at all—to get fit. Check out these 19 bodyweight exercises: renegade row 5/5 Dolly Renick/Model Susanna Kalnes 5. Renegade row When you're exercising your front, don't neglect your back. "Working the upper back and chest at the same time will make the upper body more perky in general," Kalnes says. Place two dumbbells a little further than shoulder-width apart on the floor and grab on. Lift your body into plank position with your legs extra wide for balance. Bend your right elbow and pull the weight to your ribcage, balancing on your left hand. Lower the weight back down, then repeat with your left arm. This also works your core, Kalnes says. If it feels too challenging at first, you can start by balancing on your knees instead of your toes. The article The Best Moves For A Perkier Chest After 40 originally appeared on Prevention. See Next Advertisement Advertisement Tags: Workouts
{ "url": "https://www.womenshealthmag.com/fitness/best-chest-exercises-after-40", "source_domain": "www.womenshealthmag.com", "snapshot_id": "crawl=CC-MAIN-2017-39", "warc_metadata": { "Content-Length": "125848", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:M7BB557MSPAQSSGDNIT6IAS6RKVSE2PJ", "WARC-Concurrent-To": "<urn:uuid:fdf96def-e923-4ae5-aa27-1d342bed1a6e>", "WARC-Date": "2017-09-22T15:14:42Z", "WARC-IP-Address": "104.16.135.154", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:2PUKIQRNYSFLOHO7E3R6IPCHA7HKBBHU", "WARC-Record-ID": "<urn:uuid:e112654f-466a-4a91-bcbf-1a38fa4606ed>", "WARC-Target-URI": "https://www.womenshealthmag.com/fitness/best-chest-exercises-after-40", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:95b102ae-0b17-4222-8330-776d3bf16e9d>" }, "warc_info": "robots: classic\r\nhostname: ip-10-31-57-149.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 48, 49, 93, 94, 107, 146, 180, 181, 600, 601, 930, 931, 1239, 1240, 1625, 1626, 1699, 1700, 1712, 1750, 1765, 1766, 2210, 2211, 2263, 2264, 2274, 2312, 2325, 2326, 2693, 2694, 2716, 2754, 2779, 2780, 3110, 3111, 3148, 3149, 3164, 3202, 3222, 3223, 3560, 3561, 3662, 3663, 3676, 3714, 3730, 3731, 4356, 4357, 4448, 4449, 4458, 4472, 4486 ], "line_end_idx": [ 48, 49, 93, 94, 107, 146, 180, 181, 600, 601, 930, 931, 1239, 1240, 1625, 1626, 1699, 1700, 1712, 1750, 1765, 1766, 2210, 2211, 2263, 2264, 2274, 2312, 2325, 2326, 2693, 2694, 2716, 2754, 2779, 2780, 3110, 3111, 3148, 3149, 3164, 3202, 3222, 3223, 3560, 3561, 3662, 3663, 3676, 3714, 3730, 3731, 4356, 4357, 4448, 4449, 4458, 4472, 4486, 4500 ] }
{ "red_pajama_v2": { "ccnet_original_length": 4500, "ccnet_original_nlines": 59, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3744635283946991, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.007510730065405369, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.17060086131095886, "rps_doc_frac_unique_words": 0.4564369320869446, "rps_doc_mean_word_length": 4.648894786834717, "rps_doc_num_sentences": 45, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.385654449462891, "rps_doc_word_count": 769, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.026853149756789207, "rps_doc_frac_chars_top_3gram": 0.03860139846801758, "rps_doc_frac_chars_top_4gram": 0.048671331256628036, "rps_doc_books_importance": -449.2948303222656, "rps_doc_books_importance_length_correction": -449.2948303222656, "rps_doc_openwebtext_importance": -257.1329650878906, "rps_doc_openwebtext_importance_length_correction": -257.1329650878906, "rps_doc_wikipedia_importance": -186.12826538085938, "rps_doc_wikipedia_importance_length_correction": -186.12826538085938 }, "fasttext": { "dclm": 0.23587721586227417, "english": 0.9287309050559998, "fineweb_edu_approx": 2.1416170597076416, "eai_general_math": 0.007515369914472103, "eai_open_web_math": 0.10244805365800858, "eai_web_code": 0.002607049886137247 } }
{ "free_decimal_correspondence": { "primary": { "code": "613.712", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Health and Hygiene" } }, "secondary": { "code": "613.71", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Health and Hygiene" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "12", "label": "Listicle" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
5,657,415,734,803,174,000
SciCombinator Discover the most talked about and latest scientific content & concepts. Concept: Symptom 174 While age and the APOE ε4 allele are major risk factors for Alzheimer’s disease (AD), a small percentage of individuals with these risk factors exhibit AD resilience by living well beyond 75 years of age without any clinical symptoms of cognitive decline. Concepts: Alzheimer's disease, DNA, Medicine, Gene, Genetics, Epidemiology, Symptom, Apolipoprotein E 172 Objective To investigate whether symptomatic treatment with non-steroidal anti-inflammatory drugs (NSAIDs) is non-inferior to antibiotics in the treatment of uncomplicated lower urinary tract infection (UTI) in women, thus offering an opportunity to reduce antibiotic use in ambulatory care.Design Randomised, double blind, non-inferiority trial.Setting 17 general practices in Switzerland.Participants 253 women with uncomplicated lower UTI were randomly assigned 1:1 to symptomatic treatment with the NSAID diclofenac (n=133) or antibiotic treatment with norfloxacin (n=120). The randomisation sequence was computer generated, stratified by practice, blocked, and concealed using sealed, sequentially numbered drug containers.Main outcome measures The primary outcome was resolution of symptoms at day 3 (72 hours after randomisation and 12 hours after intake of the last study drug). The prespecified principal secondary outcome was the use of any antibiotic (including norfloxacin and fosfomycin as trial drugs) up to day 30. Analysis was by intention to treat.Results 72/133 (54%) women assigned to diclofenac and 96/120 (80%) assigned to norfloxacin experienced symptom resolution at day 3 (risk difference 27%, 95% confidence interval 15% to 38%, P=0.98 for non-inferiority, P<0.001 for superiority). The median time until resolution of symptoms was four days in the diclofenac group and two days in the norfloxacin group. A total of 82 (62%) women in the diclofenac group and 118 (98%) in the norfloxacin group used antibiotics up to day 30 (risk difference 37%, 28% to 46%, P<0.001 for superiority). Six women in the diclofenac group (5%) but none in the norfloxacin group received a clinical diagnosis of pyelonephritis (P=0.03).Conclusion Diclofenac is inferior to norfloxacin for symptom relief of UTI and is likely to be associated with an increased risk of pyelonephritis, even though it reduces antibiotic use in women with uncomplicated lower UTI.Trial registration ClinicalTrials.gov NCT01039545. Concepts: Kidney, Urinary tract infection, Symptom, Symptomatic treatment, Non-steroidal anti-inflammatory drug, Diclofenac, Antibiotic, Ciprofloxacin 168 Solitary rectal ulcer syndrome (SRUS) is a benign and chronic disorder well known in young adults and less in children. It is often related to prolonged excessive straining or abnormal defecation and clinically presents as rectal bleeding, copious mucus discharge, feeling of incomplete defecation, and rarely rectal prolapse. SRUS is diagnosed based on clinical symptoms and endoscopic and histological findings. The current treatments are suboptimal, and despite correct diagnosis, outcomes can be unsatisfactory. Some treatment protocols for SRUS include conservative management such as family reassurance, regulation of toilet habits, avoidance of straining, encouragement of a high-fiber diet, topical treatments with salicylate, sulfasalazine, steroids and sucralfate, and surgery. In children, SRUS is relatively uncommon but troublesome and easily misdiagnosed with other common diseases, however, it is being reported more than in the past. This condition in children is benign; however, morbidity is an important problem as reflected by persistence of symptoms, especially rectal bleeding. In this review, we discuss current diagnosis and treatment for SRUS. Concepts: Medicine, Disease, Asthma, Medical terms, Surgery, Symptom, Rectum, Rectal prolapse 168 Hair-pulling disorder (trichotillomania, HPD) is a disabling condition that is characterized by repetitive hair-pulling resulting in hair loss. Although there is evidence of structural grey matter abnormalities in HPD, there is a paucity of data on white matter integrity. The aim of this study was to explore white matter integrity using diffusion tensor imaging (DTI) in subjects with HPD and healthy controls. Sixteen adult female subjects with HPD and 13 healthy female controls underwent DTI. Hair-pulling symptom severity, anxiety and depressive symptoms were also assessed. Tract-based spatial statistics were used to analyze data on fractional anisotropy (FA), mean diffusivity (MD), axial diffusivity (AD) and radial diffusivity (RD). There were no differences in DTI measures between HPD subjects and healthy controls. However, there were significant associations of increased MD in white matter tracts of the fronto-striatal-thalamic pathway with longer HPD duration and increased HPD severity. Our findings suggest that white matter integrity in fronto-striatal-thalamic pathways in HPD is related to symptom duration and severity. The molecular basis of measures of white matter integrity in HPD deserves further exploration. Concepts: Anxiety, Statistics, Symptoms, Symptom, White matter, Diffusion MRI, Imaging, Tensors 167 Chronic day-to-day symptoms of orthostatic intolerance are the most notable features of postural orthostatic tachycardia syndrome (POTS). However, we have encountered patients with such symptoms and excessive tachycardia but with no symptoms during the tilt-table test (TTT). We aimed to investigate whether POTS patients with chronic orthostatic intolerance always present orthostatic symptoms during the TTT and analyze the factors underlying symptom manifestation during this test. Concepts: Medical terms, Cardiology, Symptoms, Symptom, Orthostatic hypotension, Post-concussion syndrome, Postural orthostatic tachycardia syndrome, Orthostatic intolerance 165 BACKGROUND: To assess the clinical and laboratory parameters, response to therapy and development of antituberculosis (TB) drug resistance in pulmonary TB (PTB) patients with diabetes mellitus (DM) and without DM. METHODS: Using a prospective design, 227 of 310 new cases of culture-positive PTB diagnosed at the Queen Savang Vadhana Memorial Hospital and the Chonburi Hospital between April 2010 and July 2012 that met the study criteria were selected. Data regarding clinical and laboratory parameters, drug susceptibility and treatment outcomes were compared between PTB patients with DM and those without DM. To control for age, the patients were stratified into two age groups (< 50 and ≥ 50 years) and their data were analysed. RESULTS: Of the 227 patients, 37 (16.3%) had DM, of which 26 (70.3%) had been diagnosed with DM prior to PTB diagnosis and 11 (29.7%) had developed DM at PTB diagnosis. After controlling for age, no significant differences were found between the two groups regarding mycobacterium burden, sputum-culture conversion rate, evidence of multidrug-resistant tuberculosis, frequency of adverse drug events from anti-TB medications, treatment outcomes and relapse rate. The presenting symptoms of anorexia (p = 0.050) and haemoptysis (p = 0.036) were observed significantly more frequently in PTB patients with DM, while the presenting symptom of cough was observed significantly more frequently in PTB patients without DM (p = 0.047). CONCLUSIONS: Plasma glucose levels should be monitored in all newly diagnosed PTB patients and a similar treatment regimen should be prescribed to PTB patients with DM and those without DM in high TB-burden countries. Concepts: Pharmacology, Medical terms, Diabetes mellitus, The Canon of Medicine, Blood sugar, Symptoms, Symptom, Tuberculosis 163 Japanese encephalitis virus (JEV) causes acute central nervous system (CNS) disease in humans, in whom the clinical symptoms vary from febrile illness to meningitis and encephalitis. However, the mechanism of severe encephalitis has not been fully elucidated. In this study, using a mouse model, we investigated the pathogenetic mechanisms that correlate with fatal JEV infection. Following extraneural infection with the JaOArS982 strain of JEV, infected mice exhibited clinical signs ranging from mild to fatal outcome. Comparison of the pathogenetic response between severe and mild cases of JaOArS982-infected mice revealed increased levels of TNF-α in the brains of severe cases. However, unexpectedly, the mortality rate of TNF-α KO mice was significantly increased compared with that of WT mice, indicating that TNF-α plays a protective role against fatal infection. Interestingly, there were no significant differences of viral load in the CNS between WT and TNF-α KO mice. However, exaggerated inflammatory responses were observed in the CNS of TNF-α KO mice. Although these observations were also obtained in IL-10 KO mice, the mortality and enhanced inflammatory responses were more pronounced in TNF-α KO mice. Our findings therefore provide the first evidence that TNF-α has an immunoregulatory effect on pro-inflammatory cytokines in the CNS during JEV infection and consequently protects the animals from fatal disease. Thus, we propose that the increased level of TNF-α in severe cases was the result of severe disease, and secondly that immunopathological effects contribute to severe neuronal degeneration resulting in fatal disease. In future, further elucidation of the immunoregulatory mechanism of TNF-α will be an important priority to enable the development of effective treatment strategies for Japanese encephalitis. Concepts: Inflammation, Central nervous system, Nervous system, Brain, Infection, Symptom, Mouse, Encephalitis 151 Mast cell activation disease (MCAD) is a term referring to a heterogeneous group of disorders characterized by aberrant release of variable subsets of mast cell (MC) mediators together with accumulation of either morphologically altered and immunohistochemically identifiable mutated MCs due to MC proliferation (systemic mastocytosis [SM] and MC leukemia [MCL]) or morphologically ordinary MCs due to decreased apoptosis (MC activation syndrome [MCAS] and well-differentiated SM). Clinical signs and symptoms in MCAD vary depending on disease subtype and result from excessive mediator release by MCs and, in aggressive forms, from organ failure related to MC infiltration. In most cases, treatment of MCAD is directed primarily at controlling the symptoms associated with MC mediator release. In advanced forms, such as aggressive SM and MCL, agents targeting MC proliferation such as kinase inhibitors may be provided. Targeted therapies aimed at blocking mutant protein variants and/or downstream signaling pathways are currently being developed. Other targets, such as specific surface antigens expressed on neoplastic MCs, might be considered for the development of future therapies. Since clinicians are often underprepared to evaluate, diagnose, and effectively treat this clinically heterogeneous disease, we seek to familiarize clinicians with MCAD and review current and future treatment approaches. Concepts: Immune system, DNA, Protein, Cancer, Mast cell, Symptom, Medical sign, Mastocytosis 147 Clinical signs and symptoms of different airway pathogens are generally indistinguishable, making laboratory tests essential for clinical decisions regarding isolation and antiviral therapy. Immunochromatographic tests (ICT) and direct immunofluorescence assays (DFA) have lower sensitivities and specificities than molecular assays, but have the advantage of quick turnaround times and ease-of-use. Concepts: Virus, Chemistry, Symptom, Antiviral drug, Influenza, Assay, Medical sign, Human respiratory syncytial virus 57 Chronic fatigue syndrome (CFS) is a complex, multisystem disorder that can be disabling. CFS symptoms can be provoked by increased physical or cognitive activity, and by orthostatic stress. In preliminary work, we noted that CFS symptoms also could be provoked by application of longitudinal neural and soft tissue strain to the limbs and spine of affected individuals. In this study we measured the responses to a straight leg raise neuromuscular strain maneuver in individuals with CFS and healthy controls. We randomly assigned 60 individuals with CFS and 20 healthy controls to either a 15 minute period of passive supine straight leg raise (true neuromuscular strain) or a sham straight leg raise. The primary outcome measure was the symptom intensity difference between the scores during and 24 hours after the study maneuver compared to baseline. Fatigue, body pain, lightheadedness, concentration difficulties, and headache scores were measured individually on a 0-10 scale, and summed to create a composite symptom score. Compared to individuals with CFS in the sham strain group, those with CFS in the true strain group reported significantly increased body pain (P = 0.04) and concentration difficulties (P = 0.02) as well as increased composite symptom scores (all P = 0.03) during the maneuver. After 24 hours, the symptom intensity differences were significantly greater for the CFS true strain group for the individual symptom of lightheadedness (P = 0.001) and for the composite symptom score (P = 0.005). During and 24 hours after the exposure to the true strain maneuver, those with CFS had significantly higher individual and composite symptom intensity changes compared to the healthy controls. We conclude that a longitudinal strain applied to the nerves and soft tissues of the lower limb is capable of increasing symptom intensity in individuals with CFS for up to 24 hours. These findings support our preliminary observations that increased mechanical sensitivity may be a contributor to the provocation of symptoms in this disorder. Concepts: Symptoms, Symptom, Tissues, Soft tissue, Fatigue, Post-concussion syndrome, Chronic fatigue syndrome, Straight leg raise
{ "url": "http://scicombinator.com/concepts/symptom/articles", "source_domain": "scicombinator.com", "snapshot_id": "crawl=CC-MAIN-2018-26", "warc_metadata": { "Content-Length": "40475", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:WHBVINXQ6RAIVNNFFOWIIOCHZ2GB65O3", "WARC-Concurrent-To": "<urn:uuid:9f569744-5a16-4d80-8071-5e13bf32add5>", "WARC-Date": "2018-06-20T22:50:53Z", "WARC-IP-Address": "74.207.251.83", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:IFUKC5QM6D2XFQV4O5ZNMRRKYWJAY5YH", "WARC-Record-ID": "<urn:uuid:afdfe9ea-420c-4b7a-bb34-3b7d13766a8c>", "WARC-Target-URI": "http://scicombinator.com/concepts/symptom/articles", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:313beb4e-0a79-4506-9de6-15f86ca2db6d>" }, "warc_info": "robots: classic\r\nhostname: ip-10-138-114-107.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-26\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for June 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 14, 15, 88, 89, 106, 107, 111, 112, 368, 369, 471, 472, 476, 477, 2491, 2492, 2643, 2644, 2648, 2649, 3818, 3819, 3913, 3914, 3918, 3919, 5158, 5159, 5255, 5256, 5260, 5261, 5746, 5747, 5921, 5922, 5926, 5927, 7608, 7609, 7735, 7736, 7740, 7741, 9584, 9585, 9696, 9697, 9701, 9702, 11113, 11114, 11208, 11209, 11213, 11214, 11614, 11615, 11734, 11735, 11738, 11739, 13797, 13798 ], "line_end_idx": [ 14, 15, 88, 89, 106, 107, 111, 112, 368, 369, 471, 472, 476, 477, 2491, 2492, 2643, 2644, 2648, 2649, 3818, 3819, 3913, 3914, 3918, 3919, 5158, 5159, 5255, 5256, 5260, 5261, 5746, 5747, 5921, 5922, 5926, 5927, 7608, 7609, 7735, 7736, 7740, 7741, 9584, 9585, 9696, 9697, 9701, 9702, 11113, 11114, 11208, 11209, 11213, 11214, 11614, 11615, 11734, 11735, 11738, 11739, 13797, 13798, 13928 ] }
{ "red_pajama_v2": { "ccnet_original_length": 13928, "ccnet_original_nlines": 64, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.27092599868774414, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.05297210067510605, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.2126971334218979, "rps_doc_frac_unique_words": 0.3953370451927185, "rps_doc_mean_word_length": 5.810441017150879, "rps_doc_num_sentences": 95, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.930519104003906, "rps_doc_word_count": 1973, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.02512211911380291, "rps_doc_frac_chars_dupe_6grams": 0.018492670729756355, "rps_doc_frac_chars_dupe_7grams": 0.014305650256574154, "rps_doc_frac_chars_dupe_8grams": 0.0059316097758710384, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.006106069777160883, "rps_doc_frac_chars_top_3gram": 0.0069783697836101055, "rps_doc_frac_chars_top_4gram": 0.005233780015259981, "rps_doc_books_importance": -1279.0601806640625, "rps_doc_books_importance_length_correction": -1279.0601806640625, "rps_doc_openwebtext_importance": -575.9323120117188, "rps_doc_openwebtext_importance_length_correction": -575.9323120117188, "rps_doc_wikipedia_importance": -518.2636108398438, "rps_doc_wikipedia_importance_length_correction": -518.2636108398438 }, "fasttext": { "dclm": 0.023819509893655777, "english": 0.9323147535324097, "fineweb_edu_approx": 2.6872575283050537, "eai_general_math": 0.19748550653457642, "eai_open_web_math": 0.24647122621536255, "eai_web_code": 0.007170139811933041 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.858", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.852", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-5,107,322,178,861,581,000
Start New Discussion within our Web Development Community I want to save screenshot of any webpage using php. i search in google but i dont found any result for linux server. i got some window server result using imagegrabwindow() function. is their anotherway for linux server. i install one script with Class COM i which internet exp. open and take a screenshot. but how it will work in linux server thanks I'm not sure about directly creating this script from scratch but perhaps there might be an api that you can use. So try and google for a webpage screen capture api. hit print screen! :twisted: Chortle! Nice one. Thumbshots.org have a service. The imagegrab..() functions work with Windows (and only IE - *I think*). I could never get it to work. I always thought that getting a screenshot from an url was a big 'no-no', as it usually got info from the client's browser - this would pose a pretty horrible security risk. This could mean that a site could get my active window or desktop screenshot. Gawd, how would I explain that in my necrophiliacs anonymous sessions? Hi, Try this, <?php ## define your url ## change comments tags to the proper syntax as recommended by php.net. ## unless you are a developer, you can give reason why these ## are valid. ## even if the rest of the world would argue that it is wrong, ## it does not mean it is not valid. $url = "http://www.daniweb.com/web-development/php/threads/256243"; echo '<img src="http://open.thumbshots.org/image.aspx?url='.$url.'" width = "150" height = "150" />'; ?> That's exactly what I proposed and took this many posts to work that out. ya thanks for sharing this ,this is very good as i found this one... now is we want to save this screenshot in server side php. any idea how to do this...... @ amitgmail, Yes, you can save the thumbs if you want. There are two options in doing this. 1. You can use imagecreatefromjpeg. This method requires the allow_url_fopen must be ON in your php.ini file. The consequences of using this method is somewhat greater exposure to security holes if not use properly. I will not discuss the security vulnerability here about the url_fopen, because it will fill up this page. You can search url_fopen. This topic has been discussed in great detail in php security consortium. Anyone with proper knowledge of how to take advantage of this vulnerability can easily transfer malicious file on your server. Meaning, once it is transferred they can execute their codes. Here is how you will save the screenshots using the first option above..Let's use my example codes provided on the previous page of this thread. <?php ## define your url $url = "http://www.daniweb.com/web-development/php/threads/256243"; ## let's change the codes ## define the image url just for the purpose of displaying it on the page. $img_url = '<img src="http://open.thumbshots.org/image.aspx?url='.$url.'" width = "150" height = "150" />'; ## define the location of the image we are going to save. $img_url1 = 'http://open.thumbshots.org/image.aspx?url='.$url; ## let's show the screenshot echo $img_url; ## define the destination directory of the saved screenshot ## by the way I would like itemized everything here instead of writing them in condense form ## so that people who needs it, will easily understand these things. ## define the file name of the screenshot image and the directory. $img_dir ="test/whatever.jpg"; ## let's use the not-so-safe option one $save_img = @imagecreatefromjpeg($img_url1); ## let's save the above image ## the syntax below is just nothing but @imagejpeg("WHAT to save ","WHERE to save it") @imagejpeg($save_img, $img_dir); ?> 2. Now the second option which is a lot safer than the above implementation. This time we will be using cURL. cURL is a very powerful tool of PHP. Allow me to revise the above codes to implement cURL. <?php ## define your url $url = "http://www.daniweb.com/web-development/php/threads/256243"; ## let's change the codes ## define the image url just for the purpose of displaying it on the page. $img_url = '<img src="http://open.thumbshots.org/image.aspx?url='.$url.'" width = "150" height = "150" />'; ## define the location of the image we are going to save. $img_url1 = 'http://open.thumbshots.org/image.aspx?url='.$url; ## let's show the screenshot echo $img_url; ## define the destination directory of the saved screenshot ## by the way I would like itemized everything here instead of writing them in condense form ## so that people who needs it, will easily understand these things. ## define the file name of the screenshot image and the directory. $img_dir ="test/whatever.jpg"; ## once again it is your job to search and learn many different ## options in using cURL, most importantly if the target server's url is requiring a referrer. ## you can easily add referrer option on your cURL's instance if needed be. Even adding a browser agent type ## can be achieved. $ch = curl_init ($img_url1); curl_setopt($ch, CURLOPT_HEADER, 0); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_BINARYTRANSFER,1); $img_data=curl_exec ($ch); curl_close ($ch); $fp = fopen($img_dir,'w'); fwrite($fp, $img_data); fclose($fp); ?> That's it for the code writing for this week..will come again by next week to write something up.. :) GrabzIt is a great free service for this. It currently has a PHP API as well as a .NET one. They have a free PHP library you can download that includes a working sample so you can get going really quickly. The basic idea is that you use the GrabzIt client to calls the screenshot service passing the URL you want a screenshot of and the callback URL. The callback url will then save the result for you. include("GrabzItClient.class.php"); //Create the GrabzItClient class //Replace "APPLICATION KEY", "APPLICATION SECRET" with the values from your account! $grabzIt = new GrabzItClient("APPLICATION KEY", "APPLICATION SECRET"); //Take the picture the method will return the unique identifier assigned to this task $id = $grabzIt->TakePicture("http://www.google.com", "http://www.example.com/GrabzItHandler.php"); Here is their example callback class: include("GrabzItClient.class.php"); $message = $_GET["message"]; $customId = $_GET["customid"]; $id = $_GET["id"]; $filename = $_GET["filename"]; //Custom id can be used to store user ids or whatever is needed for the later processing of the //resulting screenshot $grabzIt = new GrabzItClient("APPLICATION KEY", "APPLICATION SECRET"); $result = $grabzIt->GetPicture($id); if (!$result) { return; } //Ensure that the application has the correct rights for this directory. file_put_contents("images" . DIRECTORY_SEPARATOR . $filename, $result); This article has been dead for over six months. Start a new discussion instead.
{ "url": "https://www.daniweb.com/programming/web-development/threads/256243/screenshot-of-any-webpage-using-php", "source_domain": "www.daniweb.com", "snapshot_id": "crawl=CC-MAIN-2016-30", "warc_metadata": { "Content-Length": "70718", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:I2H5JK4C4NM3LV3U3IMGACYTBCHIMILN", "WARC-Concurrent-To": "<urn:uuid:2ac00161-a7b8-4c2b-8934-d8200eaacf06>", "WARC-Date": "2016-07-25T20:07:00Z", "WARC-IP-Address": "198.23.117.137", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:YDYHBYAFIZZIC5WO3HY2ZFBMDXNZ2DER", "WARC-Record-ID": "<urn:uuid:b716a21c-7206-48b3-bda6-78f2964ac1e8>", "WARC-Target-URI": "https://www.daniweb.com/programming/web-development/threads/256243/screenshot-of-any-webpage-using-php", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e608a866-ca35-45f5-a4c9-f254548b7e3c>" }, "warc_info": "robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 58, 59, 403, 404, 411, 412, 578, 579, 607, 608, 627, 628, 936, 937, 1086, 1087, 1091, 1092, 1102, 1103, 1109, 1128, 1200, 1275, 1339, 1377, 1378, 1446, 1548, 1550, 1553, 1554, 1628, 1629, 1787, 1788, 1801, 1802, 1881, 1882, 2494, 2495, 2640, 2641, 2647, 2666, 2667, 2735, 2736, 2762, 2837, 2945, 2946, 3004, 3067, 3096, 3111, 3112, 3172, 3265, 3335, 3402, 3433, 3434, 3435, 3475, 3520, 3521, 3551, 3638, 3672, 3675, 3676, 3877, 3878, 3884, 3903, 3904, 3972, 3973, 3999, 4074, 4182, 4183, 4241, 4304, 4333, 4348, 4349, 4409, 4502, 4572, 4639, 4670, 4671, 4736, 4831, 4940, 4960, 4989, 5026, 5071, 5115, 5142, 5160, 5161, 5188, 5189, 5213, 5226, 5229, 5232, 5233, 5335, 5336, 5428, 5429, 5543, 5544, 5741, 5742, 5778, 5779, 5812, 5897, 5968, 6054, 6153, 6154, 6192, 6193, 6229, 6230, 6259, 6290, 6309, 6340, 6341, 6437, 6460, 6461, 6532, 6569, 6570, 6584, 6586, 6598, 6600, 6601, 6674, 6746 ], "line_end_idx": [ 58, 59, 403, 404, 411, 412, 578, 579, 607, 608, 627, 628, 936, 937, 1086, 1087, 1091, 1092, 1102, 1103, 1109, 1128, 1200, 1275, 1339, 1377, 1378, 1446, 1548, 1550, 1553, 1554, 1628, 1629, 1787, 1788, 1801, 1802, 1881, 1882, 2494, 2495, 2640, 2641, 2647, 2666, 2667, 2735, 2736, 2762, 2837, 2945, 2946, 3004, 3067, 3096, 3111, 3112, 3172, 3265, 3335, 3402, 3433, 3434, 3435, 3475, 3520, 3521, 3551, 3638, 3672, 3675, 3676, 3877, 3878, 3884, 3903, 3904, 3972, 3973, 3999, 4074, 4182, 4183, 4241, 4304, 4333, 4348, 4349, 4409, 4502, 4572, 4639, 4670, 4671, 4736, 4831, 4940, 4960, 4989, 5026, 5071, 5115, 5142, 5160, 5161, 5188, 5189, 5213, 5226, 5229, 5232, 5233, 5335, 5336, 5428, 5429, 5543, 5544, 5741, 5742, 5778, 5779, 5812, 5897, 5968, 6054, 6153, 6154, 6192, 6193, 6229, 6230, 6259, 6290, 6309, 6340, 6341, 6437, 6460, 6461, 6532, 6569, 6570, 6584, 6586, 6598, 6600, 6601, 6674, 6746, 6825 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6825, "ccnet_original_nlines": 151, "rps_doc_curly_bracket": 0.00029304000781849027, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.34018567204475403, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.027851460501551628, "rps_doc_frac_lines_end_with_ellipsis": 0.006578950211405754, "rps_doc_frac_no_alph_words": 0.2785145938396454, "rps_doc_frac_unique_words": 0.39570552110671997, "rps_doc_mean_word_length": 5.198363780975342, "rps_doc_num_sentences": 121, "rps_doc_symbol_to_word_ratio": 0.043103449046611786, "rps_doc_unigram_entropy": 5.380603790283203, "rps_doc_word_count": 978, "rps_doc_frac_chars_dupe_10grams": 0.2250196635723114, "rps_doc_frac_chars_dupe_5grams": 0.25786781311035156, "rps_doc_frac_chars_dupe_6grams": 0.25786781311035156, "rps_doc_frac_chars_dupe_7grams": 0.2250196635723114, "rps_doc_frac_chars_dupe_8grams": 0.2250196635723114, "rps_doc_frac_chars_dupe_9grams": 0.2250196635723114, "rps_doc_frac_chars_top_2gram": 0.009441380389034748, "rps_doc_frac_chars_top_3gram": 0.0076711298897862434, "rps_doc_frac_chars_top_4gram": 0.009441380389034748, "rps_doc_books_importance": -644.53271484375, "rps_doc_books_importance_length_correction": -644.53271484375, "rps_doc_openwebtext_importance": -356.6650695800781, "rps_doc_openwebtext_importance_length_correction": -356.6650695800781, "rps_doc_wikipedia_importance": -232.05206298828125, "rps_doc_wikipedia_importance_length_correction": -232.05206298828125 }, "fasttext": { "dclm": 0.2110232710838318, "english": 0.8453105092048645, "fineweb_edu_approx": 2.211625099182129, "eai_general_math": 0.9862935543060303, "eai_open_web_math": 0.3144928812980652, "eai_web_code": 0.9935606718063354 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.678", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "18", "label": "Q&A Forum" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
62,519,992,702,627,940
Dumbo: America’s First Forgotten NTR Hello, and welcome back to Beyond NERVA! Today, in our first post in the Forgotten Reactors series, we’re going back to the beginnings of astronuclear engineering, and returning to nuclear thermal propulsion as well, looking at one of the reactors that’s had a cult following since the 1950s: the pachydermal rocket known as DUMBO. In a nuclear thermal rocket, the path that the propellant takes has a strong impact on how hard it is to predict the way that the propellant will move through the reactor. Anyone who’s dealt with a corroded steam central heating system that won’t quit knocking, no matter how much you try, has dealt with the root of the problem: fluid behavior in a set of tubes only makes sense, and doesn’t cause problems, if you can make sure you know what’s going on, and that’s not only counter-intuitively hard, but it’s one of the subjects that (on the fine scale, in boundary conditions, and in other extremes) tends to lead towards chaos theory more than traditional fluid dynamics of ANY sort, much less adding in the complications of heat transport. However, if you can have gas flow longer through the reactor, you can get greater efficiency, less mass, and many other advantages. This was first proposed in the Dumbo reactor at the beginning of Project Rover, alongside the far more familiar Kiwi reactors. Rather than have the gas flow from one end of the reactor to the other through straight pipes, like in Kiwi, the propellant in Dumbo would flow part of the way down the reactor core, then move radially (sideways) for a while, and then returns to flowing along the main axis of the reactor before exiting the nozzle. Because of the longer flow path, and a unique fuel element and core geometry, Dumbo seemed to offer the promise of both less volume and less mass for the same amount of thrust due to this difference in flow path. Additionally, this change offered the ability to place thermally sensitive materials more evenly across the reactor, due to the distribution of the cold propellant through the fuel element structure. Dumbo ended up being canceled, in part, because the equations required to ensure that fatal flow irregularities wouldn’t occur, and the promised advantages didn’t materialize, either. None of this means that Dumbo was a bad idea, just an idea ahead of its time – an idea with inspiration to offer. Dumbo’s progeny live on. In fact, we’ve covered both the fuel element form AND the modern incarnation of the fuel geometry in the blog before! With today’s knowledge of materials, advanced flow modeling, a cutting edge carbide fuel, and the beginnings of a Renaissance in nuclear design are breathing new life into the program even today, and the fundamental concept remains an attractive (if complex) one. The First Forgotten Reactor Early Dumbo cutaway drawing with flow path In the early days of astronuclear engineering, there was a lot of throwing pasta at the wall, and looking to see what stuck. Many more slide rules than are involved in the average family’s spaghetti dinner preparations, to determine if the pasta was done enough, but a large number of designs were proposed, and eventually settled down into four potentially near-ish term useful: radioisotope power supplies, nuclear thermal propulsion, nuclear electric propulsion, and nuclear explosive propulsion (which we usually call nuclear pulse propulsion). Each of these ended up being explored extensively, and a number of other novel concepts have been proposed over the years as well. In the beginning, however, research tended toward either the NTR or NPP designs, with two major programs: ROVER and ORION. Orion was fairly narrowly focused from the beginning, owing to the problems of making an efficient, low-mass, easily deployable, reliable, and cheap shaped nuclear charge – the physics drove the design. Rover, on the other hand, had many more options available to it, and some competition as to what the best design was. Being the earliest days of the atomic era, which way to go, and the lack of knowledge in both nuclear and materials science often limited Rover as much as lack of fuel for their reactors did! This led to some promising designs being discarded. Some were resurrected, some weren’t, but the longest lived of the less-initially-preferred designs is our subject for today. Dumbo was initially proposed in the literature in 1955. Two years later, a far more developed report was issued to address many of the challenges with the concept. The idea would continue to bounce around in the background of astronuclear engineering design until 1991, when it was resurrected… but more on that later. The concept was very different from the eventual NERVA concept (based on the Phoebus test reactor during Rover) in a number of ways, but two stand out: 1. Fuel element type and arrangement: The eventual Rover elements used uranium oxide or carbide suspended within graphite flour, which was then solidified, in Dumbo the fissile fuel was “metal.” However, the designers used this term differently than how it would be used today: rather than have the entire fuel element be metal, as we’ve seen in Kilopower, the fuel was uranium oxide pellets suspended in some type of high temperature metal. Today, we call this CERMET, for ceramic metal composite, and is the current favorite 2. Flow pattern: while both the initial Rover concepts (the Kiwi reactors) and the eventual NERVA engines used straight-through, axial propellant flow, which is simple to model mathematically, Dumbo’s flow path started the same (going from the nozzle end to the spacecraft end, cooling the reflectors and control components), but once it reached the top of the reactor and started flowing toward the nozzle, things changed. The flow would start going toward the nozzle through a central column, but be diverted through sets of corrugated fuel “washers” and spacers, making two 90 degree turns as it did so. This was called a “folded flow” system. A host of other differences were also present throughout the reactor and control systems, but these two differences were the biggest when comparing the two nearly-simultaneously developed systems. The biggest advantages that were offered by the basic concept were the ability to go to higher temperatures in the core, and be able to have a more compact and less massive reactor for the same thrust level. Additionally, at the time it seemed like the testing would be far simpler to do, because it appeared that the number of tests needed, and the requirements of those tests, would make the testing program both simpler and cheaper compared to the competing Kiwi design concept. Sadly, these advantages weren’t sufficient to keep the project alive, and Kiwi ended up winning in the down-selection process. In 1959, the Dumbo portion of Rover was canceled. There were two stated main reasons: first, there were no weight savings seen between the two systems upon in depth analysis; second, the manufacture of the components for the reactor required high precision out of at-the-time exotic materials. Another concern which was not mentioned at the time of cancellation but is a concern for certain variations on this reactor is the complex flow patterns in the reactor, something we’ll touch on briefly later. Contrary to popular belief, Dumbo’s design isn’t dead. The fuel type has changed, and many of the nuclear design considerations for the reactor have also changed, but the core concept of a stacked set of fuel discs and a folded flow pattern through the core of the reactor remains. Originally revived as the Advanced Dumbo concept, proposed by Bill Kirk at LANL in 1990, which advocated for the use of carbide fuels to increase the reactor core temperature, as well as moving to a solid disc with grooves cut in it. This was proposed at the same time as many other concepts for nuclear thermal rockets in the bout of optimism in the early 1990s, but funding was given instead to the pebblebed NTR, another concept that we’ll cover. This in itself evolved into the Tricarbide Grooved Ring NTR currently under investigation at the Marshall Space Flight Center, under the direction of Brian Taylor and William Emrich, a concept we covered already in the carbide fuel post, but will briefly review again at the end of this post. Is Dumbo Really a Metal Reactor? At the time, this was called a metal reactor, but there’s metal and there’s metal. Metal fuels aren’t uncommon in nuclear reactor design. CANDU reactors are one of the most common reactor types in operation today, and use metal fuel. New designs, such as Kilopower in space and the Westinghouse eVinci reactor on Earth, also use metal fuels, alloying the uranium with another metal to improve either the chemical, thermal, or nuclear properties of the fuel itself. However, there are a few general problems (and exceptions to those problems) with metal fuels. In general, metal fuels have a low melting point, which is exactly what is undesirable in a nuclear thermal rocket, where core temperature is the main driving factor to efficiency, even ahead of propellant mass. Additionally, there can be neutronic complications, in that many metals which are useful for the fuel material components are also neutron poisons, reducing the available power of the reactions in the core. On the flip side, metals generally offer the best thermal conductivity of any class of material. CERMET fuel micrograph, image NASA Rather than a metal alloy fuel such as CANDU or Kilopower reactors, Dumbo used uranium oxide embedded in a refractory metal matrix. For those that have been following the blog for a while, this isn’t metal, it’s CERMET (ceramic-metal composite), the same type of fuel that NASA is currently exploring with the LEU NTP program. However, the current challenges involved in developing this fuel type are a wonderful illustration as to why it was considered a stretch in the 1950s. For a more in-depth discussion on CERMET fuels, check out our blog post on CERMET fuels in their modern incarnation here: https://beyondnerva.com/2018/01/19/leu-ntp-part-two-cermet-fuel-nasas-path-to-nuclear-thermal-propulsion/ The metal matrix of these fuel elements was meant to be molybdenum initially, with the eventual stretch goal of using tungsten. Tungsten was still brand new, and remains a challenge to manufacture in certain cases. Metallurgists and fabricators are still working on improving our ability to use tungsten, and isotopically enriching it (in order to reduce the number of neutrons lost to the metal) is still beyond the technical capabilities of American metallurgical firms. The Dumbo fuel elements were to be stamped in order to account for the complex geometries involved, although there was a new set of challenges involved with this forming process, including ensuring even distribution of the fissile fuel through the stamped material. Folded Flow Reactors: Why, and How Hard? Perhaps the biggest challenge in Dumbo wasn’t the material the fuel elements were made of, but the means of transferring the heat into the propellant. This was due to a couple of potential issues: first, the propellant passed through a more convoluted than typical path through the reactor, and second, the reactor was meant to be a laminar flow heat exchanger, the first time that this would have been done. Dumbo fuel stack flow pattern, original image DOE Each Dumbo core had a number of sets of fuel washers, moderator spacers, and securing components stacked into cylinders. The propellant would flow through the Be reflector, into the central opening of the fuel elements, and then flow out of the fuel elements, exiting around the perimeter of the cylinder. This would then be directed out the nozzle to provide thrust. By going through so many twists and turns, and having so much surface area available for heat transfer, the propellant could be more thoroughly heated than in a more typical prismatic fuel element, such as we see with the later Kiwi and Phoebus reactors. As with folded optics in telescopes, folded flow paths allow for more linear distance traveled in the same volume. A final advantage is that, because of the shape and arrangement of the washers, only a small amount of material would need to be tested, at a relatively minor 1.2 kW power level, to verify the material requirements of the reactor. Timber Wind NTR, image DOE Timber Wind NTR, image DOE This sort of flow path isn’t unique to Dumbo. TRISO fuel, which use beads of fuel coated in pyrolitic carbon, fission product containment materials, and others have a very complex flow path through the reactor, increasing the linear distance traveled from one end of the core to the other well beyond the linear dimensions of the reactor. The differences mainly arise in the fuel geometry, not the concept of a non-axial flow. The challenge is modeling the flow of the coolant through the bends in the reactor. It’s relatively easy to have hot spots develop if the fluid has to change directions in the wrong way, and conversely cold spots can develop as well. Ensuring that neither of these happen is a major challenge in heat exchanger design, a subject that I’m far from qualified to comment on. The unique concept at the time was that this was meant to be a laminar flow heat exchanger (the fuel elements themselves form the heat exchanger). Laminar fluid flow, in broad terms, means that all of the molecules in the fluid are moving together. The opposite of laminar flow is turbulent flow, where eddies form in the fluid that move in directions other than the main direction of fluid flow. While the term may bring up images of white water rapids (and that’s not a bad place to start), the level of turbulence varies depending on the system, and indeed the level of turbulence in a heat exchanger modifies how much heat is transferred from the hot surface to the coolant fluid. Since the molecules are moving together in the same direction during laminar flow, the eddies that are a major component of heat transfer in some designs are no longer present, reducing the efficiency of heat transport through the working fluid. However, in some designs (those with a low Reynolds number, a characteristic of heat transfer capability) laminar flow can be more efficient than turbulent flow. For more discussion on the efficiency of laminar vs turbulent flow in heat exchangers, check out this paper by Patil et al: http://www.ijirset.com/upload/2015/april/76_Comparative-1.pdf . For a rocket engine, the presence of laminar flow makes the rocket itself more efficient, since all of the molecules are moving in the same direction: straight out of the nozzle. The better collimated, or directional, the propellant flow is, the more thrust efficient the engine will be. Therefore, despite the fact that laminar flow is less efficient at transferring heat, the heat that is transferred can be more efficiently imparted as kinetic energy into the spacecraft. In the case of Dumbo, the use of a large number of small orifices in the fuel elements allows for the complete transferrance of the heat of the nuclear reaction into the propellant, allowing for the efficient use of laminar flow heat exchange. This also greatly simplifies the basic design calculations of the fluid dynamics of the reactor, since laminar flow is easy to calculate, but turbulence requires complexity theory to fully model, a technique that didn’t exist at the time. However, establishing and maintaining laminar flow in the reactor was rightly seen as a major challenge at the time, and even over three decades later the challenges involved in this part of the design remained a point of contention about the feasibility of the laminar heat exchanger concept in this particular application. Another distinct advantage to this layout is that the central annulus of each fuel element stack was filled with propellant that, while it had cooled the radial reflector, remained quite cool compared to the rest of the reactor. This meant that materials containing high hydrogen content, in this case a special form of plastic foam, could be distributed throughout the reactor. This meant that the neutron spectrum of the reactor could be more consistent, ensuring more uniform fissioning of the fuel across the active region of the reactor, and a material could be chosen that allows for greater neutron moderation than the graphite fuel element matrix of a Kiwi-type reactor. A variation of this concept can be seen as well with the Russian RD-0140 and -0411, which have all of their fuel around the outer circumference of the reactor’s pressure vessel and a large moderator column running down the center of the core. This allows the center of the core of the reactor to be far cooler, and contain far more themally sensitive materials as a result. The Death of Dumbo Sadly, the advantages of this reactor geometry weren’t sufficient to keep the program alive. In 1959, Dumbo gained the dubious distinction of being the first NTR concept that underwent study and development to be canceled in the US (perhaps even worldwide). Kiwi, the father and grandfather of all other Rover flight designs, was the winner, and the prismatic fuel element geometry remains the preferred design even today. According to the Quarterly Status Report of LASL ROVER Program for Period Ending September 20, 1959, two factors caused the cancellation of the reactor: the first was that, despite early hopes, the reactor’s mass offered no advantages over an equivalent Kiwi reactor; the second was the challenges involved in the fabrication and testing of many of the novel components required, and especially the requirements of manufacturing and working the UO2/Mo CERMET fuel elements to a sufficiently precise degree, promised a long and difficult development process for the reactor to come to fruition. Dumbo remained an interesting and attractive design to students of astronuclear engineering from that point on. Mentions of the concept occur in most summaries of NTR design history, but sadly, it never attracted funding to be developed. Even the public who are familiar with NTRs have heard of Dumbo, even if they aren’t familiar with any of the details. Just last month, there was a thread started on NASASpaceFlight Forum about Dumbo, and reviving the concept in the public eye once again. The Rebirth of Dumbo: the Advanced Dumbo Rocket Advanced Dumbo fuel element stack. Notice the change in fuel shape due to the different material properties. Image NASA In 1991, there was a major conference attended by NASA, DOE, and DOD personnel on the subject of NTRs, and the development of the next generation NTR system for American use to go to Mars. At this conference, Bill Kirk of Los Alamos National Labs presented a paper on Dumbo, which he was involved in during its first iteration, and called for a revival of what he called a “folded flow washer type” NTR. This proposal, though, discarded the UO2/Mo CERMET fuel type in favor of a UC-ZrC carbide fuel element, to increase the fuel element maximum temperature. For a more in-depth look at carbide fuel elements, and their use in NTRs, check out the carbide fuel element post here. As we discussed in the carbide post, there are problems with thermal stress cracking and complex erosive behaviors in carbide fuel elements, but the unique form factor of the grooved disc allows for better distribution of the stresses, less continuous structural components to the fuel elements themselves, allowing for better thermal behavior and less erosion. Another large change from the classic Dumbo to the Advanced Dumbo was that the fluid flow through the reactor wasn’t meant to be laminar, and turbulent behavior was considered acceptable in this iteration. Other changes, including reflector geometry, were also incorporated, to modernize the concept’s support structures and ancillary equipment. Timber Wind reactor, image Winchell Chung Atomic Rockets Once again, though, the Dumbo concept, as well as the other concepts presented that had a folded flow pattern, were not selected. Instead, this conference led to the birth of the Timber Wind program, a pebble bed reactor design that we’ll cover in the future. Again, though, the concept of increasing the surface area compared to the axial length of the reactor was an inherent part of this design, and a TRISO pebble bed reactor shares some of the same advantages as a washer-type reactor would. The Second Rebirth: the Tricarbide Grooved Ring NTR Tricarbide Grooved Ring NTR fuel element stack. Notice the return of more complex geometry as materials design and fabrication of carbides has improved. Image NASA Washer type reactors live today, and in many ways the current iteration of the design is remarkably similar to the Advanced Dumbo concept. Today, the research is centered in the Marshall Space Flight Center, with both Oak Ridge National Laboratory and the University of Tennessee being partners in the program. The Tricarbide Grooved Ring NTR (TCGR) was originally proposed in 2017, by Brian Taylor and Bill Emrich. While Bill Kirk is not mentioned in any of the papers on this new iteration of this reactor geometry, the carbide grooved washer architecture is almost identical to the Advanced Dumbo, so it’s reasonable to assume that the TCGR design is at least inspired by the Advanced Dumbo concept of 27 years before (Bill Emrich is a very old hand in NTR design and development, and was active at the time of the conference mentioned above). The latest iteration, the TCGR, is a design that we covered in the carbide fuel element post, and because of this, as well as the gross similarities between the Advanced Dumbo and TCGR, we won’t go into many details here. If you want to learn more, please check out the TCGR page here: insert link. The biggest differences between the Advanced Dumbo and TCGR were the flow pattern and the fuel element composition. The flow pattern is a simple change in one way, but in another way there’s a big difference: rather than the cold end of the reactor being the central annular portion of the fuel element stack, the cold end became the exterior of the stack, with the hot propellant/coolant running down the center of the core. This difference is a fairly significant one from a fluid dynamics point of view, where the gas flow from the “hot end” of the reactor itself to the nozzle turns from a more diffuse set of annular shaped gas flows into a series of columns coming out of each fuel element cluster; whether this is easier to work with or not, and what the relative advantages are, is beyond my understanding, but [take this with a grain of salt, this is speculation] it seems like the more collimated gas flows would be able to integrate more easily into a single gaseous flow through the nozzle. Similarly to the simple but potentially profound change in the propellant flow path, the fuel element composition change is significant as well. Rather than just using the UC-ZrC fuel composition, the TCGR uses a mix of uranium, zirconium, and tantalum carbides, in order to improve both thermal properties as well as reduce stress fractures. For more information on this particular carbide type, check out the carbides post! Funding is continuing for this concept, and while the focus is primarily on the CERMET LEU NTP engine under development by BWXT, the TCGR is still a viable and attractive concept, and one that balances the advantages and disadvantages of the washer-type, folded flow reactor. As more information on this fascinating reactor becomes available, I’ll post updates on the reactor’s page! More Coming Soon! This was the first of a new series, the Forgotten Reactors. Next week will be another post in the series, looking at the SP-100 reactor. We won’t look at the reactor in too much depth, because it shares a lot of similarities with the SNAP-50 reactor’s final iteration; instead we’ll look at the most unique thing about this reactor: it was designed to be both launched and recovered by the Space Shuttle, leading to some unique challenges. While the STS is no longer flying, this doesn’t mean that the lessons learned with this design process are useless, because they will apply to a greater or lesser extent to every reactor recovery operation that will be performed in the future, and well as the challenges of having a previously-turned-on reactor in close proximity to the crew of a spacecraft with minimal shielding between the payload compartment and the crew cabin. Sources Dumbo — A Pachydermal Rocket Motor, DOE ID LAMS-1887 McInteer et al, Los Alamos Scientific Laboratory 1955 A Metal Dumbo Rocket Reactor, DOE ID LA-2091, Knight et al, Los Alamos Scientific Laboratory 1957 https://inis.iaea.org/collection/NCLCollectionStore/_Public/07/265/7265972.pdf?r=1&r=1 Quarterly Status Report of LASL Rover Program for Period Ending Sept 20, 1959, LAMS-2363 Dumbo, a Pachydermal Rocket Motor [Advanced Dumbo], Kirk, Los Alamos National Laboratory 1992 https://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/19920001882.pdf Investigation of a Tricarbide Grooved Ring Fuel Element for a Nuclear Thermal Rocket, NASA ID 20170008951 Taylor et al NASA MSFC 2017 Conference paper: https://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/20170008951.pdf Presentation slides: https://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/20170008940.pdf Table of Contents Share: Share on facebook Facebook Share on twitter Twitter Share on pinterest Pinterest Share on linkedin LinkedIn 4 Responses 1. Fascinating article. There’s been so much done, and so long ago, that people can claim newness on these essentially old concepts! I did have a question. Where did you find the information that the evinci reactor uses metal fuel? Early versions of megapower which they licensed used uo2, but it’s intriguing they made the switch. 2. One of the things that killed Dumbo was that the bean-counters required that it be tested with the nozzle that was designed for Nerva. I’ve also read that Dumbo sent more fuel out the exhaust. Dumbo needed those longer paths because it had smaller channels, smaller than the boundary layers in Nerva’s turbulent flow, thereby reducing thermal resistance. Reducing thermal resistance meant a lower surface temperature for a given average fluid temperature. Leave a Reply Your email address will not be published. Required fields are marked * On Key Related Posts Fusion Fuels Nuclear fusion is often seen as the “Holy Grail” of power generation and rocketry. It powers stars and our most powerful weapons, and is ~4X Radiator LNTR: The Last of the Line Hello, and welcome back to Beyond NERVA! Today, we’re finishing (for now) our in-depth look at liquid fueled nuclear thermal rockets, by looking at the
{ "url": "https://beyondnerva.com/2019/02/26/dumbo-americas-first-forgotten-ntr/", "source_domain": "beyondnerva.com", "snapshot_id": "crawl=CC-MAIN-2021-39", "warc_metadata": { "Content-Length": "129078", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:4KQNSHCX74BTBRB7VR3QJ4FNPDXLWFVR", "WARC-Concurrent-To": "<urn:uuid:6ad62360-5cdf-45c2-ac2a-74e54698c6dd>", "WARC-Date": "2021-09-25T00:34:31Z", "WARC-IP-Address": "104.255.174.94", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:UJGMLU7GDQHCFYLT6B25ARINL5SJUQDF", "WARC-Record-ID": "<urn:uuid:855434de-4637-4712-9784-7d482691e81c>", "WARC-Target-URI": "https://beyondnerva.com/2019/02/26/dumbo-americas-first-forgotten-ntr/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:203e3882-a98b-4728-9388-5fe128accfd9>" }, "warc_info": "isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-54\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 37, 38, 370, 371, 1248, 1249, 2105, 2106, 2547, 2548, 2812, 2813, 2841, 2842, 2885, 2886, 4379, 4380, 4851, 4852, 5379, 5380, 6027, 6028, 6834, 6835, 7338, 7339, 8364, 8365, 8398, 8399, 9475, 9476, 9511, 9512, 10218, 10219, 10958, 10959, 11000, 11001, 11410, 11411, 11461, 11462, 12431, 12432, 12459, 12486, 12487, 12914, 12915, 13287, 13288, 14569, 14570, 15045, 15046, 15854, 15855, 16908, 16909, 16928, 16929, 17352, 17353, 17947, 17948, 18441, 18442, 18490, 18491, 18611, 18612, 19998, 19999, 20056, 20057, 20554, 20555, 20607, 20608, 20772, 20773, 21620, 21621, 22036, 22037, 22924, 22925, 23351, 23352, 23736, 23737, 23755, 23756, 24630, 24631, 24639, 24640, 24747, 24748, 24933, 24934, 25023, 25024, 25188, 25189, 25323, 25411, 25502, 25503, 25521, 25522, 25529, 25530, 25548, 25557, 25574, 25582, 25601, 25611, 25629, 25638, 25639, 25651, 25652, 25787, 25788, 25991, 25992, 26060, 26136, 26198, 26267, 26331, 26372, 26426, 26481, 26482, 26496, 26497, 26568, 26569, 26576, 26577, 26591, 26592, 26605, 26606, 26747, 26748, 26784, 26785 ], "line_end_idx": [ 37, 38, 370, 371, 1248, 1249, 2105, 2106, 2547, 2548, 2812, 2813, 2841, 2842, 2885, 2886, 4379, 4380, 4851, 4852, 5379, 5380, 6027, 6028, 6834, 6835, 7338, 7339, 8364, 8365, 8398, 8399, 9475, 9476, 9511, 9512, 10218, 10219, 10958, 10959, 11000, 11001, 11410, 11411, 11461, 11462, 12431, 12432, 12459, 12486, 12487, 12914, 12915, 13287, 13288, 14569, 14570, 15045, 15046, 15854, 15855, 16908, 16909, 16928, 16929, 17352, 17353, 17947, 17948, 18441, 18442, 18490, 18491, 18611, 18612, 19998, 19999, 20056, 20057, 20554, 20555, 20607, 20608, 20772, 20773, 21620, 21621, 22036, 22037, 22924, 22925, 23351, 23352, 23736, 23737, 23755, 23756, 24630, 24631, 24639, 24640, 24747, 24748, 24933, 24934, 25023, 25024, 25188, 25189, 25323, 25411, 25502, 25503, 25521, 25522, 25529, 25530, 25548, 25557, 25574, 25582, 25601, 25611, 25629, 25638, 25639, 25651, 25652, 25787, 25788, 25991, 25992, 26060, 26136, 26198, 26267, 26331, 26372, 26426, 26481, 26482, 26496, 26497, 26568, 26569, 26576, 26577, 26591, 26592, 26605, 26606, 26747, 26748, 26784, 26785, 26936 ] }
{ "red_pajama_v2": { "ccnet_original_length": 26936, "ccnet_original_nlines": 155, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.41440582275390625, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.01795949973165989, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1398548036813736, "rps_doc_frac_unique_words": 0.2624743580818176, "rps_doc_mean_word_length": 4.967418670654297, "rps_doc_num_sentences": 177, "rps_doc_symbol_to_word_ratio": 0.0001910599967231974, "rps_doc_unigram_entropy": 5.826756477355957, "rps_doc_word_count": 4389, "rps_doc_frac_chars_dupe_10grams": 0.008623059839010239, "rps_doc_frac_chars_dupe_5grams": 0.04384918883442879, "rps_doc_frac_chars_dupe_6grams": 0.020823780447244644, "rps_doc_frac_chars_dupe_7grams": 0.01504448987543583, "rps_doc_frac_chars_dupe_8grams": 0.01504448987543583, "rps_doc_frac_chars_dupe_9grams": 0.008623059839010239, "rps_doc_frac_chars_top_2gram": 0.015365559607744217, "rps_doc_frac_chars_top_3gram": 0.008256119675934315, "rps_doc_frac_chars_top_4gram": 0.004403269849717617, "rps_doc_books_importance": -1594.9068603515625, "rps_doc_books_importance_length_correction": -1594.9068603515625, "rps_doc_openwebtext_importance": -1003.91845703125, "rps_doc_openwebtext_importance_length_correction": -1003.91845703125, "rps_doc_wikipedia_importance": -239.6483917236328, "rps_doc_wikipedia_importance_length_correction": -239.6483917236328 }, "fasttext": { "dclm": 0.2603822350502014, "english": 0.9497891664505005, "fineweb_edu_approx": 2.8797318935394287, "eai_general_math": 0.7485176920890808, "eai_open_web_math": 0.48232996463775635, "eai_web_code": 0.044522520154714584 } }
{ "free_decimal_correspondence": { "primary": { "code": "621.48209", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } }, "secondary": { "code": "621.482", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "5", "label": "Evaluate" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "15", "label": "Nonfiction Writing" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "4", "label": "Advanced Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
846,666,077,637,364,900
PILOT BRIEFING – POLAR NAVIGATION       https://clairetoland.com/ A cold dusk is setting in in Moscow as we pre-flight the aircraft for our non-stop flight to Los Angeles. Slowly thawing our frosty aircraft back life on the ramp, we have more than just the usual transatlantic flight preparations to go over. Our objective today is a little different… The shortest path, and our planned routing, between sub-zero Moscow and mild LA is (as the picture above illustrates) to fly ‘over the top’. I.e. fly at or near to the north pole. Whilst these routes are profitable and becoming more widely used, flying near to the poles or within areas of ‘magnetic unreliability’ is not without its hazards. Perhaps most obvious to the layman, are the deadly freezing temperatures on Seguir leyendo Top Five: Weird Ocean Phenomena          NNOA   The ocean may conjure images of beautiful waves, shipwrecks, and marine life. But strange things happen in the ocean as a result of weather and currents. The five events described below are just a few of them. 1. St. Elmo's Fire   St. Elmo's Fire is a colorful discharge of atmospheric electricity that typically occurs during a thunderstorm. When a sharp object (such as a ship’s mast) comes in contact with an extraordinarily high electrical field and a large number of electrons, the electrons can glow in various colors, like a neon sign, resulting in this rare phenomenon. “St. Elmo” is a derivation of St. Erasmus of Formia, one of the two patron saints of sailors.   Photo Credit: Senior Airman Brian Kelly, U.S. Air Force 2. Fog “Tsunami”   At Seguir leyendo La anguila: el animal más misterioso podría extinguirse antes de que logremos entenderlo https://theconversation.com/ Publicado: 20 noviembre 2022 19:46 CET   Hay pocos animales que despierten una fascinación semejante a la de la anguila (Anguilla anguilla). Ese pez con cuerpo de serpiente, cubierto de una resbaladiza baba y con una sorprendentemente agilidad, casi imposible de asir, que Seguir leyendo Bathymetric Surveys: Improvements and Barriers Developments and Points for Improvement Since the 1970s, remote sensing has increasingly been used to conduct underwater surveys. Several methodologies are employed in hydrographic surveying, from direct techniques such as probing rods to more sophisticated techniques such as satellite-derived bathymetry and altimetric radar. The growing need for data that is increasingly accurate and available with a quick turnaround has recently led to a worldwide effort to develop sensors and alternative techniques for measuring depth. Bathymetric survey platforms include surface vessels, submersible platforms, aircraft and satellites (see Figure 1). Vessels range from large ships, used in offshore surveys, to uncrewed vessels, either remotely controlled or autonomous. The most commonly used submersible platforms are autonomous underwater vehicles (AUVs) and remotely Seguir leyendo Greenland's future may be written under North Sea There are clues to the near-future behaviour of a warming Greenland, and perhaps even a warming Antarctic, buried under the North Sea. Look below its bottom muds and you will find immense valleys. Hundreds of them. They were carved by rivers of meltwater running beneath the ice sheet that covered Northern Europe towards the end of Earth's last major cold phase. We've known about these valleys (often called "tunnel valleys" because they were incised under the ice sheet) for some time, but only in recent years has their true scale become apparent. Modern seismic (sound wave) data gathered by oil and gas prospectors has brought a new clarity that has enabled scientists to study the hidden features in greater detail.
{ "url": "http://www.marinacivil.com/index.php/articulo/meteorologia?start=5", "source_domain": "www.marinacivil.com", "snapshot_id": "CC-MAIN-2023-23", "warc_metadata": { "Content-Length": "41010", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:L3YRJXQZHWYGWTNQBAXHILATYMWMVJN5", "WARC-Concurrent-To": "<urn:uuid:4d728099-5a3e-4190-b6c3-322e5da59b67>", "WARC-Date": "2023-05-30T05:19:43Z", "WARC-IP-Address": "5.196.132.160", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:JXAM5AX75V3KOXNHZFWRNSG32KMNSTZF", "WARC-Record-ID": "<urn:uuid:d6f21663-9a81-4db8-8309-878f96e9821a>", "WARC-Target-URI": "http://www.marinacivil.com/index.php/articulo/meteorologia?start=5", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e5a13118-b13e-4798-aa30-901579952c8e>" }, "warc_info": "isPartOf: CC-MAIN-2023-23\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-142\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 34, 35, 37, 38, 40, 41, 43, 44, 70, 71, 537, 538, 777, 778, 793, 794, 826, 827, 829, 830, 832, 833, 835, 836, 838, 839, 845, 847, 848, 1058, 1059, 1078, 1079, 1081, 1082, 1523, 1524, 1526, 1527, 1583, 1584, 1601, 1602, 1604, 1605, 1608, 1609, 1624, 1625, 1714, 1715, 1744, 1745, 1784, 1786, 1787, 2019, 2020, 2035, 2036, 2083, 2084, 2124, 2125, 2613, 2614, 2952, 2953, 2968, 2969, 3019, 3020, 3155, 3156, 3236, 3237, 3386, 3387, 3575, 3576 ], "line_end_idx": [ 34, 35, 37, 38, 40, 41, 43, 44, 70, 71, 537, 538, 777, 778, 793, 794, 826, 827, 829, 830, 832, 833, 835, 836, 838, 839, 845, 847, 848, 1058, 1059, 1078, 1079, 1081, 1082, 1523, 1524, 1526, 1527, 1583, 1584, 1601, 1602, 1604, 1605, 1608, 1609, 1624, 1625, 1714, 1715, 1744, 1745, 1784, 1786, 1787, 2019, 2020, 2035, 2036, 2083, 2084, 2124, 2125, 2613, 2614, 2952, 2953, 2968, 2969, 3019, 3020, 3155, 3156, 3236, 3237, 3386, 3387, 3575, 3576, 3746 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3746, "ccnet_original_nlines": 80, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3342898190021515, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.01578192040324211, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.15925395488739014, "rps_doc_frac_unique_words": 0.640625, "rps_doc_mean_word_length": 5.22569465637207, "rps_doc_num_sentences": 35, "rps_doc_symbol_to_word_ratio": 0.0014347200049087405, "rps_doc_unigram_entropy": 5.5510735511779785, "rps_doc_word_count": 576, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.006644519977271557, "rps_doc_frac_chars_top_3gram": 0.00598007021471858, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -303.3101501464844, "rps_doc_books_importance_length_correction": -303.3101501464844, "rps_doc_openwebtext_importance": -206.94851684570312, "rps_doc_openwebtext_importance_length_correction": -206.94851684570312, "rps_doc_wikipedia_importance": -142.02224731445312, "rps_doc_wikipedia_importance_length_correction": -142.02224731445312 }, "fasttext": { "dclm": 0.12115632742643356, "english": 0.8856168389320374, "fineweb_edu_approx": 2.8708393573760986, "eai_general_math": 0.038800179958343506, "eai_open_web_math": 0.49712103605270386, "eai_web_code": 0.004339870065450668 } }
{ "free_decimal_correspondence": { "primary": { "code": "551.48", "labels": { "level_1": "Science and Natural history", "level_2": "Geology and Earth sciences", "level_3": "Physical geology and Geodynamics" } }, "secondary": { "code": "551.47", "labels": { "level_1": "Science and Natural history", "level_2": "Geology and Earth sciences", "level_3": "Physical geology and Geodynamics" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "1", "label": "News/Editorial" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "1", "label": "Truncated Snippets" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "6", "label": "Content Listing" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
6,331,900,540,124,620,000
Example #1 0 public void testLinenoFunctionCall() { AstNode root = parse("\nfoo.\n" + "bar.\n" + "baz(1);"); ExpressionStatement stmt = (ExpressionStatement) root.getFirstChild(); FunctionCall fc = (FunctionCall) stmt.getExpression(); // Line number should get closest to the actual paren. assertEquals(3, fc.getLineno()); } @Override public AstNode functionCall(AstNode target, Iterable<AstNode> arguments) { FunctionCall fc = new FunctionCall(); fc.setTarget(target); if (!Iterables.isEmpty(arguments)) { fc.setArguments(list(arguments)); } return fc; } Example #3 0 public void testJSDocAttachment4() { AstRoot root = parse("(function() {/** should not be attached */})()"); assertNotNull(root.getComments()); assertEquals(1, root.getComments().size()); ExpressionStatement st = (ExpressionStatement) root.getFirstChild(); FunctionCall fc = (FunctionCall) st.getExpression(); ParenthesizedExpression pe = (ParenthesizedExpression) fc.getTarget(); assertNull(pe.getJsDoc()); } Example #4 0 public void testRegexpLocation() { AstNode root = parse("\nvar path =\n" + " replace(\n" + "/a/g," + "'/');\n"); VariableDeclaration firstVarDecl = (VariableDeclaration) root.getFirstChild(); List<VariableInitializer> vars1 = firstVarDecl.getVariables(); VariableInitializer firstInitializer = vars1.get(0); Name firstVarName = (Name) firstInitializer.getTarget(); FunctionCall callNode = (FunctionCall) firstInitializer.getInitializer(); AstNode fnName = callNode.getTarget(); List<AstNode> args = callNode.getArguments(); RegExpLiteral regexObject = (RegExpLiteral) args.get(0); AstNode aString = args.get(1); assertEquals(1, firstVarDecl.getLineno()); assertEquals(1, firstVarName.getLineno()); assertEquals(2, callNode.getLineno()); assertEquals(2, fnName.getLineno()); assertEquals(3, regexObject.getLineno()); assertEquals(3, aString.getLineno()); }
{ "url": "https://java.hotexamples.com/examples/org.mozilla.javascript.ast/FunctionCall/-/java-functioncall-class-examples.html", "source_domain": "java.hotexamples.com", "snapshot_id": "crawl=CC-MAIN-2021-10", "warc_metadata": { "Content-Length": "62377", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:HLDDOR3SWNVF6DGSUUDGGIVZRVEMPQB4", "WARC-Concurrent-To": "<urn:uuid:f45c2076-4c87-4f17-9d27-07324c0894a3>", "WARC-Date": "2021-03-02T11:54:34Z", "WARC-IP-Address": "18.232.245.187", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:2Y7GFP7MUWSMZNF4SBIU5F5VNQ4DBY7X", "WARC-Record-ID": "<urn:uuid:49d1e2fe-6676-4316-8357-b774f78a48cb>", "WARC-Target-URI": "https://java.hotexamples.com/examples/org.mozilla.javascript.ast/FunctionCall/-/java-functioncall-class-examples.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:bce69c3f-8172-4354-a9cc-64e27e922f2a>" }, "warc_info": "isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-227.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 11, 13, 54, 115, 116, 191, 250, 309, 346, 350, 361, 437, 478, 503, 543, 582, 587, 601, 604, 615, 617, 655, 730, 768, 815, 887, 943, 1017, 1047, 1050, 1061, 1063, 1100, 1187, 1188, 1271, 1338, 1395, 1456, 1534, 1577, 1627, 1688, 1723, 1724, 1771, 1818, 1861, 1902, 1948, 1990 ], "line_end_idx": [ 11, 13, 54, 115, 116, 191, 250, 309, 346, 350, 361, 437, 478, 503, 543, 582, 587, 601, 604, 615, 617, 655, 730, 768, 815, 887, 943, 1017, 1047, 1050, 1061, 1063, 1100, 1187, 1188, 1271, 1338, 1395, 1456, 1534, 1577, 1627, 1688, 1723, 1724, 1771, 1818, 1861, 1902, 1948, 1990, 1993 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1993, "ccnet_original_nlines": 51, "rps_doc_curly_bracket": 0.0060210698284208775, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.051912568509578705, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.5300546288490295, "rps_doc_frac_unique_words": 0.6917293071746826, "rps_doc_mean_word_length": 10.51127815246582, "rps_doc_num_sentences": 33, "rps_doc_symbol_to_word_ratio": 0.00819671992212534, "rps_doc_unigram_entropy": 4.333257675170898, "rps_doc_word_count": 133, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.0886981412768364, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.015021460130810738, "rps_doc_frac_chars_top_3gram": 0.02360514923930168, "rps_doc_frac_chars_top_4gram": 0.07153075933456421, "rps_doc_books_importance": -119.77685546875, "rps_doc_books_importance_length_correction": -119.77685546875, "rps_doc_openwebtext_importance": -60.58292770385742, "rps_doc_openwebtext_importance_length_correction": -60.58292770385742, "rps_doc_wikipedia_importance": -40.12887954711914, "rps_doc_wikipedia_importance_length_correction": -40.12887954711914 }, "fasttext": { "dclm": 0.9999542236328125, "english": 0.2966916561126709, "fineweb_edu_approx": 3.6118967533111572, "eai_general_math": 0.8782655596733093, "eai_open_web_math": 0.07649827003479004, "eai_web_code": 0.5541893243789673 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1332", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.133", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "4", "label": "Code/Software" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
-3,061,029,139,952,127,000
Does anyone know how to combine a dll and an exe and also how to access the procedures in the dll after doing so.. Posted on 2005-12-23 11:06:19 by lone_samurai5 Quite strange idea, but... 1) you can store the DLL inside the exe and extract it at runtime (save->load->use->uload->delete) 2) knowing the base of the data segment you can manually relocate the references inside the DLL, but that must be a nightmare to do :P BTW: what's the use of it? Posted on 2005-12-23 11:39:51 by ti_mo_n What at just you want to do ? Because to use a dll with MASMv8.0 it is all simple...(one uses LoadLibrary...see Folder EXAMPLE1\DLL of MASM8.zip) To put export function in an EXE it works well with GoAsm.... With GoAsm in asm file it is sufficient to add a line EXPORT NAmeOfFunct Then to compile like an EXE... ---- Gerard Posted on 2005-12-23 11:42:16 by gerard Yeah i guess its a strange thing to do, but i was jus wondering how i can do somethin like that.. To tell u the truth i really can't think of much use for it.. Guess i'm jus a lil curious bout strange stuff.. :P 1) you can store the DLL inside the exe and extract it at runtime (save->load->use->uload->delete) 2) knowing the base of the data segment you can manually relocate the references inside the DLL, but that must be a nightmare to do Tongue Thanx, I'll try doin that now.. bout the 2nd point :shock:, any chance that someone has some code showin how somethin like this can be done Gerard, I don't think u understood my question.. :| Posted on 2005-12-23 13:03:43 by lone_samurai5 I gonna to repeat me... With GoAsm one can export Function in an EXE file... It is sufficient to put this line ....at the beginning of asm file.... and to complile this asm file like a normal EXE file... File.asm Posted on 2005-12-23 13:12:57 by gerard Well this is what i first did, I added this to the rc file, RCDATA DISCARDABLE "hver.dll", the dll was part of the exe. But i don't know how to use the procedures from the dll in the exe.. Any ideas??? Posted on 2005-12-23 13:32:46 by lone_samurai5 No you don't need to import the dll into resource file with GoAsm.... WITH GOASM IT IS AL  SIMPLE When you have your Function in your EXE you have to use the following API... LoadLibrary....and GetPrpcAddress....like you will do with a DLL... ----- Gerard Posted on 2005-12-23 13:37:27 by gerard Gerard i know i can do it that way, but i wanna try doin it this way, if its possible. Oh and don't ask me why..? :P Posted on 2005-12-23 13:52:34 by lone_samurai5 lone_samurai5, I guess you want to have your dll mapped and initialized in the context of other process? If so there is one way more - use hooks. You can map not only a dll but an exe also!!! Posted on 2005-12-23 14:24:03 by k3Eahn I guess it's called static linking, don't know much about it, but have one task for future: integrate SciLexer.dll (scintilla) into my exe file. Hope someone will be faster than me and figure this mystery out...(specifically how can this be done with masm32)...If static linking means integrate every library (including user..kernel..gdi..) into binary file, there have to be a way to integrate only one Posted on 2005-12-23 14:32:25 by ramguru K3eahn, How do u use hooks to map dlls or exe's? Can u temme a lil bout it or if u have some code can u post it? Posted on 2005-12-23 14:42:45 by lone_samurai5 lone_samurai5, You can embed DLLs to your executables : http://www.asmcommunity.net/board/index.php?topic=22308.0 Posted on 2005-12-23 15:40:46 by Vortex ramguru, k3Eahn, lone_samurai5: Static linking is something different from running a DLL from inside an EXE, and this is different from mapping something in the context of other processes :P So either I don't understand something, or you guys misunderstand each other :mrgreen: static linking is putting a binary code to an exe like an ordinary procedure. actually that's what linker does when it links different .obj files. dynamic linking is when a dll is loaded into process' address space and its references are 'resolved' so they point to proper places (in data, for example). if you have a binary dll inside your exe, you have to move it at some location and fix its references (a.k.a 'you have to relocate it'). then, when you jump to 1 of its functions, it will behave as desired. it's a difficult thing to do, because you have to know DLL's structure and know how to fix the references inside it. Normally you do such things when you write OSes. Vortex: that's exactly what lone_samurai5 needs ;) (if I understood everything correctly that is :mrgreen: ) Posted on 2005-12-23 15:46:09 by ti_mo_n All I was saying is just that I don't know much about it and hope that someone will show us the right way. Thanks Vortex, I was playing with your code earlier but I didn't realized its main purpose. Now I certainly use it! Posted on 2005-12-23 16:16:49 by ramguru ramguru, if there isn't a static version of scintilla, it shouldn't be too hard to recompile it for static linkage... K3eahn, How do u use hooks to map dlls or exe's? Can u temme a lil bout it or if u have some code can u post it? So, why do you need it? :) Posted on 2005-12-23 16:42:27 by f0dder f0dder, please be nice and explain what should I do :) from scintilla doc: ;-------- Static linking On Windows, Scintilla is normally used as a dynamic library as a .DLL file. If you want to link Scintilla directly into your application .EXE or .DLL file, then the STATIC_BUILD preprocessor symbol should be defined and Scintilla_RegisterClasses called. STATIC_BUILD prevents compiling the DllMain function which will conflict with any DllMain defined in your code. Scintilla_RegisterClasses takes the HINSTANCE of your application and ensures that the "Scintilla" window class is registered....blabla ;-------- I'm able to recompile scintilla (have MinGW etc.), I've even changed one lexer to suit my wishes. But the prob is what does it mean static linking, do I have to point an exe for dll to be linked into, or does it mean only that I'm able to include scintilla.h in other C++ like project..I'm totally new here Posted on 2005-12-23 16:56:38 by ramguru lone_samurai5, You can embed DLLs to your executables : http://www.asmcommunity.net/board/index.php?topic=22308.0 Thanx just what i was looking for... :D So, why do you need it? :) I'd tell u, but then i would have to kill u :P Posted on 2005-12-24 00:24:31 by lone_samurai5
{ "url": "http://www.asmcommunity.net/forums/topic/?id=22542", "source_domain": "www.asmcommunity.net", "snapshot_id": "crawl=CC-MAIN-2021-49", "warc_metadata": { "Content-Length": "13605", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:C7C237EHQVWJEBFUM4R6QMN5P4QXQJ4W", "WARC-Concurrent-To": "<urn:uuid:38baf99b-5764-4fa1-abdb-070161b6d6d5>", "WARC-Date": "2021-12-09T04:59:06Z", "WARC-IP-Address": "199.195.146.246", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:UJFDV4PCFXNZLCIC7Q2UBUTZZ3OFM2M5", "WARC-Record-ID": "<urn:uuid:23c7a470-b6ed-4b5f-b76d-1fd10a11a98d>", "WARC-Target-URI": "http://www.asmcommunity.net/forums/topic/?id=22542", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:bc3b75e4-a041-49cb-8a0a-e9fc7e04b7ec>" }, "warc_info": "isPartOf: CC-MAIN-2021-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-6\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 115, 162, 189, 190, 289, 424, 425, 452, 493, 523, 524, 606, 640, 641, 703, 704, 758, 777, 778, 809, 810, 815, 822, 862, 1074, 1075, 1076, 1175, 1314, 1315, 1455, 1456, 1508, 1555, 1579, 1580, 1633, 1634, 1705, 1706, 1762, 1763, 1772, 1773, 1813, 1873, 2015, 2062, 2132, 2133, 2161, 2162, 2239, 2240, 2308, 2309, 2315, 2322, 2362, 2479, 2526, 2541, 2542, 2632, 2719, 2759, 3163, 3204, 3317, 3364, 3379, 3380, 3421, 3422, 3480, 3520, 3552, 3553, 3799, 3800, 3947, 3948, 4105, 4106, 4479, 4480, 4589, 4630, 4853, 4894, 5012, 5013, 5014, 5015, 5128, 5129, 5156, 5196, 5251, 5271, 5281, 5296, 5297, 5799, 5809, 6116, 6157, 6158, 6173, 6174, 6215, 6216, 6274, 6275, 6315, 6316, 6317, 6344, 6345, 6392 ], "line_end_idx": [ 115, 162, 189, 190, 289, 424, 425, 452, 493, 523, 524, 606, 640, 641, 703, 704, 758, 777, 778, 809, 810, 815, 822, 862, 1074, 1075, 1076, 1175, 1314, 1315, 1455, 1456, 1508, 1555, 1579, 1580, 1633, 1634, 1705, 1706, 1762, 1763, 1772, 1773, 1813, 1873, 2015, 2062, 2132, 2133, 2161, 2162, 2239, 2240, 2308, 2309, 2315, 2322, 2362, 2479, 2526, 2541, 2542, 2632, 2719, 2759, 3163, 3204, 3317, 3364, 3379, 3380, 3421, 3422, 3480, 3520, 3552, 3553, 3799, 3800, 3947, 3948, 4105, 4106, 4479, 4480, 4589, 4630, 4853, 4894, 5012, 5013, 5014, 5015, 5128, 5129, 5156, 5196, 5251, 5271, 5281, 5296, 5297, 5799, 5809, 6116, 6157, 6158, 6173, 6174, 6215, 6216, 6274, 6275, 6315, 6316, 6317, 6344, 6345, 6392, 6438 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6438, "ccnet_original_nlines": 120, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.4091503322124481, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03921569138765335, "rps_doc_frac_lines_end_with_ellipsis": 0.09090909361839294, "rps_doc_frac_no_alph_words": 0.26143792271614075, "rps_doc_frac_unique_words": 0.32003626227378845, "rps_doc_mean_word_length": 4.404351711273193, "rps_doc_num_sentences": 85, "rps_doc_symbol_to_word_ratio": 0.013071900233626366, "rps_doc_unigram_entropy": 5.221156597137451, "rps_doc_word_count": 1103, "rps_doc_frac_chars_dupe_10grams": 0.10662823915481567, "rps_doc_frac_chars_dupe_5grams": 0.18937833607196808, "rps_doc_frac_chars_dupe_6grams": 0.1502676010131836, "rps_doc_frac_chars_dupe_7grams": 0.14368052780628204, "rps_doc_frac_chars_dupe_8grams": 0.14368052780628204, "rps_doc_frac_chars_dupe_9grams": 0.14368052780628204, "rps_doc_frac_chars_top_2gram": 0.02799505926668644, "rps_doc_frac_chars_top_3gram": 0.052696578204631805, "rps_doc_frac_chars_top_4gram": 0.014820910058915615, "rps_doc_books_importance": -654.4625244140625, "rps_doc_books_importance_length_correction": -654.4625244140625, "rps_doc_openwebtext_importance": -386.5771179199219, "rps_doc_openwebtext_importance_length_correction": -386.5771179199219, "rps_doc_wikipedia_importance": -334.95343017578125, "rps_doc_wikipedia_importance_length_correction": -334.95343017578125 }, "fasttext": { "dclm": 0.07854962348937988, "english": 0.9210982918739319, "fineweb_edu_approx": 1.6153783798217773, "eai_general_math": 0.8612246513366699, "eai_open_web_math": 0.4724830389022827, "eai_web_code": 0.08617269992828369 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.4", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "2", "label": "Click Here References" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
-7,425,634,964,121,461,000
re: Immutable Paper VIEW POST VIEW FULL DISCUSSION   i was digging the nice prosemirror module, which implements immutability at the core of an html wysiwyg editor. That module uses two core immutability concepts: • states (immutable, two states cannot be merged) • transactions (propagates changes to other states, can accumulate) When using it and reading the docs, i was struck by how these two concepts are perfectly implemented as: • matter (fermions, two particules cannot be in the same state) • interactions (bosons, propagates changes to fermions, can "accumulate" too) The analogy seems to be so deep i didn't yet found the bottom of it. Even the way we describe the universe uses the concept of immutability :)   I'm not sure if I know enough about the physics you're talking about. I do remember that Haskell's source control system used quantum entanglement math to model the interaction of patches.   Precisely: it follows (well, almost) directly from the non-commutativity of the interaction particles (which propagate state change). It's crazy shit ! code of conduct - report abuse
{ "url": "https://dev.to/kapouer/comment/i73", "source_domain": "dev.to", "snapshot_id": "crawl=CC-MAIN-2019-04", "warc_metadata": { "Content-Length": "98876", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:PCQX5JIUBNETR7GMN4KV2NGIB6NXYDSA", "WARC-Concurrent-To": "<urn:uuid:e9e301e1-2a5b-4485-92ac-82602c2d4de6>", "WARC-Date": "2019-01-18T05:19:32Z", "WARC-IP-Address": "151.101.66.217", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:HSFNYVTI7L7UFARH7BPKQMJUZW7QJRFS", "WARC-Record-ID": "<urn:uuid:20c259d6-56a3-463f-b728-497458f8b112>", "WARC-Target-URI": "https://dev.to/kapouer/comment/i73", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:703b952a-4c72-466a-89f1-42feadf36908>" }, "warc_info": "isPartOf: CC-MAIN-2019-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-81-203-254.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 30, 31, 52, 54, 55, 216, 217, 269, 339, 340, 445, 446, 512, 592, 593, 662, 736, 737, 739, 740, 929, 930, 932, 933, 1085, 1086 ], "line_end_idx": [ 30, 31, 52, 54, 55, 216, 217, 269, 339, 340, 445, 446, 512, 592, 593, 662, 736, 737, 739, 740, 929, 930, 932, 933, 1085, 1086, 1116 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1116, "ccnet_original_nlines": 26, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.39908257126808167, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03669724985957146, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.197247713804245, "rps_doc_frac_unique_words": 0.676300585269928, "rps_doc_mean_word_length": 5.057803630828857, "rps_doc_num_sentences": 7, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.535290241241455, "rps_doc_word_count": 173, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.00914285983890295, "rps_doc_frac_chars_top_3gram": 0.04342857003211975, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -107.78462982177734, "rps_doc_books_importance_length_correction": -107.78462982177734, "rps_doc_openwebtext_importance": -58.497772216796875, "rps_doc_openwebtext_importance_length_correction": -51.37069320678711, "rps_doc_wikipedia_importance": -45.4601936340332, "rps_doc_wikipedia_importance_length_correction": -45.4601936340332 }, "fasttext": { "dclm": 0.1810009479522705, "english": 0.8910129070281982, "fineweb_edu_approx": 3.0492162704467773, "eai_general_math": 0.9118424654006958, "eai_open_web_math": 0.5010278820991516, "eai_web_code": 0.09840422868728638 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "530.12", "labels": { "level_1": "Science and Natural history", "level_2": "Physics", "level_3": "" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "5", "label": "Comment Section" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
6,757,033,709,265,876,000
Docker学习笔记(一)— Docker安装与卸载、配置阿里云镜像加速 Docker Alice 8个月前 (12-07) 319次浏览 0个评论 安装 Docker 一、环境准备 CentOS 7 以上 二、环境查看 # 系统内核是 3.10 以上的 [root@cloud /]# uname -r 3.10.0-957.10.1.el7.x86_64 # 系统版本 [root@cloud /]# cat /etc/os-release NAME="CentOS Linux" VERSION="7 (Core)" ID="centos" ID_LIKE="rhel fedora" VERSION_ID="7" PRETTY_NAME="CentOS Linux 7 (Core)" ANSI_COLOR="0;31" CPE_NAME="cpe:/o:centos:centos:7" HOME_URL="https://www.centos.org/" BUG_REPORT_URL="https://bugs.centos.org/" CENTOS_MANTISBT_PROJECT="CentOS-7" CENTOS_MANTISBT_PROJECT_VERSION="7" 三、安装 # 1、卸载旧的版本 [root@cloud /]# yum remove docker \ docker-client \ docker-client-latest \ docker-common \ docker-latest \ docker-latest-logrotate \ docker-logrotate \ docker-engine # 2、需要的安装包 [root@cloud /]# yum install -y yum-utils #3、设置镜像的仓库 [root@cloud /]# yum-config-manager \ --add-repo \ https://download.docker.com/linux/centos/docker-ce.repo # 默认是从国外的,速度慢 [root@cloud /]# yum-config-manager \ --add-repo \ http://mirrors.aliyun.com/docker-ce/linux/centos/docker-ce.repo # 推荐使用阿里云的,速度快 # 安装 docker 之前,更新 yum 软件包索引 [root@cloud /]# yum makecache fast # 4、安装 docker 相关的内容 docker-ce 社区版 ee 企业版 [root@cloud /]# yum install docker-ce docker-ce-cli containerd.io # 5、启动 docker [root@cloud /]# systemctl start docker # 6、使用 docker version 查看是否安装成功 docker version Docker 学习笔记(一)— Docker 安装与卸载、配置阿里云镜像加速 # 7、测试 hello-world 能否正常使用 docker run hello-world Docker 学习笔记(一)— Docker 安装与卸载、配置阿里云镜像加速 # 8、查看一下下载的 hello-world 镜像 # docker images [root@cloud /]# docker images REPOSITORY TAG IMAGE ID CREATED SIZE hello-world latest feb5d9fea6a5 2 months ago 13.3kB 四、阿里云镜像加速 1、登录阿里云找到容器服务 Docker 学习笔记(一)— Docker 安装与卸载、配置阿里云镜像加速 2、找到镜像加速地址 Docker 学习笔记(一)— Docker 安装与卸载、配置阿里云镜像加速 3、配置使用 sudo mkdir -p /etc/docker sudo tee /etc/docker/daemon.json <<-'EOF' { "registry-mirrors": ["https://gsuetlfm.mirror.aliyuncs.com"] } EOF sudo systemctl daemon-reload sudo systemctl restart docker 卸载 docker # 1、卸载依赖 yum remove docker-ce docker-ce-cli containerd.io # 2、删除资源 rm -rf /var/lib/docker # /var/lib/docker docker 的默认工作路径   分享:Docker学习视频地址:【狂神说 Java】Docker 最新超详细版教程通俗易懂 女程序员博客 , 版权所有丨本站采用BY-NC-SA协议进行授权 , 转载请注明Docker 学习笔记(一)— Docker 安装与卸载、配置阿里云镜像加速 【声明】:本博客仅为分享信息,不参与任何交易,也非中介,所有内容仅代表个人观点,均不作直接、间接、法定、约定的保证,读者购买风险自担。一旦您访问本博客,即表示您已经知晓并接受了此声明通告。 【关于安全】:任何 IDC 都有倒闭和跑路的可能,备份永远是最佳选择,服务器也是机器,不勤备份是对自己极不负责的表现,请保持良好的备份习惯。 喜欢 (3) 发表我的评论 取消评论 表情 贴图 加粗 删除线 居中 斜体 签到 Hi,您需要填写昵称和邮箱! • 昵称 (必填) • 邮箱 (必填) • 网址
{ "url": "https://www.91tm.org/8983.html", "source_domain": "www.91tm.org", "snapshot_id": "crawl=CC-MAIN-2022-33", "warc_metadata": { "Content-Length": "30245", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:7GAWZEBMOMAA3C7JJLOJQDB7FM2TGYNP", "WARC-Concurrent-To": "<urn:uuid:4048c956-56e9-4dfb-aa69-f43fe9ed1723>", "WARC-Date": "2022-08-18T14:31:30Z", "WARC-IP-Address": "45.138.81.151", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:PC6X7DEXD6FIKNFS3CTLFNSHPPCZGT7Q", "WARC-Record-ID": "<urn:uuid:51092bb9-46fb-47b4-940d-b16deae65195>", "WARC-Target-URI": "https://www.91tm.org/8983.html", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a0e28aa0-f9be-4725-b6b4-6dcfeb8ac723>" }, "warc_info": "isPartOf: CC-MAIN-2022-33\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-222\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 37, 38, 76, 77, 87, 88, 95, 96, 108, 109, 116, 117, 134, 159, 186, 193, 229, 249, 268, 280, 302, 317, 353, 371, 405, 440, 482, 483, 518, 554, 555, 560, 561, 572, 608, 642, 683, 717, 751, 795, 832, 864, 875, 916, 917, 928, 965, 982, 1057, 1058, 1095, 1112, 1196, 1224, 1259, 1302, 1368, 1382, 1421, 1452, 1467, 1468, 1507, 1508, 1534, 1557, 1558, 1597, 1598, 1625, 1641, 1671, 1730, 1791, 1792, 1802, 1803, 1817, 1856, 1867, 1906, 1913, 1914, 1940, 1982, 1984, 2047, 2049, 2053, 2082, 2112, 2113, 2123, 2124, 2133, 2182, 2183, 2192, 2215, 2216, 2251, 2252, 2254, 2255, 2301, 2302, 2303, 2382, 2383, 2478, 2479, 2550, 2551, 2558, 2565, 2570, 2592, 2593, 2608, 2609, 2621, 2633 ], "line_end_idx": [ 37, 38, 76, 77, 87, 88, 95, 96, 108, 109, 116, 117, 134, 159, 186, 193, 229, 249, 268, 280, 302, 317, 353, 371, 405, 440, 482, 483, 518, 554, 555, 560, 561, 572, 608, 642, 683, 717, 751, 795, 832, 864, 875, 916, 917, 928, 965, 982, 1057, 1058, 1095, 1112, 1196, 1224, 1259, 1302, 1368, 1382, 1421, 1452, 1467, 1468, 1507, 1508, 1534, 1557, 1558, 1597, 1598, 1625, 1641, 1671, 1730, 1791, 1792, 1802, 1803, 1817, 1856, 1867, 1906, 1913, 1914, 1940, 1982, 1984, 2047, 2049, 2053, 2082, 2112, 2113, 2123, 2124, 2133, 2182, 2183, 2192, 2215, 2216, 2251, 2252, 2254, 2255, 2301, 2302, 2303, 2382, 2383, 2478, 2479, 2550, 2551, 2558, 2565, 2570, 2592, 2593, 2608, 2609, 2621, 2633, 2639 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2639, "ccnet_original_nlines": 122, "rps_doc_curly_bracket": 0.0007578600198030472, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.02170543000102043, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.037209298461675644, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.631007730960846, "rps_doc_frac_unique_words": 0.6742081642150879, "rps_doc_mean_word_length": 8.547511100769043, "rps_doc_num_sentences": 25, "rps_doc_symbol_to_word_ratio": 0.041860468685626984, "rps_doc_unigram_entropy": 4.638360023498535, "rps_doc_word_count": 221, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.03705663979053497, "rps_doc_frac_chars_top_3gram": 0.0767601877450943, "rps_doc_frac_chars_top_4gram": 0.07411328703165054, "rps_doc_books_importance": -364.6654968261719, "rps_doc_books_importance_length_correction": -364.6654968261719, "rps_doc_openwebtext_importance": -168.024658203125, "rps_doc_openwebtext_importance_length_correction": -168.024658203125, "rps_doc_wikipedia_importance": -147.7030029296875, "rps_doc_wikipedia_importance_length_correction": -147.7030029296875 }, "fasttext": { "dclm": 0.28692710399627686, "english": 0.060142360627651215, "fineweb_edu_approx": 1.7262985706329346, "eai_general_math": 0.04692738875746727, "eai_open_web_math": 0.00009285999840358272, "eai_web_code": 0.39884597063064575 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.445", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.028", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-8,924,864,080,229,339,000
Take the 2-minute tour × Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free. I am hoping that someone will help me out with a really frustrating problem I have. Currently I am trying to get Spring Security 3.0 Web App to authenticate with an AD LDS instance but I keep getting this error 'Bad Credentials'. Unfortunately I dont have anything more to go on at the moment. Below is a copy of the Security configuration being used: <authentication-manager alias="ldapAuthenicationManager"> <ldap-authentication-provider user-dn-pattern="CN={0},OU=Users,O=JLP,C=UK" > </ldap-authentication-provider> </authentication-manager> <ldap-server url="ldap://servner ip/o=JLP,c=UK" manager-dn="CN=Manager,O=JLP,C=UK" manager-password="manager" /> I suspect the problem is caused by the <Ldap server> tag and that the manager-dn is not configured correctly. The DN of the Manager is copied directly from AD LDS - have I not provided enough information? Or does the password need to encrypted\hashed? Has anyone done anything like this with LDS - how did you work around this problem? Applogies that this is so vague, but this is as much information as I have to go on. Does any one have any suggestions of things to look at or for solutions? All help is gratefully recieved! Cheers Mo share|improve this question 4 Answers 4 I am not sure if things would be significantly different for LDS but can you try upgrading to spring security 3.1 as it has a specialized Authenticator for AD. It does not need manager account as it tries to bind using the username/password being authenticated. Also the configuration is minimal (No DN, search pattern, etc to be provided) <security:authentication-manager> <security:authentication-provider ref="activeDirectoryAuthenticationProvider"/> </security:authentication-manager> <bean id="activeDirectoryAuthenticationProvider" class="org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider"> <constructor-arg value="${activedirectory.domain}" /> <constructor-arg value="${activedirectory.server}" /> <property name="convertSubErrorCodesToExceptions" value="true"/> </bean> where domain = example.com (from your example, jlp.uk) and server = ldap://ip share|improve this answer I remember that I came across with the same issue and the solution was to set the value of manager-dn to manageruser@yourdomain e.g. <ldap-server url="ldap://servner ip/o=JLP,c=UK" manager-dn="[email protected]" manager-password="manager" /> share|improve this answer Thanks for your answers they were very helpful. Also found that the user account you are using for the manager-dn needs to be added to the reader role within LDS to allow it to search. If you add the user role to the Administrators group you can connect but not search. Cheers for your help share|improve this answer Slight necromancy here, but for those who stumble across this via Google, the most helpful tool I found regarding configuring my LDAP connection was to install Apache Directory Studio LDAP browser. It was via this tool that I was able to get verbose enough error messages to discover what was wrong with my LDAP configuration, and how to correct it. share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
{ "url": "http://stackoverflow.com/questions/7438246/configuring-spring-security-ldap-3-0-to-work-with-active-directory-lds", "source_domain": "stackoverflow.com", "snapshot_id": "crawl=CC-MAIN-2015-32", "warc_metadata": { "Content-Length": "81831", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:I5CXRIUDJ4E3X2P5LPFCXQWZNTMMCSUN", "WARC-Concurrent-To": "<urn:uuid:cab5238c-4b42-43b6-82f6-85ea21b8163c>", "WARC-Date": "2015-08-01T03:10:20Z", "WARC-IP-Address": "104.16.105.85", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:IDC5BG2536VYNWZNTMLT7N4KHTKDFIFV", "WARC-Record-ID": "<urn:uuid:225b9363-eb1c-46db-8b10-88bdd3e9d9f3>", "WARC-Target-URI": "http://stackoverflow.com/questions/7438246/configuring-spring-security-ldap-3-0-to-work-with-active-directory-lds", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:b63166a4-3dc9-4c07-843b-b4174505c246>" }, "warc_info": "robots: classic\r\nhostname: ip-10-236-191-2.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-32\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for August 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 25, 131, 132, 216, 217, 427, 428, 486, 487, 546, 627, 685, 686, 799, 800, 1052, 1053, 1137, 1138, 1296, 1297, 1330, 1331, 1338, 1339, 1342, 1343, 1371, 1372, 1384, 1385, 1545, 1546, 1726, 1727, 1761, 1845, 1880, 1881, 1930, 2041, 2099, 2157, 2226, 2234, 2235, 2313, 2314, 2340, 2341, 2469, 2470, 2475, 2476, 2589, 2615, 2616, 2664, 2665, 2802, 2803, 2888, 2889, 2910, 2911, 2937, 2938, 3288, 3289, 3315, 3316, 3328, 3329, 3331, 3339, 3340, 3418, 3419 ], "line_end_idx": [ 25, 131, 132, 216, 217, 427, 428, 486, 487, 546, 627, 685, 686, 799, 800, 1052, 1053, 1137, 1138, 1296, 1297, 1330, 1331, 1338, 1339, 1342, 1343, 1371, 1372, 1384, 1385, 1545, 1546, 1726, 1727, 1761, 1845, 1880, 1881, 1930, 2041, 2099, 2157, 2226, 2234, 2235, 2313, 2314, 2340, 2341, 2469, 2470, 2475, 2476, 2589, 2615, 2616, 2664, 2665, 2802, 2803, 2888, 2889, 2910, 2911, 2937, 2938, 3288, 3289, 3315, 3316, 3328, 3329, 3331, 3339, 3340, 3418, 3419, 3509 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3509, "ccnet_original_nlines": 78, "rps_doc_curly_bracket": 0.0017098899697884917, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.34520548582077026, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.05616438016295433, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.2493150681257248, "rps_doc_frac_unique_words": 0.5202558636665344, "rps_doc_mean_word_length": 5.867804050445557, "rps_doc_num_sentences": 37, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.095280170440674, "rps_doc_word_count": 469, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.029069770127534866, "rps_doc_frac_chars_top_3gram": 0.031976740807294846, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -297.404052734375, "rps_doc_books_importance_length_correction": -297.404052734375, "rps_doc_openwebtext_importance": -183.25167846679688, "rps_doc_openwebtext_importance_length_correction": -183.25167846679688, "rps_doc_wikipedia_importance": -133.71446228027344, "rps_doc_wikipedia_importance_length_correction": -133.71446228027344 }, "fasttext": { "dclm": 0.03674805164337158, "english": 0.8944247961044312, "fineweb_edu_approx": 1.2020515203475952, "eai_general_math": 0.0024810999166220427, "eai_open_web_math": 0.1457926630973816, "eai_web_code": 0.0022010800894349813 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.445", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "1", "label": "Leftover HTML" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
7,122,098,154,062,389,000
How to Safely Gain Weight The majority of Americans are overweight, but some people have the opposite issue. They weigh too little instead of too much. Being underweight carries similar risks to being overweight, so it’s essential to take steps to reach and maintain a healthy weight. We created this guide for informational purposes only. You should always contact your doctor or a dietician before you make any changes to your normal diet. How Do You Define “Underweight?” Your Body Mass Index (BMI) indicates your weight, depending on your height and other factors. You’re considered underweight if your BMI is less than 18.5. The National Institute of Health has a healthy weight calculator to make it easier to determine if you’re at an appropriate weight. If you’re underweight, it might be from limited nutrition or an underlying condition. Underweight people can face a few health problems if they don’t take steps to correct any underlying issues. These health issues include: • A weaker immune system. You’re more likely to fall ill if you’re underweight. • Nutrient deficiencies that may evolve into more severe conditions, such as osteoporosis or anemia. • Women may experience fertility issues if they’re underweight. “Weight loss and weight gain are sensitive subjects to everyone. Just because a person weighs a specific amount, or looks like they weigh a specific amount, doesn’t mean they are healthy or unhealthy,” says Brittany Ford, RHN.   “It is easy to misconstrue a person’s health status by their appearance. This is especially evident for those who are underweight. While society tends to praise thinner people, a lot of underweight people are dealing with serious health conditions. These can range from eating disorders to hormonal imbalances to mental health issues,” she adds.  Common Reasons for Low Body Weight Bodyweight fluctuations are normal. However, if you lose more than 5 percent of your weight over 6 to 12 months with no clear explanation, it’s best to speak with your doctor about possible causes and what you might need to do to regain the weight. Weight loss is normal after a recent stressful event, such as the loss of a loved one or a significant lifestyle change. Once you’ve had time to adjust to the change and are feeling happier, your weight should return to normal. You may want to consider psychotherapy to make the transition smoother. Eating disorders are another common reason that people lose too much weight. People of all backgrounds can develop an eating disorder such as anorexia or bulimia. Other causes of unintentional weight loss include: Not All Fats Are Equal Many people see all dietary fats as bad, but it’s not quite that simple. Healthy fats are a source of energy. Your body uses fats to absorb needed vitamins and minerals and build cells. Adding extra healthy fats to your diet can help with weight gain, as fat is calorically dense at about 9 calories per gram, compared to protein and carbohydrates that have about 4 calories. There’s monounsaturated and polyunsaturated fats, saturated fats, and trans fats. You’ll find healthy monounsaturated and polyunsaturated fats in fish, vegetables, nuts, and seeds, not junk food. Monounsaturated and Polyunsaturated Fats These are the beneficial fats everyone needs to consume. Monounsaturated and polyunsaturated fats differ from each other in their carbon chain structures. Monounsaturated fats are in various oils (olive oil, peanut oil, canola oil, and certain safflower and sunflower oils), avocados, and nuts. A 1960s study conducted in the Mediterranean region was the first to link olive oil and its monounsaturated fats with reduced heart disease risk. Polyunsaturated fats are in other oils (corn oil, safflower oil, sunflower oil, walnut oil, soybean oil, canola oil), various fish (salmon, mackerel, sardines), walnuts, and flaxseeds. Eating polyunsaturated fats instead of saturated fats can lower harmful cholesterol and triglycerides. Saturated Fats Saturated fats are a common diet staple. You’ll find them in red meat, whole milk products, cheese, coconut oil, and more. They’re not quite a “good” fat, but you don’t have to entirely cut them out of your diet. Eating a lot of saturated fats can increase your total cholesterol and block your arteries. Many experts recommend limiting saturated fats to under 10 percent of your daily calorie intake. Trans Fats If there are any fats you should avoid completely, the answer is trans fats. They have no safe levels of consumption and offer no health benefits. Ingesting trans fats can increase your risk of heart disease, stroke, diabetes, and other chronic medical conditions. Artificial trans fats are banned in the United States and other countries. Healthy Ways to Gain Weight When aiming to gain weight, it is very important to do so under the supervision of a professional and to address the person as a whole. Ideally, we want to look at their mental, physical and spiritual health, as well as the necessary tests that accompany these areas.  “Weight gain can be done properly when the person is supported well and any underlying issues are first and foremost addressed,” says Brittany Ford.  Safe weight gain isn’t just about adding in high-fat foods. That kind of diet can increase belly fat, rather than create a mix of muscle and subcutaneous fat As we mentioned earlier, some fats are healthier than others. It’s better if your food intake incorporates “good” fatty foods instead of junk food. Foods you should focus on include whole-grain products, lean proteins, nuts and seeds, fruits and vegetables, and dairy. An occasional treat is okay, but you want to be careful not to overeat sugar and saturated fat. The secret to gaining weight is to eat more calories than your body can burn. A calorie calculator can help you determine how much you need to eat to maintain your weight. Add a few hundred more calories, about 300 to 500, to safely gain weight. You should discuss with your doctor safe ways to gain weight before you make any major lifestyle changes. We’ll discuss some of the more common methods. Meals Eating more meals can be a simple path toward weight gain. Instead of three regular meals, eat five to six smaller meals. You can also “fill out” a meal with some extras. Sprinkle some cheese on eggs or vegetables, or bulk up a stew with some meat or dried milk. In between meals, you can snack on nuts, fruits, avocados, and simple sandwiches. Beverages You may want to watch what and when you drink. Occasionally, people find their appetites are suppressed if they drink before a meal. It might be better to drink during or after a meal instead. On a related note, you shouldn’t drink too much soda, coffee, and other beverages with few nutrients and calories. Try a smoothie or even a liquid meal replacement instead. It’s also a good idea to avoid water close to bedtime. Otherwise, you might experience sleep interruptions. Exercises Eating and drinking isn’t the only way to gain weight. You can also try exercising to bulk up your muscle mass. Focusing on strength and resistance training, as well as typical aerobic activities, can further help you build up your muscles. Exercising can also increase your appetite. Frequently Asked Questions What home remedies can I use to gain weight? One of the simplest ways to improve your appetite is to watch what and when you drink. Some people find they feel less hungry if they drink shortly before they eat, even if it's just water. You might want to try rehydrating yourself about half an hour after you eat. You can also increase your daily number of meals. Instead of the usual three, you can have five or six small meals. Plus, try garnishing your meals with extra protein. Plenty of meals taste great with added cheese, and you can thicken a stew or soup with some dried milk Is there a pill to gain weight? Some drugs and supplements are designed to help you gain weight. Some are over the counter products and unregulated. We advise caution with these pills and supplements, as few are backed by scientific evidence. The other option is prescription pills, which may be recommended for patients recovering from an illness that involved weight loss. Your doctor can help you decide if a prescription is right for you. Can you survive on just vegetables? It’s not advisable to try and survive on just one food group. We need variance in our diet to acquire all the nutrients we need. Eating only vegetables would deprive us of the fats and proteins we need to survive. Which fruit is the healthiest? It’s difficult to say what’s the best fruit to eat, especially since scientists are still studying their benefits. Pineapple is a good choice since one cup provides your daily recommended dose of vitamin C. Plus, pineapple has anti-inflammatory properties. There’s also grapefruit, which reduces insulin levels and resistance and decreases the chances of urinary stones. Finally, avocados are full of healthy fats, potassium, fiber, and magnesium. We recommend incorporating a variety of fruits into your diet. What are the three foods to never eat? Three foods you might better off without include: • Sugary drinks. Not only can these drinks drastically increase your daily sugar intake, but you might not realize how many calories you’re ingesting when you drink. And because their liquid calories don’t register with your body the way solid food calories do, it’s easy to overindulge. • Sugar-filled breakfast cereals. Some of the more popular cereals can be as unhealthy as a bowl of candy. • High-calorie coffee drinks. A simple coffee drink can be good for you. For example, many athletes enjoy coffee before a workout. However, too much cream, sugar, and syrup can negate the benefits that plain coffee offers. Did We Help? It’s important to understand that healthy weight gains may not be immediate. You may require a few days or even weeks to bulk up and reach a healthy weight. Remember that your weight shouldn’t just come from junk food but wholesome meals that build up your muscle mass and subcutaneous fat. This article is for informational purposes and should not replace advice from your doctor or other medical professional. James Nguyen, Sleep Expert James Nguyen James Nguyen is Zoma's resident sleep expert and staff writer. James enjoys learning about the newest technologies in the mattress industry and doing deep dives into the science of sleep. He's tried nearly every gadget and gizmo in an effort to determine which sleep-promoting accessories can truly enhance your shut-eye. Outside of work, James takes his dedication to get healthy sleep seriously, and has even declared himself an "expert napper." View all posts Leave a Comment Your email address will not be published. Required fields are marked * We think you’ll also enjoy…
{ "url": "https://zomasleep.com/blog/how-to-safely-gain-weight", "source_domain": "zomasleep.com", "snapshot_id": "crawl=CC-MAIN-2020-45", "warc_metadata": { "Content-Length": "73262", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:X4UXMO2I2GSLY4PCU4UAMZAKRQRDMWKS", "WARC-Concurrent-To": "<urn:uuid:f9d4b9cc-3882-4151-9a21-8fe9db64cfff>", "WARC-Date": "2020-10-20T22:44:13Z", "WARC-IP-Address": "54.161.213.102", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:LQX2X7NR6AZMPAPPI6DLFI7MCCGVOROO", "WARC-Record-ID": "<urn:uuid:d651d63c-b8e1-45a0-b86b-b0c38cab8570>", "WARC-Target-URI": "https://zomasleep.com/blog/how-to-safely-gain-weight", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:58ac8647-57b9-4782-aaa2-67c8bb39dd5d>" }, "warc_info": "isPartOf: CC-MAIN-2020-45\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-18.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 26, 27, 286, 287, 444, 445, 478, 479, 766, 767, 991, 992, 1074, 1177, 1243, 1244, 1473, 1474, 1821, 1822, 1857, 1858, 2107, 2108, 2408, 2409, 2572, 2573, 2624, 2625, 2648, 2649, 3025, 3026, 3222, 3223, 3264, 3265, 3420, 3421, 3707, 3708, 3996, 3997, 4012, 4013, 4226, 4227, 4416, 4417, 4428, 4429, 4694, 4695, 4770, 4771, 4799, 4800, 5069, 5070, 5220, 5221, 5527, 5528, 5745, 5746, 5992, 5993, 6146, 6147, 6153, 6154, 6417, 6418, 6500, 6501, 6511, 6512, 6705, 6706, 6879, 6880, 6988, 6989, 6999, 7000, 7285, 7286, 7313, 7314, 7359, 7360, 7627, 7628, 7899, 7900, 7932, 7933, 8144, 8145, 8345, 8346, 8382, 8383, 8597, 8598, 8629, 8630, 8887, 8888, 9142, 9143, 9182, 9183, 9233, 9234, 9524, 9633, 9858, 9859, 9872, 9873, 10164, 10165, 10286, 10287, 10327, 10328, 10776, 10777, 10792, 10793, 10809, 10810, 10881, 10882 ], "line_end_idx": [ 26, 27, 286, 287, 444, 445, 478, 479, 766, 767, 991, 992, 1074, 1177, 1243, 1244, 1473, 1474, 1821, 1822, 1857, 1858, 2107, 2108, 2408, 2409, 2572, 2573, 2624, 2625, 2648, 2649, 3025, 3026, 3222, 3223, 3264, 3265, 3420, 3421, 3707, 3708, 3996, 3997, 4012, 4013, 4226, 4227, 4416, 4417, 4428, 4429, 4694, 4695, 4770, 4771, 4799, 4800, 5069, 5070, 5220, 5221, 5527, 5528, 5745, 5746, 5992, 5993, 6146, 6147, 6153, 6154, 6417, 6418, 6500, 6501, 6511, 6512, 6705, 6706, 6879, 6880, 6988, 6989, 6999, 7000, 7285, 7286, 7313, 7314, 7359, 7360, 7627, 7628, 7899, 7900, 7932, 7933, 8144, 8145, 8345, 8346, 8382, 8383, 8597, 8598, 8629, 8630, 8887, 8888, 9142, 9143, 9182, 9183, 9233, 9234, 9524, 9633, 9858, 9859, 9872, 9873, 10164, 10165, 10286, 10287, 10327, 10328, 10776, 10777, 10792, 10793, 10809, 10810, 10881, 10882, 10909 ] }
{ "red_pajama_v2": { "ccnet_original_length": 10909, "ccnet_original_nlines": 136, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.40160074830055237, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.004237290006130934, "rps_doc_frac_lines_end_with_ellipsis": 0.007299270015209913, "rps_doc_frac_no_alph_words": 0.14171375334262848, "rps_doc_frac_unique_words": 0.3762541711330414, "rps_doc_mean_word_length": 4.898550510406494, "rps_doc_num_sentences": 124, "rps_doc_symbol_to_word_ratio": 0.0004708099877461791, "rps_doc_unigram_entropy": 5.773694038391113, "rps_doc_word_count": 1794, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.005917159840464592, "rps_doc_frac_chars_dupe_6grams": 0.005917159840464592, "rps_doc_frac_chars_dupe_7grams": 0.005917159840464592, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.01024124026298523, "rps_doc_frac_chars_top_3gram": 0.008192989975214005, "rps_doc_frac_chars_top_4gram": 0.01684115082025528, "rps_doc_books_importance": -878.5838623046875, "rps_doc_books_importance_length_correction": -878.5838623046875, "rps_doc_openwebtext_importance": -600.4848022460938, "rps_doc_openwebtext_importance_length_correction": -600.4848022460938, "rps_doc_wikipedia_importance": -435.03564453125, "rps_doc_wikipedia_importance_length_correction": -435.03564453125 }, "fasttext": { "dclm": 0.059736669063568115, "english": 0.9505068063735962, "fineweb_edu_approx": 2.5947489738464355, "eai_general_math": 0.009375450201332569, "eai_open_web_math": 0.14290934801101685, "eai_web_code": 0.0005322099896147847 } }
{ "free_decimal_correspondence": { "primary": { "code": "613.2", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Health and Hygiene" } }, "secondary": { "code": "613.7", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Health and Hygiene" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "9", "label": "FAQ" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
1,989,106,097,479,965,700
WordPress.org Plugin Directory Custom Header Extended Allows users to create a custom header on a per-post basis. 1. Upload the custom-header-extended folder to your /wp-content/plugins/ directory. 2. Activate the "Custom Header Extended" plugin through the "Plugins" menu in WordPress. 3. Edit a post to add a custom header. Requires: 3.6 or higher Compatible up to: 3.9.6 Last Updated: 2014-5-17 Active Installs: 4,000+ Ratings 5 out of 5 stars Support 0 of 2 support threads in the last two months have been resolved. Got something to say? Need help? Compatibility + = Not enough data 0 people say it works. 0 people say it's broken. 100,1,1 100,3,3 100,1,1 100,1,1 50,2,1
{ "url": "https://wordpress.org/plugins/custom-header-extended/installation/", "source_domain": "wordpress.org", "snapshot_id": "crawl=CC-MAIN-2015-22", "warc_metadata": { "Content-Length": "32811", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:E2NTCKZMH77RQQ4JL5DFQPVZA3EV4X5W", "WARC-Concurrent-To": "<urn:uuid:45520b88-068e-4bf6-bb56-319027beb24b>", "WARC-Date": "2015-05-25T11:50:08Z", "WARC-IP-Address": "66.155.40.250", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:QTXGEWLT27I6ZI2DZ36DNW43NOFQBLUO", "WARC-Record-ID": "<urn:uuid:85274c8c-2270-49f2-9d81-058ab88c3e5a>", "WARC-Target-URI": "https://wordpress.org/plugins/custom-header-extended/installation/", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:8c8356c2-5fb0-4217-bc88-ae93f9898fb4>" }, "warc_info": "robots: classic\r\nhostname: ip-10-180-206-219.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-22\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for May 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 14, 15, 32, 33, 56, 57, 117, 118, 204, 295, 336, 337, 361, 385, 409, 433, 434, 442, 443, 460, 461, 469, 470, 536, 537, 570, 571, 585, 586, 588, 590, 606, 607, 630, 656, 657, 665, 673, 681, 689 ], "line_end_idx": [ 14, 15, 32, 33, 56, 57, 117, 118, 204, 295, 336, 337, 361, 385, 409, 433, 434, 442, 443, 460, 461, 469, 470, 536, 537, 570, 571, 585, 586, 588, 590, 606, 607, 630, 656, 657, 665, 673, 681, 689, 695 ] }
{ "red_pajama_v2": { "ccnet_original_length": 695, "ccnet_original_nlines": 40, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.2078651636838913, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.4606741666793823, "rps_doc_frac_unique_words": 0.7009345889091492, "rps_doc_mean_word_length": 4.850467205047607, "rps_doc_num_sentences": 17, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.168358325958252, "rps_doc_word_count": 107, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.09248554706573486, "rps_doc_frac_chars_top_3gram": 0.07707128673791885, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -59.84234619140625, "rps_doc_books_importance_length_correction": -62.3978271484375, "rps_doc_openwebtext_importance": -40.77225875854492, "rps_doc_openwebtext_importance_length_correction": -43.32773971557617, "rps_doc_wikipedia_importance": -24.66967010498047, "rps_doc_wikipedia_importance_length_correction": -27.22515106201172 }, "fasttext": { "dclm": 0.2966066002845764, "english": 0.7937816977500916, "fineweb_edu_approx": 0.9668132662773132, "eai_general_math": 0.0025950700510293245, "eai_open_web_math": 0.06365233659744263, "eai_web_code": 0.00006615999882342294 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.452", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "1", "label": "Factual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "1", "label": "No Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-8,911,919,602,263,690,000
New answers tagged 1 I can run sudo ip link set eth0 up as much as I want, and it still shows as down. The output you posted contradicts this. eth0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 ip link sets this ^^ not this ^ To demonstrate: > ip link ... 1 To add to what @Ingo said, they actually have a third OUI now: E4-5F-01 Not sure why that happened either, but I have hardware with a MAC with that OUI. I'd have commented that, but don't have enough reputation. 0 I also tried using my Android phone to share mobile data using USB tethering but I still obtain the same behavior. I guess I have overrated the Raspberry Pi 4 a little too much... 0 Here's how to create a direct ethernet connection, presuming the interface is up (if not ip link set enp8s0 up):1 ip addr add 10.0.42.1/24 dev enp8s0 ip route add 10.0.42.2 dev enp8s0 src 10.0.42.1 That's one side; the configuration is symmetrical, meaning doing the other side is exactly the same except you swap 42.1 for 42.2 and vice versa. You don't have ... 0 There are a few other errors that happen prior to this but I'm not sure if they're relevant They're actually an hour previous (dunno if you noticed this). The bit after the hostname, if it isn't kernel, is a process name and PID (eg. bluetoothd[496]. The kernel stuff there isn't an error except for the note about dhcpcd (which is something that is spit out ... 1 As with pretty much any connector, search for "[connector name] breakout board", and you'll see tons of adapters from that connector to some sort of GPIO breakout. For example, here's an RJ-45 breakout board: 0 If the sensor only has two terminals of its rj45 port wired in, you can probably make a custom cable. Cut the end off of an ethernet cable and wire up the appropriate leads to gpio pins. Not as slick as you wanted, but worth a shot. IDK if the signaling voltage will be compatible, but there's tons of 3.3v and 5v logic out there, I reckon it's worth a try. 0 I just had the idea whether the problem is related to the Public vs Private categorization of your LAN Ethernet network within Windows: some features are configured differently for these. Mine for example, when used without a router on it, typically gets categorized as Public. On Windows, open Powershell with administrator rights, and issue the following: ... 0 I solved this by getting a lead over at the Pi Forums. See Ethernet Problems. It turns out my Ethernet is only running at 10/100. The Broadcom Chipset on the Pi4 doesn't support fallback from Gigabit to Fast Ethernet. As such I bought a USB 3.0 to Gigabit Ethernet Adapter TU3-ETG, which does support fallback, and is supported by the upstream linux kernel, ... -1 I stumbled on this question after experiencing the same issue with my RPi 4 crashing my Asus router. It turns out that my Pi's case fan was intermittently failing. When the fan stopped and the Pi got very warm, it also crashed the router. Replacing the case/fan and keeping an eye on the CPU temperature has helped: I haven't experienced any issues now that ... 1 Here's how I would do it - for multiple IP's you'll be creating a file in /etc/network/interfaces.d lets create /etc/network/interfaces.d/wlan0 - name doesn't matter really auto wlan0 iface wlan0 inet manual up ip address add 192.168.1.100/24 dev wlan0 label wlan0:0 up ip address add 192.168.1.101/24 dev wlan0 label wlan0:1 Clearly, you would use the ... Top 50 recent answers are included
{ "url": "https://raspberrypi.stackexchange.com/tags/ethernet/new", "source_domain": "raspberrypi.stackexchange.com", "snapshot_id": "crawl=CC-MAIN-2021-10", "warc_metadata": { "Content-Length": "109829", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:SEMECQXJQ2U7DNRSLVPFB4FP67ILZMPG", "WARC-Concurrent-To": "<urn:uuid:8f3b1671-2531-44a2-aa2f-3d67e275da7e>", "WARC-Date": "2021-03-02T05:22:07Z", "WARC-IP-Address": "151.101.65.69", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:QJ3CCUMS2GTKMEPE3C4JNSHIHQ42VAUZ", "WARC-Record-ID": "<urn:uuid:25fc49c8-7c67-4347-acad-959db3bfb730>", "WARC-Target-URI": "https://raspberrypi.stackexchange.com/tags/ethernet/new", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:7f32cbac-6e3c-45f8-86b8-0683b4d0a67a>" }, "warc_info": "isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-227.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 19, 20, 22, 23, 315, 316, 317, 319, 320, 532, 533, 534, 536, 537, 717, 718, 719, 721, 722, 1085, 1086, 1087, 1089, 1090, 1453, 1454, 1455, 1457, 1458, 1667, 1668, 1669, 1671, 1672, 2030, 2031, 2032, 2034, 2035, 2397, 2398, 2399, 2401, 2402, 2764, 2765, 2766, 2769, 2770, 3132, 3133, 3134, 3136, 3137, 3494, 3495, 3496 ], "line_end_idx": [ 19, 20, 22, 23, 315, 316, 317, 319, 320, 532, 533, 534, 536, 537, 717, 718, 719, 721, 722, 1085, 1086, 1087, 1089, 1090, 1453, 1454, 1455, 1457, 1458, 1667, 1668, 1669, 1671, 1672, 2030, 2031, 2032, 2034, 2035, 2397, 2398, 2399, 2401, 2402, 2764, 2765, 2766, 2769, 2770, 3132, 3133, 3134, 3136, 3137, 3494, 3495, 3496, 3530 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3530, "ccnet_original_nlines": 57, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3643031716346741, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.047677259892225266, "rps_doc_frac_lines_end_with_ellipsis": 0.13793103396892548, "rps_doc_frac_no_alph_words": 0.2420537918806076, "rps_doc_frac_unique_words": 0.5377049446105957, "rps_doc_mean_word_length": 4.440983772277832, "rps_doc_num_sentences": 53, "rps_doc_symbol_to_word_ratio": 0.00977994967252016, "rps_doc_unigram_entropy": 5.399691581726074, "rps_doc_word_count": 610, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.008859359659254551, "rps_doc_frac_chars_top_3gram": 0.006644519977271557, "rps_doc_frac_chars_top_4gram": 0.010335920378565788, "rps_doc_books_importance": -291.47674560546875, "rps_doc_books_importance_length_correction": -291.47674560546875, "rps_doc_openwebtext_importance": -213.34706115722656, "rps_doc_openwebtext_importance_length_correction": -213.34706115722656, "rps_doc_wikipedia_importance": -164.18203735351562, "rps_doc_wikipedia_importance_length_correction": -164.18203735351562 }, "fasttext": { "dclm": 0.26681309938430786, "english": 0.9404481649398804, "fineweb_edu_approx": 1.1720415353775024, "eai_general_math": 0.8392581939697266, "eai_open_web_math": 0.1906355619430542, "eai_web_code": 0.8246307969093323 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.16", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.456", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-6,703,414,291,239,545,000
Expert Reviewed wikiHow to Recognize Spinal Meningitis Symptoms Three Parts:Recognizing the Symptoms in Adults and ChildrenWatching for Signs of Meningitis in InfantsUnderstanding the Different TypesCommunity Q&A Meningitis, sometimes referred to as spinal meningitis, is an inflammation of the membranes surrounding the brain and spinal cord. Meningitis is usually caused by a viral infection, but it can also be caused by a bacterial or fungal infection. Depending on the type of infection, meningitis can be easily curable or potentially life threatening. Part 1 Recognizing the Symptoms in Adults and Children 1. 1 Watch for a severe headache. Headaches caused by inflammation of the meninges, the membranes surrounding the brain and spinal cord, feel different from other types of headaches. They're much more severe than a headache you'd get from dehydration or even a migraine. A persistent, severe headache is commonly felt by people with meningitis. • A meningitis headache won't ease up after taking over the counter pain pills. • If a severe headache is felt without the presence of other common meningitis symptoms, the cause of the headache may be another illness. If the headache persists for more than a day or so, see a doctor.[1] 2. 2 Look for vomiting and nausea associated with the headache. Migraines often lead to vomiting and nausea, so these symptoms don't automatically point to meningitis. However, it's important to pay close attention to other symptoms if you or the person you're concerned about is feeling sick enough to vomit.[2] 3. 3 Check for a fever. A high fever, along with these other symptoms, could indicate that the problem is meningitis, rather than the flu or strep throat. Take the temperature of the person who is sick to determine whether a high fever is on the list of symptoms. • The fever related to meningitis is generally around 101 degrees, and any fever over 103 Fahrenheit is cause for concern.[3] 4. 4 Determine whether the neck is stiff and sore. This is a very common symptom among those who have meningitis. The stiffness and soreness is caused by pressure from the inflamed meninges. If you or someone you know has a sore neck that doesn't seem to be related to other common causes of soreness and stiffness, like pulling a muscle or getting whiplash, meningitis might be the culprit. • If this symptom arises, have the person lie flat on his back and ask him to bend or flex his hips. When they do this, it should cause pain in the neck. This is a sign of meningitis.[4][5] 5. 5 Watch for concentration difficulties. Since the membranes around the brain become inflamed with meningitis, cognitive difficulties commonly occur among meningitis patients. The inability to finish reading an article, focus on a conversation, or complete a task, paired with a severe headache, could be a warning sign.[6] • He may not act himself and be overall more drowsy and lethargic than usual. • In rare cases, this can make the person anywhere from barely rousable to comatose.[7] 6. 6 Notice photophobia. Photophobia is an intense pain caused by light. Eye pain and eye sensitivity are associated with meningitis in adults. If you or someone you know has trouble going outside or being in a room with bright lights, see your doctor. • This may manifest by a general sensitivity or fear of bright lights at first. Watch for this behavior if other symptoms occur as well.[8] 7. 7 Look for seizures. Seizures are uncontrollable muscle movements, often violent in nature, which usually cause loss of bladder control and general disorientation. The person who underwent a seizure likely may not know what year it is, where they are, or how old they are right after the seizure is over. • If the person has epilepsy or a history of seizures, they may not be a symptom of meningitis. • If you encounter someone having a seizure, call 911. Roll them on their side and move any objects that he may hit themselves on away from the area. Most seizures stop on their own within one to two minutes.[9] 8. 8 Look for the tell-tale rash. Certain types of meningitis, such as meningococcal meningitis, cause a rash to occur. The rash is reddish or purple and blotchy, and may be a sign of blood poisoning. If you see a rash, you can determine whether it was caused by meningitis by conducting the glass test:[10] • Press a glass against the rash. Use a clear glass so you can see the skin through it. • If the skin under the glass does not turn white, this indicates that blood poisoning may have occurred. Go to the hospital immediately. • Not all types of meningitis have a rash. The absence of a rash should not be taken as a sign that a person does not have meningitis. Part 2 Watching for Signs of Meningitis in Infants 1. 1 Be aware of the challenges. The diagnosis of meningitis in children, especially infants, is a diagnostic challenge, even to experienced pediatricians. Since so many benign and self-limited viral syndromes present similarly, with fever and a crying child, it can be hard to distinguish meningitis symptoms in small children and infants. This leads many hospital protocols and individual clinicians to have a very high suspicion for meningitis, especially for those children 3 months and younger who have only received one set in their series of vaccines.[11] • With good vaccination compliance, the number of cases of bacterial meningitis have decreased. Viral meningitis still presents but presentation is mild and self-limited, with minimal care needed. 2. 2 Check for a high fever. Infants, like adults and children, develop a high fever with meningitis. Check your baby's temperature to determine if a fever is present. Whether or not meningitis is the cause, you should take your baby to the doctor if he or she has a fever.[12] 3. 3 Watch for constant crying. This can be caused by many illnesses and other issues, but if your baby seems especially upset and won't be calmed by changing, feeding, and other measures you usually take, you should call the doctor. In combination with other symptoms, constant crying may be a sign of meningitis.[13] • Crying caused by meningitis usually can't be comforted. Look for differences in the baby's normal crying patterns. • Some parents report that babies become even more upset when they are picked up if meningitis is the issue. • Meningitis may cause babies to produce a cry that is higher-pitched than normal.[14] 4. 4 Look for sleepiness and inactivity. A sluggish, sleepy, irritable baby who is usually active may have meningitis. Look for noticeable behavioral differences that point to lower consciousness and an inability to fully wake up.[15] 5. 5 Pay attention to weak sucking during feedings. Babies with meningitis have a reduced ability to make the sucking motion during feeding. If your baby is having trouble sucking, call the doctor immediately.[16] 6. 6 Watch for changes in the baby's neck and body. If the baby seems to have trouble moving his or her head, and his or her body looks unusually rigid and stiff, this could be a sign of meningitis. • The child may also feel pain around their neck and back. It may be simple stiffness at first, but if the child seems in pain when moved, it may be more severe. Watch to see if she automatically brings her feet up to her chest when you bend their neck forward or is she has pain when her legs are bent. • She may also be unable to straighten her lower legs if her hips are at a 90 degree angle. This presents in infants most often when their diapers are changed and you cannot pull their legs out.[17] Part 3 Understanding the Different Types 1. 1 Learn about viral meningitis. Viral meningitis is usually self limited and goes away on its own. There are a few specific viruses such as the herpes simplex virus (HSV) and HIV that require specific goal directed therapy with antiviral drugs. Viral meningitis is spread person to person contact. A groups of viruses called enterovirus is the primary source and occur most typically in the late summer to early fall. • Despite it being possible to be spread by person to person contact, outbreaks of viral meningitis are rare.[18] 2. 2 Know about Streptococcus pneumoniae. There are three kinds of bacteria that cause bacterial meningitis, which is the most worrisome and lethal. Streptococcus pneumoniae is the most common form to strike infants, young children, and adults in the US. There is a vaccine for this bacteria, however, so it is curable. It is spread most commonly from a sinus or ear infection and should be suspected when a person with a prior sinus or ear infection develops symptoms of meningitis. • Certain people are at higher risk, such as those who do not have spleens and those who are older. Vaccination for these individuals is protocol. [19] 3. 3 Understand Neisseria meningitidis. Another bacteria that causes bacterial meningitis is Neisseria meningitidis. This is a highly contagious form that afflicts otherwise healthy adolescents and young adults. It is spread person to person and outbreaks occur in schools or dorms. It is particularly lethal, leading to multi-organ failure, brain damage, and death if not rapidly identified and started on intravenous antibiotics. • It also has the distinction of causing a “petechial” rash, meaning a rash that looks like lots of tiny bruises, and this is an important distinction to note. • Vaccination is recommended for all adolescents 11 to 12 years of age, with a booster at age 16. If no prior vaccine was given and the patient is 16, only one vaccination is required.[20] 4. 4 Learn about Haemophilus influenza (Hib). The third bacteria that causes bacterial meningitis is Haemophilus influenza. This used to be a very common cause of bacterial meningitis in infants and children. However, since a Hib vaccination protocol has been introduced, rates have dropped dramatically. With the combination of immigrants from other countries that don’t follow routine vaccination or even parents who do not believe in vaccination, not all are protected against this form. • Obtaining an accurate vaccination history, preferably from the actual medical record or yellow vaccine card, is critical when this, or any, form of meningitis is considered.[21][22] 5. 5 Know about fungal meningitis. Fungal meningitis is rare and seen almost exclusively in those with AIDS or others with weakened immune systems. It is one of the AIDS defining diagnoses, occurring when the person has very little immunity, is exceedingly fragile, and is at risk for most any infection. The typical culprit is Cryptococcus. • The optimal prevention in an HIV infected individual is compliance with antiretroviral therapy to keep viral loads low and T cells high to protect from this type of infection.[23] 6. 6 Take advantage of meningitis vaccines if necessary. It is recommended that the following groups with high risk of contracting meningitis have routine vaccinations: • All children ages 11-18 • U.S. military recruits • Anyone who has a damaged spleen or whose spleen has been removed • College freshmen living in dormitories • Microbiologists exposed to meningococcal bacteria • Anyone who has terminal complement component deficiency (an immune system disorder) • Anyone traveling to countries which have an outbreak of meningococcal disease • Those who might have been exposed to meningitis during an outbreak[24] Community Q&A Unanswered Questions Show more unanswered questions Ask a Question 200 characters left Submit Video Sources and Citations 1. http://www.mayoclinic.com/health/meningitis/DS00118/DSECTION=symptoms 2. http://www.emedicinehealth.com/meningitis_in_adults/page3_em.htm#adult_meningitis_symptoms_and_signs 3. http://www.emedicinehealth.com/meningitis_in_adults/page3_em.htm#adult_meningitis_symptoms_and_signs Show more... (21) Article Info Categories: Meningitis | Spine Disorders In other languages: Español: reconocer los síntomas de la meningitis espinal, Italiano: Riconoscere i Sintomi della Meningite Spinale, Português: Reconhecer os Sintomas da Meningite, 中文: 识别脑脊髓膜炎, Deutsch: Die Symptome einer Hirnhautentzündung erkennen, Русский: распознать симптомы менингита, Français: reconnaitre les symptômes d'une méningite, 한국어: 척수막염의 증상 알아보는 법, Nederlands: De symptomen van hersenvliesontsteking herkennen, Bahasa Indonesia: Mengenali Gejala Meningitis Tulang Belakang Thanks to all authors for creating a page that has been read 306,116 times. Did this article help you?  
{ "url": "https://www.wikihow.com/Recognize-Spinal-Meningitis-Symptoms", "source_domain": "www.wikihow.com", "snapshot_id": "crawl=CC-MAIN-2017-43", "warc_metadata": { "Content-Length": "210237", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:OAEAYPBG24JIBV2M5BT75VD5GC4EM3RT", "WARC-Concurrent-To": "<urn:uuid:cea69542-6513-4891-89a9-ae3414c924d8>", "WARC-Date": "2017-10-21T21:37:39Z", "WARC-IP-Address": "151.101.34.110", "WARC-Identified-Payload-Type": "application/xhtml+xml", "WARC-Payload-Digest": "sha1:LDTDOQBIOVR24HN5R3H4UXQXV7ITISTD", "WARC-Record-ID": "<urn:uuid:bd493df7-70ce-4093-991e-20f679282e61>", "WARC-Target-URI": "https://www.wikihow.com/Recognize-Spinal-Meningitis-Symptoms", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:fcd623a6-01f0-48da-892c-ac352369669b>" }, "warc_info": "robots: classic\r\nhostname: ip-10-236-55-24.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 16, 17, 65, 66, 215, 216, 562, 563, 570, 618, 619, 626, 970, 1054, 1266, 1273, 1585, 1592, 1855, 1985, 1992, 2383, 2577, 2584, 2909, 2991, 3083, 3090, 3342, 3486, 3493, 3800, 3900, 4116, 4123, 4430, 4522, 4664, 4803, 4804, 4811, 4855, 4856, 4863, 5425, 5626, 5633, 5910, 5917, 6235, 6356, 6469, 6560, 6567, 6801, 6808, 7021, 7028, 7226, 7534, 7737, 7738, 7745, 7779, 7780, 7787, 8207, 8325, 8332, 8815, 8971, 8978, 9409, 9573, 9766, 9773, 10263, 10451, 10458, 10799, 10985, 10992, 11160, 11190, 11219, 11290, 11335, 11391, 11481, 11565, 11642, 11643, 11657, 11658, 11679, 11710, 11725, 11745, 11752, 11753, 11763, 11764, 11790, 11791, 11868, 11976, 12084, 12106, 12107, 12124, 12125, 12170, 12171, 12195, 12196, 12672, 12673, 12753, 12754, 12785 ], "line_end_idx": [ 16, 17, 65, 66, 215, 216, 562, 563, 570, 618, 619, 626, 970, 1054, 1266, 1273, 1585, 1592, 1855, 1985, 1992, 2383, 2577, 2584, 2909, 2991, 3083, 3090, 3342, 3486, 3493, 3800, 3900, 4116, 4123, 4430, 4522, 4664, 4803, 4804, 4811, 4855, 4856, 4863, 5425, 5626, 5633, 5910, 5917, 6235, 6356, 6469, 6560, 6567, 6801, 6808, 7021, 7028, 7226, 7534, 7737, 7738, 7745, 7779, 7780, 7787, 8207, 8325, 8332, 8815, 8971, 8978, 9409, 9573, 9766, 9773, 10263, 10451, 10458, 10799, 10985, 10992, 11160, 11190, 11219, 11290, 11335, 11391, 11481, 11565, 11642, 11643, 11657, 11658, 11679, 11710, 11725, 11745, 11752, 11753, 11763, 11764, 11790, 11791, 11868, 11976, 12084, 12106, 12107, 12124, 12125, 12170, 12171, 12195, 12196, 12672, 12673, 12753, 12754, 12785, 12790 ] }
{ "red_pajama_v2": { "ccnet_original_length": 12790, "ccnet_original_nlines": 120, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3942267894744873, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.008247420191764832, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.18927834928035736, "rps_doc_frac_unique_words": 0.3591897189617157, "rps_doc_mean_word_length": 4.992094993591309, "rps_doc_num_sentences": 150, "rps_doc_symbol_to_word_ratio": 0.0012371100019663572, "rps_doc_unigram_entropy": 5.752783298492432, "rps_doc_word_count": 2024, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.0366191603243351, "rps_doc_frac_chars_dupe_6grams": 0.02117973007261753, "rps_doc_frac_chars_dupe_7grams": 0.01346001960337162, "rps_doc_frac_chars_dupe_8grams": 0.008709420450031757, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.013064130209386349, "rps_doc_frac_chars_top_3gram": 0.003958830144256353, "rps_doc_frac_chars_top_4gram": 0.0026722101029008627, "rps_doc_books_importance": -841.4382934570312, "rps_doc_books_importance_length_correction": -841.4382934570312, "rps_doc_openwebtext_importance": -505.6628723144531, "rps_doc_openwebtext_importance_length_correction": -505.6628723144531, "rps_doc_wikipedia_importance": -454.1107177734375, "rps_doc_wikipedia_importance_length_correction": -454.1107177734375 }, "fasttext": { "dclm": 0.0947832465171814, "english": 0.926363468170166, "fineweb_edu_approx": 3.02226185798645, "eai_general_math": 0.030290009453892708, "eai_open_web_math": 0.25825512409210205, "eai_web_code": 0.001043020049110055 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.072", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.07", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-8,585,169,021,824,722,000
blob: 7ed280bc9525daa93de726e1100f11de4b113de2 [file] [log] [blame] # Generated from ltmain.m4sh. # ltmain.sh (GNU libtool) 2.2.6b # Written by Gordon Matzigkeit <[email protected]>, 1996 # Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005, 2006, 2007 2008 Free Software Foundation, Inc. # This is free software; see the source for copying conditions. There is NO # warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. # GNU Libtool is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # As a special exception to the GNU General Public License, # if you distribute this file as part of a program or library that # is built using GNU Libtool, you may include this file under the # same distribution terms that you use for the rest of that program. # # GNU Libtool is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with GNU Libtool; see the file COPYING. If not, a copy # can be downloaded from http://www.gnu.org/licenses/gpl.html, # or obtained by writing to the Free Software Foundation, Inc., # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. # Usage: $progname [OPTION]... [MODE-ARG]... # # Provide generalized library-building support services. # # --config show all configuration variables # --debug enable verbose shell tracing # -n, --dry-run display commands without modifying any files # --features display basic configuration information and exit # --mode=MODE use operation mode MODE # --preserve-dup-deps don't remove duplicate dependency libraries # --quiet, --silent don't print informational messages # --tag=TAG use configuration variables from tag TAG # -v, --verbose print informational messages (default) # --version print version information # -h, --help print short or long help message # # MODE must be one of the following: # # clean remove files from the build directory # compile compile a source file into a libtool object # execute automatically set library path, then run a program # finish complete the installation of libtool libraries # install install libraries or executables # link create a library or an executable # uninstall remove libraries from an installed directory # # MODE-ARGS vary depending on the MODE. # Try `$progname --help --mode=MODE' for a more detailed description of MODE. # # When reporting a bug, please describe a test case to reproduce it and # include the following information: # # host-triplet: $host # shell: $SHELL # compiler: $LTCC # compiler flags: $LTCFLAGS # linker: $LD (gnu? $with_gnu_ld) # $progname: (GNU libtool) 2.2.6b Debian-2.2.6b-2ubuntu1 # automake: $automake_version # autoconf: $autoconf_version # # Report bugs to <[email protected]>. PROGRAM=ltmain.sh PACKAGE=libtool VERSION="2.2.6b Debian-2.2.6b-2ubuntu1" TIMESTAMP="" package_revision=1.3017 # Be Bourne compatible if test -n "${ZSH_VERSION+set}" && (emulate sh) >/dev/null 2>&1; then emulate sh NULLCMD=: # Zsh 3.x and 4.x performs word splitting on ${1+"$@"}, which # is contrary to our usage. Disable this feature. alias -g '${1+"$@"}'='"$@"' setopt NO_GLOB_SUBST else case `(set -o) 2>/dev/null` in *posix*) set -o posix;; esac fi BIN_SH=xpg4; export BIN_SH # for Tru64 DUALCASE=1; export DUALCASE # for MKS sh # NLS nuisances: We save the old values to restore during execute mode. # Only set LANG and LC_ALL to C if already set. # These must not be set unconditionally because not all systems understand # e.g. LANG=C (notably SCO). lt_user_locale= lt_safe_locale= for lt_var in LANG LANGUAGE LC_ALL LC_CTYPE LC_COLLATE LC_MESSAGES do eval "if test \"\${$lt_var+set}\" = set; then save_$lt_var=\$$lt_var $lt_var=C export $lt_var lt_user_locale=\"$lt_var=\\\$save_\$lt_var; \$lt_user_locale\" lt_safe_locale=\"$lt_var=C; \$lt_safe_locale\" fi" done $lt_unset CDPATH : ${CP="cp -f"} : ${ECHO="echo"} : ${EGREP="/bin/grep -E"} : ${FGREP="/bin/grep -F"} : ${GREP="/bin/grep"} : ${LN_S="ln -s"} : ${MAKE="make"} : ${MKDIR="mkdir"} : ${MV="mv -f"} : ${RM="rm -f"} : ${SED="/bin/sed"} : ${SHELL="${CONFIG_SHELL-/bin/sh}"} : ${Xsed="$SED -e 1s/^X//"} # Global variables: EXIT_SUCCESS=0 EXIT_FAILURE=1 EXIT_MISMATCH=63 # $? = 63 is used to indicate version mismatch to missing. EXIT_SKIP=77 # $? = 77 is used to indicate a skipped test to automake. exit_status=$EXIT_SUCCESS # Make sure IFS has a sensible default lt_nl=' ' IFS=" $lt_nl" dirname="s,/[^/]*$,," basename="s,^.*/,," # func_dirname_and_basename file append nondir_replacement # perform func_basename and func_dirname in a single function # call: # dirname: Compute the dirname of FILE. If nonempty, # add APPEND to the result, otherwise set result # to NONDIR_REPLACEMENT. # value returned in "$func_dirname_result" # basename: Compute filename of FILE. # value retuned in "$func_basename_result" # Implementation must be kept synchronized with func_dirname # and func_basename. For efficiency, we do not delegate to # those functions but instead duplicate the functionality here. func_dirname_and_basename () { # Extract subdirectory from the argument. func_dirname_result=`$ECHO "X${1}" | $Xsed -e "$dirname"` if test "X$func_dirname_result" = "X${1}"; then func_dirname_result="${3}" else func_dirname_result="$func_dirname_result${2}" fi func_basename_result=`$ECHO "X${1}" | $Xsed -e "$basename"` } # Generated shell functions inserted here. # Work around backward compatibility issue on IRIX 6.5. On IRIX 6.4+, sh # is ksh but when the shell is invoked as "sh" and the current value of # the _XPG environment variable is not equal to 1 (one), the special # positional parameter $0, within a function call, is the name of the # function. progpath="$0" # The name of this program: # In the unlikely event $progname began with a '-', it would play havoc with # func_echo (imagine progname=-n), so we prepend ./ in that case: func_dirname_and_basename "$progpath" progname=$func_basename_result case $progname in -*) progname=./$progname ;; esac # Make sure we have an absolute path for reexecution: case $progpath in [\\/]*|[A-Za-z]:\\*) ;; *[\\/]*) progdir=$func_dirname_result progdir=`cd "$progdir" && pwd` progpath="$progdir/$progname" ;; *) save_IFS="$IFS" IFS=: for progdir in $PATH; do IFS="$save_IFS" test -x "$progdir/$progname" && break done IFS="$save_IFS" test -n "$progdir" || progdir=`pwd` progpath="$progdir/$progname" ;; esac # Sed substitution that helps us do robust quoting. It backslashifies # metacharacters that are still active within double-quoted strings. Xsed="${SED}"' -e 1s/^X//' sed_quote_subst='s/\([`"$\\]\)/\\\1/g' # Same as above, but do not quote variable references. double_quote_subst='s/\(["`\\]\)/\\\1/g' # Re-`\' parameter expansions in output of double_quote_subst that were # `\'-ed in input to the same. If an odd number of `\' preceded a '$' # in input to double_quote_subst, that '$' was protected from expansion. # Since each input `\' is now two `\'s, look for any number of runs of # four `\'s followed by two `\'s and then a '$'. `\' that '$'. bs='\\' bs2='\\\\' bs4='\\\\\\\\' dollar='\$' sed_double_backslash="\ s/$bs4/&\\ /g s/^$bs2$dollar/$bs&/ s/\\([^$bs]\\)$bs2$dollar/\\1$bs2$bs$dollar/g s/\n//g" # Standard options: opt_dry_run=false opt_help=false opt_quiet=false opt_verbose=false opt_warning=: # func_echo arg... # Echo program name prefixed message, along with the current mode # name if it has been set yet. func_echo () { $ECHO "$progname${mode+: }$mode: $*" } # func_verbose arg... # Echo program name prefixed message in verbose mode only. func_verbose () { $opt_verbose && func_echo ${1+"$@"} # A bug in bash halts the script if the last line of a function # fails when set -e is in force, so we need another command to # work around that: : } # func_error arg... # Echo program name prefixed message to standard error. func_error () { $ECHO "$progname${mode+: }$mode: "${1+"$@"} 1>&2 } # func_warning arg... # Echo program name prefixed warning message to standard error. func_warning () { $opt_warning && $ECHO "$progname${mode+: }$mode: warning: "${1+"$@"} 1>&2 # bash bug again: : } # func_fatal_error arg... # Echo program name prefixed message to standard error, and exit. func_fatal_error () { func_error ${1+"$@"} exit $EXIT_FAILURE } # func_fatal_help arg... # Echo program name prefixed message to standard error, followed by # a help hint, and exit. func_fatal_help () { func_error ${1+"$@"} func_fatal_error "$help" } help="Try \`$progname --help' for more information." ## default # func_grep expression filename # Check whether EXPRESSION matches any line of FILENAME, without output. func_grep () { $GREP "$1" "$2" >/dev/null 2>&1 } # func_mkdir_p directory-path # Make sure the entire path to DIRECTORY-PATH is available. func_mkdir_p () { my_directory_path="$1" my_dir_list= if test -n "$my_directory_path" && test "$opt_dry_run" != ":"; then # Protect directory names starting with `-' case $my_directory_path in -*) my_directory_path="./$my_directory_path" ;; esac # While some portion of DIR does not yet exist... while test ! -d "$my_directory_path"; do # ...make a list in topmost first order. Use a colon delimited # list incase some portion of path contains whitespace. my_dir_list="$my_directory_path:$my_dir_list" # If the last portion added has no slash in it, the list is done case $my_directory_path in */*) ;; *) break ;; esac # ...otherwise throw away the child directory and loop my_directory_path=`$ECHO "X$my_directory_path" | $Xsed -e "$dirname"` done my_dir_list=`$ECHO "X$my_dir_list" | $Xsed -e 's,:*$,,'` save_mkdir_p_IFS="$IFS"; IFS=':' for my_dir in $my_dir_list; do IFS="$save_mkdir_p_IFS" # mkdir can fail with a `File exist' error if two processes # try to create one of the directories concurrently. Don't # stop in that case! $MKDIR "$my_dir" 2>/dev/null || : done IFS="$save_mkdir_p_IFS" # Bail out if we (or some other process) failed to create a directory. test -d "$my_directory_path" || \ func_fatal_error "Failed to create \`$1'" fi } # func_mktempdir [string] # Make a temporary directory that won't clash with other running # libtool processes, and avoids race conditions if possible. If # given, STRING is the basename for that directory. func_mktempdir () { my_template="${TMPDIR-/tmp}/${1-$progname}" if test "$opt_dry_run" = ":"; then # Return a directory name, but don't create it in dry-run mode my_tmpdir="${my_template}-$$" else # If mktemp works, use that first and foremost my_tmpdir=`mktemp -d "${my_template}-XXXXXXXX" 2>/dev/null` if test ! -d "$my_tmpdir"; then # Failing that, at least try and use $RANDOM to avoid a race my_tmpdir="${my_template}-${RANDOM-0}$$" save_mktempdir_umask=`umask` umask 0077 $MKDIR "$my_tmpdir" umask $save_mktempdir_umask fi # If we're not in dry-run mode, bomb out on failure test -d "$my_tmpdir" || \ func_fatal_error "cannot create temporary directory \`$my_tmpdir'" fi $ECHO "X$my_tmpdir" | $Xsed } # func_quote_for_eval arg # Aesthetically quote ARG to be evaled later. # This function returns two values: FUNC_QUOTE_FOR_EVAL_RESULT # is double-quoted, suitable for a subsequent eval, whereas # FUNC_QUOTE_FOR_EVAL_UNQUOTED_RESULT has merely all characters # which are still active within double quotes backslashified. func_quote_for_eval () { case $1 in *[\\\`\"\$]*) func_quote_for_eval_unquoted_result=`$ECHO "X$1" | $Xsed -e "$sed_quote_subst"` ;; *) func_quote_for_eval_unquoted_result="$1" ;; esac case $func_quote_for_eval_unquoted_result in # Double-quote args containing shell metacharacters to delay # word splitting, command substitution and and variable # expansion for a subsequent eval. # Many Bourne shells cannot handle close brackets correctly # in scan sets, so we specify it separately. *[\[\~\#\^\&\*\(\)\{\}\|\;\<\>\?\'\ \ ]*|*]*|"") func_quote_for_eval_result="\"$func_quote_for_eval_unquoted_result\"" ;; *) func_quote_for_eval_result="$func_quote_for_eval_unquoted_result" esac } # func_quote_for_expand arg # Aesthetically quote ARG to be evaled later; same as above, # but do not quote variable references. func_quote_for_expand () { case $1 in *[\\\`\"]*) my_arg=`$ECHO "X$1" | $Xsed \ -e "$double_quote_subst" -e "$sed_double_backslash"` ;; *) my_arg="$1" ;; esac case $my_arg in # Double-quote args containing shell metacharacters to delay # word splitting and command substitution for a subsequent eval. # Many Bourne shells cannot handle close brackets correctly # in scan sets, so we specify it separately. *[\[\~\#\^\&\*\(\)\{\}\|\;\<\>\?\'\ \ ]*|*]*|"") my_arg="\"$my_arg\"" ;; esac func_quote_for_expand_result="$my_arg" } # func_show_eval cmd [fail_exp] # Unless opt_silent is true, then output CMD. Then, if opt_dryrun is # not true, evaluate CMD. If the evaluation of CMD fails, and FAIL_EXP # is given, then evaluate it. func_show_eval () { my_cmd="$1" my_fail_exp="${2-:}" ${opt_silent-false} || { func_quote_for_expand "$my_cmd" eval "func_echo $func_quote_for_expand_result" } if ${opt_dry_run-false}; then :; else eval "$my_cmd" my_status=$? if test "$my_status" -eq 0; then :; else eval "(exit $my_status); $my_fail_exp" fi fi } # func_show_eval_locale cmd [fail_exp] # Unless opt_silent is true, then output CMD. Then, if opt_dryrun is # not true, evaluate CMD. If the evaluation of CMD fails, and FAIL_EXP # is given, then evaluate it. Use the saved locale for evaluation. func_show_eval_locale () { my_cmd="$1" my_fail_exp="${2-:}" ${opt_silent-false} || { func_quote_for_expand "$my_cmd" eval "func_echo $func_quote_for_expand_result" } if ${opt_dry_run-false}; then :; else eval "$lt_user_locale $my_cmd" my_status=$? eval "$lt_safe_locale" if test "$my_status" -eq 0; then :; else eval "(exit $my_status); $my_fail_exp" fi fi } # func_version # Echo version message to standard output and exit. func_version () { $SED -n '/^# '$PROGRAM' (GNU /,/# warranty; / { s/^# // s/^# *$// s/\((C)\)[ 0-9,-]*\( [1-9][0-9]*\)/\1\2/ p }' < "$progpath" exit $? } # func_usage # Echo short help message to standard output and exit. func_usage () { $SED -n '/^# Usage:/,/# -h/ { s/^# // s/^# *$// s/\$progname/'$progname'/ p }' < "$progpath" $ECHO $ECHO "run \`$progname --help | more' for full usage" exit $? } # func_help # Echo long help message to standard output and exit. func_help () { $SED -n '/^# Usage:/,/# Report bugs to/ { s/^# // s/^# *$// s*\$progname*'$progname'* s*\$host*'"$host"'* s*\$SHELL*'"$SHELL"'* s*\$LTCC*'"$LTCC"'* s*\$LTCFLAGS*'"$LTCFLAGS"'* s*\$LD*'"$LD"'* s/\$with_gnu_ld/'"$with_gnu_ld"'/ s/\$automake_version/'"`(automake --version) 2>/dev/null |$SED 1q`"'/ s/\$autoconf_version/'"`(autoconf --version) 2>/dev/null |$SED 1q`"'/ p }' < "$progpath" exit $? } # func_missing_arg argname # Echo program name prefixed message to standard error and set global # exit_cmd. func_missing_arg () { func_error "missing argument for $1" exit_cmd=exit } exit_cmd=: # Check that we have a working $ECHO. if test "X$1" = X--no-reexec; then # Discard the --no-reexec flag, and continue. shift elif test "X$1" = X--fallback-echo; then # Avoid inline document here, it may be left over : elif test "X`{ $ECHO '\t'; } 2>/dev/null`" = 'X\t'; then # Yippee, $ECHO works! : else # Restart under the correct shell, and then maybe $ECHO will work. exec $SHELL "$progpath" --no-reexec ${1+"$@"} fi if test "X$1" = X--fallback-echo; then # used as fallback echo shift cat <<EOF $* EOF exit $EXIT_SUCCESS fi magic="%%%MAGIC variable%%%" magic_exe="%%%MAGIC EXE variable%%%" # Global variables. # $mode is unset nonopt= execute_dlfiles= preserve_args= lo2o="s/\\.lo\$/.${objext}/" o2lo="s/\\.${objext}\$/.lo/" extracted_archives= extracted_serial=0 opt_dry_run=false opt_duplicate_deps=false opt_silent=false opt_debug=: # If this variable is set in any of the actions, the command in it # will be execed at the end. This prevents here-documents from being # left over by shells. exec_cmd= # func_fatal_configuration arg... # Echo program name prefixed message to standard error, followed by # a configuration failure hint, and exit. func_fatal_configuration () { func_error ${1+"$@"} func_error "See the $PACKAGE documentation for more information." func_fatal_error "Fatal configuration error." } # func_config # Display the configuration for all the tags in this script. func_config () { re_begincf='^# ### BEGIN LIBTOOL' re_endcf='^# ### END LIBTOOL' # Default configuration. $SED "1,/$re_begincf CONFIG/d;/$re_endcf CONFIG/,\$d" < "$progpath" # Now print the configurations for the tags. for tagname in $taglist; do $SED -n "/$re_begincf TAG CONFIG: $tagname\$/,/$re_endcf TAG CONFIG: $tagname\$/p" < "$progpath" done exit $? } # func_features # Display the features supported by this script. func_features () { $ECHO "host: $host" if test "$build_libtool_libs" = yes; then $ECHO "enable shared libraries" else $ECHO "disable shared libraries" fi if test "$build_old_libs" = yes; then $ECHO "enable static libraries" else $ECHO "disable static libraries" fi exit $? } # func_enable_tag tagname # Verify that TAGNAME is valid, and either flag an error and exit, or # enable the TAGNAME tag. We also add TAGNAME to the global $taglist # variable here. func_enable_tag () { # Global variable: tagname="$1" re_begincf="^# ### BEGIN LIBTOOL TAG CONFIG: $tagname\$" re_endcf="^# ### END LIBTOOL TAG CONFIG: $tagname\$" sed_extractcf="/$re_begincf/,/$re_endcf/p" # Validate tagname. case $tagname in *[!-_A-Za-z0-9,/]*) func_fatal_error "invalid tag name: $tagname" ;; esac # Don't test for the "default" C tag, as we know it's # there but not specially marked. case $tagname in CC) ;; *) if $GREP "$re_begincf" "$progpath" >/dev/null 2>&1; then taglist="$taglist $tagname" # Evaluate the configuration. Be careful to quote the path # and the sed script, to avoid splitting on whitespace, but # also don't use non-portable quotes within backquotes within # quotes we have to do it in 2 steps: extractedcf=`$SED -n -e "$sed_extractcf" < "$progpath"` eval "$extractedcf" else func_error "ignoring unknown tag $tagname" fi ;; esac } # Parse options once, thoroughly. This comes as soon as possible in # the script to make things like `libtool --version' happen quickly. { # Shorthand for --mode=foo, only valid as the first argument case $1 in clean|clea|cle|cl) shift; set dummy --mode clean ${1+"$@"}; shift ;; compile|compil|compi|comp|com|co|c) shift; set dummy --mode compile ${1+"$@"}; shift ;; execute|execut|execu|exec|exe|ex|e) shift; set dummy --mode execute ${1+"$@"}; shift ;; finish|finis|fini|fin|fi|f) shift; set dummy --mode finish ${1+"$@"}; shift ;; install|instal|insta|inst|ins|in|i) shift; set dummy --mode install ${1+"$@"}; shift ;; link|lin|li|l) shift; set dummy --mode link ${1+"$@"}; shift ;; uninstall|uninstal|uninsta|uninst|unins|unin|uni|un|u) shift; set dummy --mode uninstall ${1+"$@"}; shift ;; esac # Parse non-mode specific arguments: while test "$#" -gt 0; do opt="$1" shift case $opt in --config) func_config ;; --debug) preserve_args="$preserve_args $opt" func_echo "enabling shell trace mode" opt_debug='set -x' $opt_debug ;; -dlopen) test "$#" -eq 0 && func_missing_arg "$opt" && break execute_dlfiles="$execute_dlfiles $1" shift ;; --dry-run | -n) opt_dry_run=: ;; --features) func_features ;; --finish) mode="finish" ;; --mode) test "$#" -eq 0 && func_missing_arg "$opt" && break case $1 in # Valid mode arguments: clean) ;; compile) ;; execute) ;; finish) ;; install) ;; link) ;; relink) ;; uninstall) ;; # Catch anything else as an error *) func_error "invalid argument for $opt" exit_cmd=exit break ;; esac mode="$1" shift ;; --preserve-dup-deps) opt_duplicate_deps=: ;; --quiet|--silent) preserve_args="$preserve_args $opt" opt_silent=: ;; --verbose| -v) preserve_args="$preserve_args $opt" opt_silent=false ;; --tag) test "$#" -eq 0 && func_missing_arg "$opt" && break preserve_args="$preserve_args $opt $1" func_enable_tag "$1" # tagname is set here shift ;; # Separate optargs to long options: -dlopen=*|--mode=*|--tag=*) func_opt_split "$opt" set dummy "$func_opt_split_opt" "$func_opt_split_arg" ${1+"$@"} shift ;; -\?|-h) func_usage ;; --help) opt_help=: ;; --version) func_version ;; -*) func_fatal_help "unrecognized option \`$opt'" ;; *) nonopt="$opt" break ;; esac done case $host in *cygwin* | *mingw* | *pw32* | *cegcc*) # don't eliminate duplications in $postdeps and $predeps opt_duplicate_compiler_generated_deps=: ;; *) opt_duplicate_compiler_generated_deps=$opt_duplicate_deps ;; esac # Having warned about all mis-specified options, bail out if # anything was wrong. $exit_cmd $EXIT_FAILURE } # func_check_version_match # Ensure that we are using m4 macros, and libtool script from the same # release of libtool. func_check_version_match () { if test "$package_revision" != "$macro_revision"; then if test "$VERSION" != "$macro_version"; then if test -z "$macro_version"; then cat >&2 <<_LT_EOF $progname: Version mismatch error. This is $PACKAGE $VERSION, but the $progname: definition of this LT_INIT comes from an older release. $progname: You should recreate aclocal.m4 with macros from $PACKAGE $VERSION $progname: and run autoconf again. _LT_EOF else cat >&2 <<_LT_EOF $progname: Version mismatch error. This is $PACKAGE $VERSION, but the $progname: definition of this LT_INIT comes from $PACKAGE $macro_version. $progname: You should recreate aclocal.m4 with macros from $PACKAGE $VERSION $progname: and run autoconf again. _LT_EOF fi else cat >&2 <<_LT_EOF $progname: Version mismatch error. This is $PACKAGE $VERSION, revision $package_revision, $progname: but the definition of this LT_INIT comes from revision $macro_revision. $progname: You should recreate aclocal.m4 with macros from revision $package_revision $progname: of $PACKAGE $VERSION and run autoconf again. _LT_EOF fi exit $EXIT_MISMATCH fi } ## ----------- ## ## Main. ## ## ----------- ## $opt_help || { # Sanity checks first: func_check_version_match if test "$build_libtool_libs" != yes && test "$build_old_libs" != yes; then func_fatal_configuration "not configured to build any kind of library" fi test -z "$mode" && func_fatal_error "error: you must specify a MODE." # Darwin sucks eval std_shrext=\"$shrext_cmds\" # Only execute mode is allowed to have -dlopen flags. if test -n "$execute_dlfiles" && test "$mode" != execute; then func_error "unrecognized option \`-dlopen'" $ECHO "$help" 1>&2 exit $EXIT_FAILURE fi # Change the help message to a mode-specific one. generic_help="$help" help="Try \`$progname --help --mode=$mode' for more information." } # func_lalib_p file # True iff FILE is a libtool `.la' library or `.lo' object file. # This function is only a basic sanity check; it will hardly flush out # determined imposters. func_lalib_p () { test -f "$1" && $SED -e 4q "$1" 2>/dev/null \ | $GREP "^# Generated by .*$PACKAGE" > /dev/null 2>&1 } # func_lalib_unsafe_p file # True iff FILE is a libtool `.la' library or `.lo' object file. # This function implements the same check as func_lalib_p without # resorting to external programs. To this end, it redirects stdin and # closes it afterwards, without saving the original file descriptor. # As a safety measure, use it only where a negative result would be # fatal anyway. Works if `file' does not exist. func_lalib_unsafe_p () { lalib_p=no if test -f "$1" && test -r "$1" && exec 5<&0 <"$1"; then for lalib_p_l in 1 2 3 4 do read lalib_p_line case "$lalib_p_line" in \#\ Generated\ by\ *$PACKAGE* ) lalib_p=yes; break;; esac done exec 0<&5 5<&- fi test "$lalib_p" = yes } # func_ltwrapper_script_p file # True iff FILE is a libtool wrapper script # This function is only a basic sanity check; it will hardly flush out # determined imposters. func_ltwrapper_script_p () { func_lalib_p "$1" } # func_ltwrapper_executable_p file # True iff FILE is a libtool wrapper executable # This function is only a basic sanity check; it will hardly flush out # determined imposters. func_ltwrapper_executable_p () { func_ltwrapper_exec_suffix= case $1 in *.exe) ;; *) func_ltwrapper_exec_suffix=.exe ;; esac $GREP "$magic_exe" "$1$func_ltwrapper_exec_suffix" >/dev/null 2>&1 } # func_ltwrapper_scriptname file # Assumes file is an ltwrapper_executable # uses $file to determine the appropriate filename for a # temporary ltwrapper_script. func_ltwrapper_scriptname () { func_ltwrapper_scriptname_result="" if func_ltwrapper_executable_p "$1"; then func_dirname_and_basename "$1" "" "." func_stripname '' '.exe' "$func_basename_result" func_ltwrapper_scriptname_result="$func_dirname_result/$objdir/${func_stripname_result}_ltshwrapper" fi } # func_ltwrapper_p file # True iff FILE is a libtool wrapper script or wrapper executable # This function is only a basic sanity check; it will hardly flush out # determined imposters. func_ltwrapper_p () { func_ltwrapper_script_p "$1" || func_ltwrapper_executable_p "$1" } # func_execute_cmds commands fail_cmd # Execute tilde-delimited COMMANDS. # If FAIL_CMD is given, eval that upon failure. # FAIL_CMD may read-access the current command in variable CMD! func_execute_cmds () { $opt_debug save_ifs=$IFS; IFS='~' for cmd in $1; do IFS=$save_ifs eval cmd=\"$cmd\" func_show_eval "$cmd" "${2-:}" done IFS=$save_ifs } # func_source file # Source FILE, adding directory component if necessary. # Note that it is not necessary on cygwin/mingw to append a dot to # FILE even if both FILE and FILE.exe exist: automatic-append-.exe # behavior happens only for exec(3), not for open(2)! Also, sourcing # `FILE.' does not work on cygwin managed mounts. func_source () { $opt_debug case $1 in */* | *\\*) . "$1" ;; *) . "./$1" ;; esac } # func_infer_tag arg # Infer tagged configuration to use if any are available and # if one wasn't chosen via the "--tag" command line option. # Only attempt this if the compiler in the base compile # command doesn't match the default compiler. # arg is usually of the form 'gcc ...' func_infer_tag () { $opt_debug if test -n "$available_tags" && test -z "$tagname"; then CC_quoted= for arg in $CC; do func_quote_for_eval "$arg" CC_quoted="$CC_quoted $func_quote_for_eval_result" done case $@ in # Blanks in the command may have been stripped by the calling shell, # but not from the CC environment variable when configure was run. " $CC "* | "$CC "* | " `$ECHO $CC` "* | "`$ECHO $CC` "* | " $CC_quoted"* | "$CC_quoted "* | " `$ECHO $CC_quoted` "* | "`$ECHO $CC_quoted` "*) ;; # Blanks at the start of $base_compile will cause this to fail # if we don't check for them as well. *) for z in $available_tags; do if $GREP "^# ### BEGIN LIBTOOL TAG CONFIG: $z$" < "$progpath" > /dev/null; then # Evaluate the configuration. eval "`${SED} -n -e '/^# ### BEGIN LIBTOOL TAG CONFIG: '$z'$/,/^# ### END LIBTOOL TAG CONFIG: '$z'$/p' < $progpath`" CC_quoted= for arg in $CC; do # Double-quote args containing other shell metacharacters. func_quote_for_eval "$arg" CC_quoted="$CC_quoted $func_quote_for_eval_result" done case "$@ " in " $CC "* | "$CC "* | " `$ECHO $CC` "* | "`$ECHO $CC` "* | " $CC_quoted"* | "$CC_quoted "* | " `$ECHO $CC_quoted` "* | "`$ECHO $CC_quoted` "*) # The compiler in the base compile command matches # the one in the tagged configuration. # Assume this is the tagged configuration we want. tagname=$z break ;; esac fi done # If $tagname still isn't set, then no tagged configuration # was found and let the user know that the "--tag" command # line option must be used. if test -z "$tagname"; then func_echo "unable to infer tagged configuration" func_fatal_error "specify a tag with \`--tag'" # else # func_verbose "using $tagname tagged configuration" fi ;; esac fi } # func_write_libtool_object output_name pic_name nonpic_name # Create a libtool object file (analogous to a ".la" file), # but don't create it if we're doing a dry run. func_write_libtool_object () { write_libobj=${1} if test "$build_libtool_libs" = yes; then write_lobj=\'${2}\' else write_lobj=none fi if test "$build_old_libs" = yes; then write_oldobj=\'${3}\' else write_oldobj=none fi $opt_dry_run || { cat >${write_libobj}T <<EOF # $write_libobj - a libtool object file # Generated by $PROGRAM (GNU $PACKAGE$TIMESTAMP) $VERSION # # Please DO NOT delete this file! # It is necessary for linking the library. # Name of the PIC object. pic_object=$write_lobj # Name of the non-PIC object non_pic_object=$write_oldobj EOF $MV "${write_libobj}T" "${write_libobj}" } } # func_mode_compile arg... func_mode_compile () { $opt_debug # Get the compilation command and the source file. base_compile= srcfile="$nonopt" # always keep a non-empty value in "srcfile" suppress_opt=yes suppress_output= arg_mode=normal libobj= later= pie_flag= for arg do case $arg_mode in arg ) # do not "continue". Instead, add this to base_compile lastarg="$arg" arg_mode=normal ;; target ) libobj="$arg" arg_mode=normal continue ;; normal ) # Accept any command-line options. case $arg in -o) test -n "$libobj" && \ func_fatal_error "you cannot specify \`-o' more than once" arg_mode=target continue ;; -pie | -fpie | -fPIE) pie_flag="$pie_flag $arg" continue ;; -shared | -static | -prefer-pic | -prefer-non-pic) later="$later $arg" continue ;; -no-suppress) suppress_opt=no continue ;; -Xcompiler) arg_mode=arg # the next one goes into the "base_compile" arg list continue # The current "srcfile" will either be retained or ;; # replaced later. I would guess that would be a bug. -Wc,*) func_stripname '-Wc,' '' "$arg" args=$func_stripname_result lastarg= save_ifs="$IFS"; IFS=',' for arg in $args; do IFS="$save_ifs" func_quote_for_eval "$arg" lastarg="$lastarg $func_quote_for_eval_result" done IFS="$save_ifs" func_stripname ' ' '' "$lastarg" lastarg=$func_stripname_result # Add the arguments to base_compile. base_compile="$base_compile $lastarg" continue ;; *) # Accept the current argument as the source file. # The previous "srcfile" becomes the current argument. # lastarg="$srcfile" srcfile="$arg" ;; esac # case $arg ;; esac # case $arg_mode # Aesthetically quote the previous argument. func_quote_for_eval "$lastarg" base_compile="$base_compile $func_quote_for_eval_result" done # for arg case $arg_mode in arg) func_fatal_error "you must specify an argument for -Xcompile" ;; target) func_fatal_error "you must specify a target with \`-o'" ;; *) # Get the name of the library object. test -z "$libobj" && { func_basename "$srcfile" libobj="$func_basename_result" } ;; esac # Recognize several different file suffixes. # If the user specifies -o file.o, it is replaced with file.lo case $libobj in *.[cCFSifmso] | \ *.ada | *.adb | *.ads | *.asm | \ *.c++ | *.cc | *.ii | *.class | *.cpp | *.cxx | \ *.[fF][09]? | *.for | *.java | *.obj | *.sx) func_xform "$libobj" libobj=$func_xform_result ;; esac case $libobj in *.lo) func_lo2o "$libobj"; obj=$func_lo2o_result ;; *) func_fatal_error "cannot determine name of library object from \`$libobj'" ;; esac func_infer_tag $base_compile for arg in $later; do case $arg in -shared) test "$build_libtool_libs" != yes && \ func_fatal_configuration "can not build a shared library" build_old_libs=no continue ;; -static) build_libtool_libs=no build_old_libs=yes continue ;; -prefer-pic) pic_mode=yes continue ;; -prefer-non-pic) pic_mode=no continue ;; esac done func_quote_for_eval "$libobj" test "X$libobj" != "X$func_quote_for_eval_result" \ && $ECHO "X$libobj" | $GREP '[]~#^*{};<>?"'"'"' &()|`$[]' \ && func_warning "libobj name \`$libobj' may not contain shell special characters." func_dirname_and_basename "$obj" "/" "" objname="$func_basename_result" xdir="$func_dirname_result" lobj=${xdir}$objdir/$objname test -z "$base_compile" && \ func_fatal_help "you must specify a compilation command" # Delete any leftover library objects. if test "$build_old_libs" = yes; then removelist="$obj $lobj $libobj ${libobj}T" else removelist="$lobj $libobj ${libobj}T" fi # On Cygwin there's no "real" PIC flag so we must build both object types case $host_os in cygwin* | mingw* | pw32* | os2* | cegcc*) pic_mode=default ;; esac if test "$pic_mode" = no && test "$deplibs_check_method" != pass_all; then # non-PIC code in shared libraries is not supported pic_mode=default fi # Calculate the filename of the output object if compiler does # not support -o with -c if test "$compiler_c_o" = no; then output_obj=`$ECHO "X$srcfile" | $Xsed -e 's%^.*/%%' -e 's%\.[^.]*$%%'`.${objext} lockfile="$output_obj.lock" else output_obj= need_locks=no lockfile= fi # Lock this critical section if it is needed # We use this script file to make the link, it avoids creating a new file if test "$need_locks" = yes; then until $opt_dry_run || ln "$progpath" "$lockfile" 2>/dev/null; do func_echo "Waiting for $lockfile to be removed" sleep 2 done elif test "$need_locks" = warn; then if test -f "$lockfile"; then $ECHO "\ *** ERROR, $lockfile exists and contains: `cat $lockfile 2>/dev/null` This indicates that another process is trying to use the same temporary object file, and libtool could not work around it because your compiler does not support \`-c' and \`-o' together. If you repeat this compilation, it may succeed, by chance, but you had better avoid parallel builds (make -j) in this platform, or get a better compiler." $opt_dry_run || $RM $removelist exit $EXIT_FAILURE fi removelist="$removelist $output_obj" $ECHO "$srcfile" > "$lockfile" fi $opt_dry_run || $RM $removelist removelist="$removelist $lockfile" trap '$opt_dry_run || $RM $removelist; exit $EXIT_FAILURE' 1 2 15 if test -n "$fix_srcfile_path"; then eval srcfile=\"$fix_srcfile_path\" fi func_quote_for_eval "$srcfile" qsrcfile=$func_quote_for_eval_result # Only build a PIC object if we are building libtool libraries. if test "$build_libtool_libs" = yes; then # Without this assignment, base_compile gets emptied. fbsd_hideous_sh_bug=$base_compile if test "$pic_mode" != no; then command="$base_compile $qsrcfile $pic_flag" else # Don't build PIC code command="$base_compile $qsrcfile" fi func_mkdir_p "$xdir$objdir" if test -z "$output_obj"; then # Place PIC objects in $objdir command="$command -o $lobj" fi func_show_eval_locale "$command" \ 'test -n "$output_obj" && $RM $removelist; exit $EXIT_FAILURE' if test "$need_locks" = warn && test "X`cat $lockfile 2>/dev/null`" != "X$srcfile"; then $ECHO "\ *** ERROR, $lockfile contains: `cat $lockfile 2>/dev/null` but it should contain: $srcfile This indicates that another process is trying to use the same temporary object file, and libtool could not work around it because your compiler does not support \`-c' and \`-o' together. If you repeat this compilation, it may succeed, by chance, but you had better avoid parallel builds (make -j) in this platform, or get a better compiler." $opt_dry_run || $RM $removelist exit $EXIT_FAILURE fi # Just move the object if needed, then go on to compile the next one if test -n "$output_obj" && test "X$output_obj" != "X$lobj"; then func_show_eval '$MV "$output_obj" "$lobj"' \ 'error=$?; $opt_dry_run || $RM $removelist; exit $error' fi # Allow error messages only from the first compilation. if test "$suppress_opt" = yes; then suppress_output=' >/dev/null 2>&1' fi fi # Only build a position-dependent object if we build old libraries. if test "$build_old_libs" = yes; then if test "$pic_mode" != yes; then # Don't build PIC code command="$base_compile $qsrcfile$pie_flag" else command="$base_compile $qsrcfile $pic_flag" fi if test "$compiler_c_o" = yes; then command="$command -o $obj" fi # Suppress compiler output if we already did a PIC compilation. command="$command$suppress_output" func_show_eval_locale "$command" \ '$opt_dry_run || $RM $removelist; exit $EXIT_FAILURE' if test "$need_locks" = warn && test "X`cat $lockfile 2>/dev/null`" != "X$srcfile"; then $ECHO "\ *** ERROR, $lockfile contains: `cat $lockfile 2>/dev/null` but it should contain: $srcfile This indicates that another process is trying to use the same temporary object file, and libtool could not work around it because your compiler does not support \`-c' and \`-o' together. If you repeat this compilation, it may succeed, by chance, but you had better avoid parallel builds (make -j) in this platform, or get a better compiler." $opt_dry_run || $RM $removelist exit $EXIT_FAILURE fi # Just move the object if needed if test -n "$output_obj" && test "X$output_obj" != "X$obj"; then func_show_eval '$MV "$output_obj" "$obj"' \ 'error=$?; $opt_dry_run || $RM $removelist; exit $error' fi fi $opt_dry_run || { func_write_libtool_object "$libobj" "$objdir/$objname" "$objname" # Unlock the critical section if it was locked if test "$need_locks" != no; then removelist=$lockfile $RM "$lockfile" fi } exit $EXIT_SUCCESS } $opt_help || { test "$mode" = compile && func_mode_compile ${1+"$@"} } func_mode_help () { # We need to display help for each of the modes. case $mode in "") # Generic help is extracted from the usage comments # at the start of this file. func_help ;; clean) $ECHO \ "Usage: $progname [OPTION]... --mode=clean RM [RM-OPTION]... FILE... Remove files from the build directory. RM is the name of the program to use to delete files associated with each FILE (typically \`/bin/rm'). RM-OPTIONS are options (such as \`-f') to be passed to RM. If FILE is a libtool library, object or program, all the files associated with it are deleted. Otherwise, only FILE itself is deleted using RM." ;; compile) $ECHO \ "Usage: $progname [OPTION]... --mode=compile COMPILE-COMMAND... SOURCEFILE Compile a source file into a libtool library object. This mode accepts the following additional options: -o OUTPUT-FILE set the output file name to OUTPUT-FILE -no-suppress do not suppress compiler output for multiple passes -prefer-pic try to building PIC objects only -prefer-non-pic try to building non-PIC objects only -shared do not build a \`.o' file suitable for static linking -static only build a \`.o' file suitable for static linking COMPILE-COMMAND is a command to be used in creating a \`standard' object file from the given SOURCEFILE. The output file name is determined by removing the directory component from SOURCEFILE, then substituting the C source code suffix \`.c' with the library object suffix, \`.lo'." ;; execute) $ECHO \ "Usage: $progname [OPTION]... --mode=execute COMMAND [ARGS]... Automatically set library path, then run a program. This mode accepts the following additional options: -dlopen FILE add the directory containing FILE to the library path This mode sets the library path environment variable according to \`-dlopen' flags. If any of the ARGS are libtool executable wrappers, then they are translated into their corresponding uninstalled binary, and any of their required library directories are added to the library path. Then, COMMAND is executed, with ARGS as arguments." ;; finish) $ECHO \ "Usage: $progname [OPTION]... --mode=finish [LIBDIR]... Complete the installation of libtool libraries. Each LIBDIR is a directory that contains libtool libraries. The commands that this mode executes may require superuser privileges. Use the \`--dry-run' option if you just want to see what would be executed." ;; install) $ECHO \ "Usage: $progname [OPTION]... --mode=install INSTALL-COMMAND... Install executables or libraries. INSTALL-COMMAND is the installation command. The first component should be either the \`install' or \`cp' program. The following components of INSTALL-COMMAND are treated specially: -inst-prefix PREFIX-DIR Use PREFIX-DIR as a staging area for installation The rest of the components are interpreted as arguments to that command (only BSD-compatible install options are recognized)." ;; link) $ECHO \ "Usage: $progname [OPTION]... --mode=link LINK-COMMAND... Link object files or libraries together to form another library, or to create an executable program. LINK-COMMAND is a command using the C compiler that you would use to create a program from several object files. The following components of LINK-COMMAND are treated specially: -all-static do not do any dynamic linking at all -avoid-version do not add a version suffix if possible -dlopen FILE \`-dlpreopen' FILE if it cannot be dlopened at runtime -dlpreopen FILE link in FILE and add its symbols to lt_preloaded_symbols -export-dynamic allow symbols from OUTPUT-FILE to be resolved with dlsym(3) -export-symbols SYMFILE try to export only the symbols listed in SYMFILE -export-symbols-regex REGEX try to export only the symbols matching REGEX -LLIBDIR search LIBDIR for required installed libraries -lNAME OUTPUT-FILE requires the installed library libNAME -module build a library that can dlopened -no-fast-install disable the fast-install mode -no-install link a not-installable executable -no-undefined declare that a library does not refer to external symbols -o OUTPUT-FILE create OUTPUT-FILE from the specified objects -objectlist FILE Use a list of object files found in FILE to specify objects -precious-files-regex REGEX don't remove output files matching REGEX -release RELEASE specify package release information -rpath LIBDIR the created library will eventually be installed in LIBDIR -R[ ]LIBDIR add LIBDIR to the runtime path of programs and libraries -shared only do dynamic linking of libtool libraries -shrext SUFFIX override the standard shared library file extension -static do not do any dynamic linking of uninstalled libtool libraries -static-libtool-libs do not do any dynamic linking of libtool libraries -version-info CURRENT[:REVISION[:AGE]] specify library version info [each variable defaults to 0] -weak LIBNAME declare that the target provides the LIBNAME interface All other options (arguments beginning with \`-') are ignored. Every other argument is treated as a filename. Files ending in \`.la' are treated as uninstalled libtool libraries, other files are standard or library object files. If the OUTPUT-FILE ends in \`.la', then a libtool library is created, only library objects (\`.lo' files) may be specified, and \`-rpath' is required, except when creating a convenience library. If OUTPUT-FILE ends in \`.a' or \`.lib', then a standard library is created using \`ar' and \`ranlib', or on Windows using \`lib'. If OUTPUT-FILE ends in \`.lo' or \`.${objext}', then a reloadable object file is created, otherwise an executable program is created." ;; uninstall) $ECHO \ "Usage: $progname [OPTION]... --mode=uninstall RM [RM-OPTION]... FILE... Remove libraries from an installation directory. RM is the name of the program to use to delete files associated with each FILE (typically \`/bin/rm'). RM-OPTIONS are options (such as \`-f') to be passed to RM. If FILE is a libtool library, all the files associated with it are deleted. Otherwise, only FILE itself is deleted using RM." ;; *) func_fatal_help "invalid operation mode \`$mode'" ;; esac $ECHO $ECHO "Try \`$progname --help' for more information about other modes." exit $? } # Now that we've collected a possible --mode arg, show help if necessary $opt_help && func_mode_help # func_mode_execute arg... func_mode_execute () { $opt_debug # The first argument is the command name. cmd="$nonopt" test -z "$cmd" && \ func_fatal_help "you must specify a COMMAND" # Handle -dlopen flags immediately. for file in $execute_dlfiles; do test -f "$file" \ || func_fatal_help "\`$file' is not a file" dir= case $file in *.la) # Check to see that this really is a libtool archive. func_lalib_unsafe_p "$file" \ || func_fatal_help "\`$lib' is not a valid libtool archive" # Read the libtool library. dlname= library_names= func_source "$file" # Skip this library if it cannot be dlopened. if test -z "$dlname"; then # Warn if it was a shared library. test -n "$library_names" && \ func_warning "\`$file' was not linked with \`-export-dynamic'" continue fi func_dirname "$file" "" "." dir="$func_dirname_result" if test -f "$dir/$objdir/$dlname"; then dir="$dir/$objdir" else if test ! -f "$dir/$dlname"; then func_fatal_error "cannot find \`$dlname' in \`$dir' or \`$dir/$objdir'" fi fi ;; *.lo) # Just add the directory containing the .lo file. func_dirname "$file" "" "." dir="$func_dirname_result" ;; *) func_warning "\`-dlopen' is ignored for non-libtool libraries and objects" continue ;; esac # Get the absolute pathname. absdir=`cd "$dir" && pwd` test -n "$absdir" && dir="$absdir" # Now add the directory to shlibpath_var. if eval "test -z \"\$$shlibpath_var\""; then eval "$shlibpath_var=\"\$dir\"" else eval "$shlibpath_var=\"\$dir:\$$shlibpath_var\"" fi done # This variable tells wrapper scripts just to set shlibpath_var # rather than running their programs. libtool_execute_magic="$magic" # Check if any of the arguments is a wrapper script. args= for file do case $file in -*) ;; *) # Do a test to see if this is really a libtool program. if func_ltwrapper_script_p "$file"; then func_source "$file" # Transform arg to wrapped name. file="$progdir/$program" elif func_ltwrapper_executable_p "$file"; then func_ltwrapper_scriptname "$file" func_source "$func_ltwrapper_scriptname_result" # Transform arg to wrapped name. file="$progdir/$program" fi ;; esac # Quote arguments (to preserve shell metacharacters). func_quote_for_eval "$file" args="$args $func_quote_for_eval_result" done if test "X$opt_dry_run" = Xfalse; then if test -n "$shlibpath_var"; then # Export the shlibpath_var. eval "export $shlibpath_var" fi # Restore saved environment variables for lt_var in LANG LANGUAGE LC_ALL LC_CTYPE LC_COLLATE LC_MESSAGES do eval "if test \"\${save_$lt_var+set}\" = set; then $lt_var=\$save_$lt_var; export $lt_var else $lt_unset $lt_var fi" done # Now prepare to actually exec the command. exec_cmd="\$cmd$args" else # Display what would be done. if test -n "$shlibpath_var"; then eval "\$ECHO \"\$shlibpath_var=\$$shlibpath_var\"" $ECHO "export $shlibpath_var" fi $ECHO "$cmd$args" exit $EXIT_SUCCESS fi } test "$mode" = execute && func_mode_execute ${1+"$@"} # func_mode_finish arg... func_mode_finish () { $opt_debug libdirs="$nonopt" admincmds= if test -n "$finish_cmds$finish_eval" && test -n "$libdirs"; then for dir do libdirs="$libdirs $dir" done for libdir in $libdirs; do if test -n "$finish_cmds"; then # Do each command in the finish commands. func_execute_cmds "$finish_cmds" 'admincmds="$admincmds '"$cmd"'"' fi if test -n "$finish_eval"; then # Do the single finish_eval. eval cmds=\"$finish_eval\" $opt_dry_run || eval "$cmds" || admincmds="$admincmds $cmds" fi done fi # Exit here if they wanted silent mode. $opt_silent && exit $EXIT_SUCCESS $ECHO "X----------------------------------------------------------------------" | $Xsed $ECHO "Libraries have been installed in:" for libdir in $libdirs; do $ECHO " $libdir" done $ECHO $ECHO "If you ever happen to want to link against installed libraries" $ECHO "in a given directory, LIBDIR, you must either use libtool, and" $ECHO "specify the full pathname of the library, or use the \`-LLIBDIR'" $ECHO "flag during linking and do at least one of the following:" if test -n "$shlibpath_var"; then $ECHO " - add LIBDIR to the \`$shlibpath_var' environment variable" $ECHO " during execution" fi if test -n "$runpath_var"; then $ECHO " - add LIBDIR to the \`$runpath_var' environment variable" $ECHO " during linking" fi if test -n "$hardcode_libdir_flag_spec"; then libdir=LIBDIR eval flag=\"$hardcode_libdir_flag_spec\" $ECHO " - use the \`$flag' linker flag" fi if test -n "$admincmds"; then $ECHO " - have your system administrator run these commands:$admincmds" fi if test -f /etc/ld.so.conf; then $ECHO " - have your system administrator add LIBDIR to \`/etc/ld.so.conf'" fi $ECHO $ECHO "See any operating system documentation about shared libraries for" case $host in solaris2.[6789]|solaris2.1[0-9]) $ECHO "more information, such as the ld(1), crle(1) and ld.so(8) manual" $ECHO "pages." ;; *) $ECHO "more information, such as the ld(1) and ld.so(8) manual pages." ;; esac $ECHO "X----------------------------------------------------------------------" | $Xsed exit $EXIT_SUCCESS } test "$mode" = finish && func_mode_finish ${1+"$@"} # func_mode_install arg... func_mode_install () { $opt_debug # There may be an optional sh(1) argument at the beginning of # install_prog (especially on Windows NT). if test "$nonopt" = "$SHELL" || test "$nonopt" = /bin/sh || # Allow the use of GNU shtool's install command. $ECHO "X$nonopt" | $GREP shtool >/dev/null; then # Aesthetically quote it. func_quote_for_eval "$nonopt" install_prog="$func_quote_for_eval_result " arg=$1 shift else install_prog= arg=$nonopt fi # The real first argument should be the name of the installation program. # Aesthetically quote it. func_quote_for_eval "$arg" install_prog="$install_prog$func_quote_for_eval_result" # We need to accept at least all the BSD install flags. dest= files= opts= prev= install_type= isdir=no stripme= for arg do if test -n "$dest"; then files="$files $dest" dest=$arg continue fi case $arg in -d) isdir=yes ;; -f) case " $install_prog " in *[\\\ /]cp\ *) ;; *) prev=$arg ;; esac ;; -g | -m | -o) prev=$arg ;; -s) stripme=" -s" continue ;; -*) ;; *) # If the previous option needed an argument, then skip it. if test -n "$prev"; then prev= else dest=$arg continue fi ;; esac # Aesthetically quote the argument. func_quote_for_eval "$arg" install_prog="$install_prog $func_quote_for_eval_result" done test -z "$install_prog" && \ func_fatal_help "you must specify an install program" test -n "$prev" && \ func_fatal_help "the \`$prev' option requires an argument" if test -z "$files"; then if test -z "$dest"; then func_fatal_help "no file or destination specified" else func_fatal_help "you must specify a destination" fi fi # Strip any trailing slash from the destination. func_stripname '' '/' "$dest" dest=$func_stripname_result # Check to see that the destination is a directory. test -d "$dest" && isdir=yes if test "$isdir" = yes; then destdir="$dest" destname= else func_dirname_and_basename "$dest" "" "." destdir="$func_dirname_result" destname="$func_basename_result" # Not a directory, so check to see that there is only one file specified. set dummy $files; shift test "$#" -gt 1 && \ func_fatal_help "\`$dest' is not a directory" fi case $destdir in [\\/]* | [A-Za-z]:[\\/]*) ;; *) for file in $files; do case $file in *.lo) ;; *) func_fatal_help "\`$destdir' must be an absolute directory name" ;; esac done ;; esac # This variable tells wrapper scripts just to set variables rather # than running their programs. libtool_install_magic="$magic" staticlibs= future_libdirs= current_libdirs= for file in $files; do # Do each installation. case $file in *.$libext) # Do the static libraries later. staticlibs="$staticlibs $file" ;; *.la) # Check to see that this really is a libtool archive. func_lalib_unsafe_p "$file" \ || func_fatal_help "\`$file' is not a valid libtool archive" library_names= old_library= relink_command= func_source "$file" # Add the libdir to current_libdirs if it is the destination. if test "X$destdir" = "X$libdir"; then case "$current_libdirs " in *" $libdir "*) ;; *) current_libdirs="$current_libdirs $libdir" ;; esac else # Note the libdir as a future libdir. case "$future_libdirs " in *" $libdir "*) ;; *) future_libdirs="$future_libdirs $libdir" ;; esac fi func_dirname "$file" "/" "" dir="$func_dirname_result" dir="$dir$objdir" if test -n "$relink_command"; then # Determine the prefix the user has applied to our future dir. inst_prefix_dir=`$ECHO "X$destdir" | $Xsed -e "s%$libdir\$%%"` # Don't allow the user to place us outside of our expected # location b/c this prevents finding dependent libraries that # are installed to the same prefix. # At present, this check doesn't affect windows .dll's that # are installed into $libdir/../bin (currently, that works fine) # but it's something to keep an eye on. test "$inst_prefix_dir" = "$destdir" && \ func_fatal_error "error: cannot install \`$file' to a directory not ending in $libdir" if test -n "$inst_prefix_dir"; then # Stick the inst_prefix_dir data into the link command. relink_command=`$ECHO "X$relink_command" | $Xsed -e "s%@inst_prefix_dir@%-inst-prefix-dir $inst_prefix_dir%"` else relink_command=`$ECHO "X$relink_command" | $Xsed -e "s%@inst_prefix_dir@%%"` fi func_warning "relinking \`$file'" func_show_eval "$relink_command" \ 'func_fatal_error "error: relink \`$file'\'' with the above command before installing it"' fi # See the names of the shared library. set dummy $library_names; shift if test -n "$1"; then realname="$1" shift srcname="$realname" test -n "$relink_command" && srcname="$realname"T # Install the shared library and build the symlinks. func_show_eval "$install_prog $dir/$srcname $destdir/$realname" \ 'exit $?' tstripme="$stripme" case $host_os in cygwin* | mingw* | pw32* | cegcc*) case $realname in *.dll.a) tstripme="" ;; esac ;; esac if test -n "$tstripme" && test -n "$striplib"; then func_show_eval "$striplib $destdir/$realname" 'exit $?' fi if test "$#" -gt 0; then # Delete the old symlinks, and create new ones. # Try `ln -sf' first, because the `ln' binary might depend on # the symlink we replace! Solaris /bin/ln does not understand -f, # so we also need to try rm && ln -s. for linkname do test "$linkname" != "$realname" \ && func_show_eval "(cd $destdir && { $LN_S -f $realname $linkname || { $RM $linkname && $LN_S $realname $linkname; }; })" done fi # Do each command in the postinstall commands. lib="$destdir/$realname" func_execute_cmds "$postinstall_cmds" 'exit $?' fi # Install the pseudo-library for information purposes. func_basename "$file" name="$func_basename_result" instname="$dir/$name"i func_show_eval "$install_prog $instname $destdir/$name" 'exit $?' # Maybe install the static library, too. test -n "$old_library" && staticlibs="$staticlibs $dir/$old_library" ;; *.lo) # Install (i.e. copy) a libtool object. # Figure out destination file name, if it wasn't already specified. if test -n "$destname"; then destfile="$destdir/$destname" else func_basename "$file" destfile="$func_basename_result" destfile="$destdir/$destfile" fi # Deduce the name of the destination old-style object file. case $destfile in *.lo) func_lo2o "$destfile" staticdest=$func_lo2o_result ;; *.$objext) staticdest="$destfile" destfile= ;; *) func_fatal_help "cannot copy a libtool object to \`$destfile'" ;; esac # Install the libtool object if requested. test -n "$destfile" && \ func_show_eval "$install_prog $file $destfile" 'exit $?' # Install the old object if enabled. if test "$build_old_libs" = yes; then # Deduce the name of the old-style object file. func_lo2o "$file" staticobj=$func_lo2o_result func_show_eval "$install_prog \$staticobj \$staticdest" 'exit $?' fi exit $EXIT_SUCCESS ;; *) # Figure out destination file name, if it wasn't already specified. if test -n "$destname"; then destfile="$destdir/$destname" else func_basename "$file" destfile="$func_basename_result" destfile="$destdir/$destfile" fi # If the file is missing, and there is a .exe on the end, strip it # because it is most likely a libtool script we actually want to # install stripped_ext="" case $file in *.exe) if test ! -f "$file"; then func_stripname '' '.exe' "$file" file=$func_stripname_result stripped_ext=".exe" fi ;; esac # Do a test to see if this is really a libtool program. case $host in *cygwin* | *mingw*) if func_ltwrapper_executable_p "$file"; then func_ltwrapper_scriptname "$file" wrapper=$func_ltwrapper_scriptname_result else func_stripname '' '.exe' "$file" wrapper=$func_stripname_result fi ;; *) wrapper=$file ;; esac if func_ltwrapper_script_p "$wrapper"; then notinst_deplibs= relink_command= func_source "$wrapper" # Check the variables that should have been set. test -z "$generated_by_libtool_version" && \ func_fatal_error "invalid libtool wrapper script \`$wrapper'" finalize=yes for lib in $notinst_deplibs; do # Check to see that each library is installed. libdir= if test -f "$lib"; then func_source "$lib" fi libfile="$libdir/"`$ECHO "X$lib" | $Xsed -e 's%^.*/%%g'` ### testsuite: skip nested quoting test if test -n "$libdir" && test ! -f "$libfile"; then func_warning "\`$lib' has not been installed in \`$libdir'" finalize=no fi done relink_command= func_source "$wrapper" outputname= if test "$fast_install" = no && test -n "$relink_command"; then $opt_dry_run || { if test "$finalize" = yes; then tmpdir=`func_mktempdir` func_basename "$file$stripped_ext" file="$func_basename_result" outputname="$tmpdir/$file" # Replace the output file specification. relink_command=`$ECHO "X$relink_command" | $Xsed -e 's%@OUTPUT@%'"$outputname"'%g'` $opt_silent || { func_quote_for_expand "$relink_command" eval "func_echo $func_quote_for_expand_result" } if eval "$relink_command"; then : else func_error "error: relink \`$file' with the above command before installing it" $opt_dry_run || ${RM}r "$tmpdir" continue fi file="$outputname" else func_warning "cannot relink \`$file'" fi } else # Install the binary that we compiled earlier. file=`$ECHO "X$file$stripped_ext" | $Xsed -e "s%\([^/]*\)$%$objdir/\1%"` fi fi # remove .exe since cygwin /usr/bin/install will append another # one anyway case $install_prog,$host in */usr/bin/install*,*cygwin*) case $file:$destfile in *.exe:*.exe) # this is ok ;; *.exe:*) destfile=$destfile.exe ;; *:*.exe) func_stripname '' '.exe' "$destfile" destfile=$func_stripname_result ;; esac ;; esac func_show_eval "$install_prog\$stripme \$file \$destfile" 'exit $?' $opt_dry_run || if test -n "$outputname"; then ${RM}r "$tmpdir" fi ;; esac done for file in $staticlibs; do func_basename "$file" name="$func_basename_result" # Set up the ranlib parameters. oldlib="$destdir/$name" func_show_eval "$install_prog \$file \$oldlib" 'exit $?' if test -n "$stripme" && test -n "$old_striplib"; then func_show_eval "$old_striplib $oldlib" 'exit $?' fi # Do each command in the postinstall commands. func_execute_cmds "$old_postinstall_cmds" 'exit $?' done test -n "$future_libdirs" && \ func_warning "remember to run \`$progname --finish$future_libdirs'" if test -n "$current_libdirs"; then # Maybe just do a dry run. $opt_dry_run && current_libdirs=" -n$current_libdirs" exec_cmd='$SHELL $progpath $preserve_args --finish$current_libdirs' else exit $EXIT_SUCCESS fi } test "$mode" = install && func_mode_install ${1+"$@"} # func_generate_dlsyms outputname originator pic_p # Extract symbols from dlprefiles and create ${outputname}S.o with # a dlpreopen symbol table. func_generate_dlsyms () { $opt_debug my_outputname="$1" my_originator="$2" my_pic_p="${3-no}" my_prefix=`$ECHO "$my_originator" | sed 's%[^a-zA-Z0-9]%_%g'` my_dlsyms= if test -n "$dlfiles$dlprefiles" || test "$dlself" != no; then if test -n "$NM" && test -n "$global_symbol_pipe"; then my_dlsyms="${my_outputname}S.c" else func_error "not configured to extract global symbols from dlpreopened files" fi fi if test -n "$my_dlsyms"; then case $my_dlsyms in "") ;; *.c) # Discover the nlist of each of the dlfiles. nlist="$output_objdir/${my_outputname}.nm" func_show_eval "$RM $nlist ${nlist}S ${nlist}T" # Parse the name list into a source file. func_verbose "creating $output_objdir/$my_dlsyms" $opt_dry_run || $ECHO > "$output_objdir/$my_dlsyms" "\ /* $my_dlsyms - symbol resolution table for \`$my_outputname' dlsym emulation. */ /* Generated by $PROGRAM (GNU $PACKAGE$TIMESTAMP) $VERSION */ #ifdef __cplusplus extern \"C\" { #endif /* External symbol declarations for the compiler. */\ " if test "$dlself" = yes; then func_verbose "generating symbol list for \`$output'" $opt_dry_run || echo ': @PROGRAM@ ' > "$nlist" # Add our own program objects to the symbol list. progfiles=`$ECHO "X$objs$old_deplibs" | $SP2NL | $Xsed -e "$lo2o" | $NL2SP` for progfile in $progfiles; do func_verbose "extracting global C symbols from \`$progfile'" $opt_dry_run || eval "$NM $progfile | $global_symbol_pipe >> '$nlist'" done if test -n "$exclude_expsyms"; then $opt_dry_run || { eval '$EGREP -v " ($exclude_expsyms)$" "$nlist" > "$nlist"T' eval '$MV "$nlist"T "$nlist"' } fi if test -n "$export_symbols_regex"; then $opt_dry_run || { eval '$EGREP -e "$export_symbols_regex" "$nlist" > "$nlist"T' eval '$MV "$nlist"T "$nlist"' } fi # Prepare the list of exported symbols if test -z "$export_symbols"; then export_symbols="$output_objdir/$outputname.exp" $opt_dry_run || { $RM $export_symbols eval "${SED} -n -e '/^: @PROGRAM@ $/d' -e 's/^.* \(.*\)$/\1/p' "'< "$nlist" > "$export_symbols"' case $host in *cygwin* | *mingw* | *cegcc* ) eval "echo EXPORTS "'> "$output_objdir/$outputname.def"' eval 'cat "$export_symbols" >> "$output_objdir/$outputname.def"' ;; esac } else $opt_dry_run || { eval "${SED} -e 's/\([].[*^$]\)/\\\\\1/g' -e 's/^/ /' -e 's/$/$/'"' < "$export_symbols" > "$output_objdir/$outputname.exp"' eval '$GREP -f "$output_objdir/$outputname.exp" < "$nlist" > "$nlist"T' eval '$MV "$nlist"T "$nlist"' case $host in *cygwin | *mingw* | *cegcc* ) eval "echo EXPORTS "'> "$output_objdir/$outputname.def"' eval 'cat "$nlist" >> "$output_objdir/$outputname.def"' ;; esac } fi fi for dlprefile in $dlprefiles; do func_verbose "extracting global C symbols from \`$dlprefile'" func_basename "$dlprefile" name="$func_basename_result" $opt_dry_run || { eval '$ECHO ": $name " >> "$nlist"' eval "$NM $dlprefile 2>/dev/null | $global_symbol_pipe >> '$nlist'" } done $opt_dry_run || { # Make sure we have at least an empty file. test -f "$nlist" || : > "$nlist" if test -n "$exclude_expsyms"; then $EGREP -v " ($exclude_expsyms)$" "$nlist" > "$nlist"T $MV "$nlist"T "$nlist" fi # Try sorting and uniquifying the output. if $GREP -v "^: " < "$nlist" | if sort -k 3 </dev/null >/dev/null 2>&1; then sort -k 3 else sort +2 fi | uniq > "$nlist"S; then : else $GREP -v "^: " < "$nlist" > "$nlist"S fi if test -f "$nlist"S; then eval "$global_symbol_to_cdecl"' < "$nlist"S >> "$output_objdir/$my_dlsyms"' else $ECHO '/* NONE */' >> "$output_objdir/$my_dlsyms" fi $ECHO >> "$output_objdir/$my_dlsyms" "\ /* The mapping between symbol names and symbols. */ typedef struct { const char *name; void *address; } lt_dlsymlist; " case $host in *cygwin* | *mingw* | *cegcc* ) $ECHO >> "$output_objdir/$my_dlsyms" "\ /* DATA imports from DLLs on WIN32 con't be const, because runtime relocations are performed -- see ld's documentation on pseudo-relocs. */" lt_dlsym_const= ;; *osf5*) echo >> "$output_objdir/$my_dlsyms" "\ /* This system does not cope well with relocations in const data */" lt_dlsym_const= ;; *) lt_dlsym_const=const ;; esac $ECHO >> "$output_objdir/$my_dlsyms" "\ extern $lt_dlsym_const lt_dlsymlist lt_${my_prefix}_LTX_preloaded_symbols[]; $lt_dlsym_const lt_dlsymlist lt_${my_prefix}_LTX_preloaded_symbols[] = {\ { \"$my_originator\", (void *) 0 }," case $need_lib_prefix in no) eval "$global_symbol_to_c_name_address" < "$nlist" >> "$output_objdir/$my_dlsyms" ;; *) eval "$global_symbol_to_c_name_address_lib_prefix" < "$nlist" >> "$output_objdir/$my_dlsyms" ;; esac $ECHO >> "$output_objdir/$my_dlsyms" "\ {0, (void *) 0} }; /* This works around a problem in FreeBSD linker */ #ifdef FREEBSD_WORKAROUND static const void *lt_preloaded_setup() { return lt_${my_prefix}_LTX_preloaded_symbols; } #endif #ifdef __cplusplus } #endif\ " } # !$opt_dry_run pic_flag_for_symtable= case "$compile_command " in *" -static "*) ;; *) case $host in # compiling the symbol table file with pic_flag works around # a FreeBSD bug that causes programs to crash when -lm is # linked before any other PIC object. But we must not use # pic_flag when linking with -static. The problem exists in # FreeBSD 2.2.6 and is fixed in FreeBSD 3.1. *-*-freebsd2*|*-*-freebsd3.0*|*-*-freebsdelf3.0*) pic_flag_for_symtable=" $pic_flag -DFREEBSD_WORKAROUND" ;; *-*-hpux*) pic_flag_for_symtable=" $pic_flag" ;; *) if test "X$my_pic_p" != Xno; then pic_flag_for_symtable=" $pic_flag" fi ;; esac ;; esac symtab_cflags= for arg in $LTCFLAGS; do case $arg in -pie | -fpie | -fPIE) ;; *) symtab_cflags="$symtab_cflags $arg" ;; esac done # Now compile the dynamic symbol file. func_show_eval '(cd $output_objdir && $LTCC$symtab_cflags -c$no_builtin_flag$pic_flag_for_symtable "$my_dlsyms")' 'exit $?' # Clean up the generated files. func_show_eval '$RM "$output_objdir/$my_dlsyms" "$nlist" "${nlist}S" "${nlist}T"' # Transform the symbol file into the correct name. symfileobj="$output_objdir/${my_outputname}S.$objext" case $host in *cygwin* | *mingw* | *cegcc* ) if test -f "$output_objdir/$my_outputname.def"; then compile_command=`$ECHO "X$compile_command" | $Xsed -e "s%@SYMFILE@%$output_objdir/$my_outputname.def $symfileobj%"` finalize_command=`$ECHO "X$finalize_command" | $Xsed -e "s%@SYMFILE@%$output_objdir/$my_outputname.def $symfileobj%"` else compile_command=`$ECHO "X$compile_command" | $Xsed -e "s%@SYMFILE@%$symfileobj%"` finalize_command=`$ECHO "X$finalize_command" | $Xsed -e "s%@SYMFILE@%$symfileobj%"` fi ;; *) compile_command=`$ECHO "X$compile_command" | $Xsed -e "s%@SYMFILE@%$symfileobj%"` finalize_command=`$ECHO "X$finalize_command" | $Xsed -e "s%@SYMFILE@%$symfileobj%"` ;; esac ;; *) func_fatal_error "unknown suffix for \`$my_dlsyms'" ;; esac else # We keep going just in case the user didn't refer to # lt_preloaded_symbols. The linker will fail if global_symbol_pipe # really was required. # Nullify the symbol file. compile_command=`$ECHO "X$compile_command" | $Xsed -e "s% @SYMFILE@%%"` finalize_command=`$ECHO "X$finalize_command" | $Xsed -e "s% @SYMFILE@%%"` fi } # func_win32_libid arg # return the library type of file 'arg' # # Need a lot of goo to handle *both* DLLs and import libs # Has to be a shell function in order to 'eat' the argument # that is supplied when $file_magic_command is called. func_win32_libid () { $opt_debug win32_libid_type="unknown" win32_fileres=`file -L $1 2>/dev/null` case $win32_fileres in *ar\ archive\ import\ library*) # definitely import win32_libid_type="x86 archive import" ;; *ar\ archive*) # could be an import, or static if eval $OBJDUMP -f $1 | $SED -e '10q' 2>/dev/null | $EGREP 'file format pe-i386(.*architecture: i386)?' >/dev/null ; then win32_nmres=`eval $NM -f posix -A $1 | $SED -n -e ' 1,100{ / I /{ s,.*,import, p q } }'` case $win32_nmres in import*) win32_libid_type="x86 archive import";; *) win32_libid_type="x86 archive static";; esac fi ;; *DLL*) win32_libid_type="x86 DLL" ;; *executable*) # but shell scripts are "executable" too... case $win32_fileres in *MS\ Windows\ PE\ Intel*) win32_libid_type="x86 DLL" ;; esac ;; esac $ECHO "$win32_libid_type" } # func_extract_an_archive dir oldlib func_extract_an_archive () { $opt_debug f_ex_an_ar_dir="$1"; shift f_ex_an_ar_oldlib="$1" func_show_eval "(cd \$f_ex_an_ar_dir && $AR x \"\$f_ex_an_ar_oldlib\")" 'exit $?' if ($AR t "$f_ex_an_ar_oldlib" | sort | sort -uc >/dev/null 2>&1); then : else func_fatal_error "object name conflicts in archive: $f_ex_an_ar_dir/$f_ex_an_ar_oldlib" fi } # func_extract_archives gentop oldlib ... func_extract_archives () { $opt_debug my_gentop="$1"; shift my_oldlibs=${1+"$@"} my_oldobjs="" my_xlib="" my_xabs="" my_xdir="" for my_xlib in $my_oldlibs; do # Extract the objects. case $my_xlib in [\\/]* | [A-Za-z]:[\\/]*) my_xabs="$my_xlib" ;; *) my_xabs=`pwd`"/$my_xlib" ;; esac func_basename "$my_xlib" my_xlib="$func_basename_result" my_xlib_u=$my_xlib while :; do case " $extracted_archives " in *" $my_xlib_u "*) func_arith $extracted_serial + 1 extracted_serial=$func_arith_result my_xlib_u=lt$extracted_serial-$my_xlib ;; *) break ;; esac done extracted_archives="$extracted_archives $my_xlib_u" my_xdir="$my_gentop/$my_xlib_u" func_mkdir_p "$my_xdir" case $host in *-darwin*) func_verbose "Extracting $my_xabs" # Do not bother doing anything if just a dry run $opt_dry_run || { darwin_orig_dir=`pwd` cd $my_xdir || exit $? darwin_archive=$my_xabs darwin_curdir=`pwd` darwin_base_archive=`basename "$darwin_archive"` darwin_arches=`$LIPO -info "$darwin_archive" 2>/dev/null | $GREP Architectures 2>/dev/null || true` if test -n "$darwin_arches"; then darwin_arches=`$ECHO "$darwin_arches" | $SED -e 's/.*are://'` darwin_arch= func_verbose "$darwin_base_archive has multiple architectures $darwin_arches" for darwin_arch in $darwin_arches ; do func_mkdir_p "unfat-$$/${darwin_base_archive}-${darwin_arch}" $LIPO -thin $darwin_arch -output "unfat-$$/${darwin_base_archive}-${darwin_arch}/${darwin_base_archive}" "${darwin_archive}" cd "unfat-$$/${darwin_base_archive}-${darwin_arch}" func_extract_an_archive "`pwd`" "${darwin_base_archive}" cd "$darwin_curdir" $RM "unfat-$$/${darwin_base_archive}-${darwin_arch}/${darwin_base_archive}" done # $darwin_arches ## Okay now we've a bunch of thin objects, gotta fatten them up :) darwin_filelist=`find unfat-$$ -type f -name \*.o -print -o -name \*.lo -print | $SED -e "$basename" | sort -u` darwin_file= darwin_files= for darwin_file in $darwin_filelist; do darwin_files=`find unfat-$$ -name $darwin_file -print | $NL2SP` $LIPO -create -output "$darwin_file" $darwin_files done # $darwin_filelist $RM -rf unfat-$$ cd "$darwin_orig_dir" else cd $darwin_orig_dir func_extract_an_archive "$my_xdir" "$my_xabs" fi # $darwin_arches } # !$opt_dry_run ;; *) func_extract_an_archive "$my_xdir" "$my_xabs" ;; esac my_oldobjs="$my_oldobjs "`find $my_xdir -name \*.$objext -print -o -name \*.lo -print | $NL2SP` done func_extract_archives_result="$my_oldobjs" } # func_emit_wrapper_part1 [arg=no] # # Emit the first part of a libtool wrapper script on stdout. # For more information, see the description associated with # func_emit_wrapper(), below. func_emit_wrapper_part1 () { func_emit_wrapper_part1_arg1=no if test -n "$1" ; then func_emit_wrapper_part1_arg1=$1 fi $ECHO "\ #! $SHELL # $output - temporary wrapper script for $objdir/$outputname # Generated by $PROGRAM (GNU $PACKAGE$TIMESTAMP) $VERSION # # The $output program cannot be directly executed until all the libtool # libraries that it depends on are installed. # # This wrapper script should never be moved out of the build directory. # If it is, it will not operate correctly. # Sed substitution that helps us do robust quoting. It backslashifies # metacharacters that are still active within double-quoted strings. Xsed='${SED} -e 1s/^X//' sed_quote_subst='$sed_quote_subst' # Be Bourne compatible if test -n \"\${ZSH_VERSION+set}\" && (emulate sh) >/dev/null 2>&1; then emulate sh NULLCMD=: # Zsh 3.x and 4.x performs word splitting on \${1+\"\$@\"}, which # is contrary to our usage. Disable this feature. alias -g '\${1+\"\$@\"}'='\"\$@\"' setopt NO_GLOB_SUBST else case \`(set -o) 2>/dev/null\` in *posix*) set -o posix;; esac fi BIN_SH=xpg4; export BIN_SH # for Tru64 DUALCASE=1; export DUALCASE # for MKS sh # The HP-UX ksh and POSIX shell print the target directory to stdout # if CDPATH is set. (unset CDPATH) >/dev/null 2>&1 && unset CDPATH relink_command=\"$relink_command\" # This environment variable determines our operation mode. if test \"\$libtool_install_magic\" = \"$magic\"; then # install mode needs the following variables: generated_by_libtool_version='$macro_version' notinst_deplibs='$notinst_deplibs' else # When we are sourced in execute mode, \$file and \$ECHO are already set. if test \"\$libtool_execute_magic\" != \"$magic\"; then ECHO=\"$qecho\" file=\"\$0\" # Make sure echo works. if test \"X\$1\" = X--no-reexec; then # Discard the --no-reexec flag, and continue. shift elif test \"X\`{ \$ECHO '\t'; } 2>/dev/null\`\" = 'X\t'; then # Yippee, \$ECHO works! : else # Restart under the correct shell, and then maybe \$ECHO will work. exec $SHELL \"\$0\" --no-reexec \${1+\"\$@\"} fi fi\ " $ECHO "\ # Find the directory that this script lives in. thisdir=\`\$ECHO \"X\$file\" | \$Xsed -e 's%/[^/]*$%%'\` test \"x\$thisdir\" = \"x\$file\" && thisdir=. # Follow symbolic links until we get to the real thisdir. file=\`ls -ld \"\$file\" | ${SED} -n 's/.*-> //p'\` while test -n \"\$file\"; do destdir=\`\$ECHO \"X\$file\" | \$Xsed -e 's%/[^/]*\$%%'\` # If there was a directory component, then change thisdir. if test \"x\$destdir\" != \"x\$file\"; then case \"\$destdir\" in [\\\\/]* | [A-Za-z]:[\\\\/]*) thisdir=\"\$destdir\" ;; *) thisdir=\"\$thisdir/\$destdir\" ;; esac fi file=\`\$ECHO \"X\$file\" | \$Xsed -e 's%^.*/%%'\` file=\`ls -ld \"\$thisdir/\$file\" | ${SED} -n 's/.*-> //p'\` done " } # end: func_emit_wrapper_part1 # func_emit_wrapper_part2 [arg=no] # # Emit the second part of a libtool wrapper script on stdout. # For more information, see the description associated with # func_emit_wrapper(), below. func_emit_wrapper_part2 () { func_emit_wrapper_part2_arg1=no if test -n "$1" ; then func_emit_wrapper_part2_arg1=$1 fi $ECHO "\ # Usually 'no', except on cygwin/mingw when embedded into # the cwrapper. WRAPPER_SCRIPT_BELONGS_IN_OBJDIR=$func_emit_wrapper_part2_arg1 if test \"\$WRAPPER_SCRIPT_BELONGS_IN_OBJDIR\" = \"yes\"; then # special case for '.' if test \"\$thisdir\" = \".\"; then thisdir=\`pwd\` fi # remove .libs from thisdir case \"\$thisdir\" in *[\\\\/]$objdir ) thisdir=\`\$ECHO \"X\$thisdir\" | \$Xsed -e 's%[\\\\/][^\\\\/]*$%%'\` ;; $objdir ) thisdir=. ;; esac fi # Try to get the absolute directory name. absdir=\`cd \"\$thisdir\" && pwd\` test -n \"\$absdir\" && thisdir=\"\$absdir\" " if test "$fast_install" = yes; then $ECHO "\ program=lt-'$outputname'$exeext progdir=\"\$thisdir/$objdir\" if test ! -f \"\$progdir/\$program\" || { file=\`ls -1dt \"\$progdir/\$program\" \"\$progdir/../\$program\" 2>/dev/null | ${SED} 1q\`; \\ test \"X\$file\" != \"X\$progdir/\$program\"; }; then file=\"\$\$-\$program\" if test ! -d \"\$progdir\"; then $MKDIR \"\$progdir\" else $RM \"\$progdir/\$file\" fi" $ECHO "\ # relink executable if necessary if test -n \"\$relink_command\"; then if relink_command_output=\`eval \$relink_command 2>&1\`; then : else $ECHO \"\$relink_command_output\" >&2 $RM \"\$progdir/\$file\" exit 1 fi fi $MV \"\$progdir/\$file\" \"\$progdir/\$program\" 2>/dev/null || { $RM \"\$progdir/\$program\"; $MV \"\$progdir/\$file\" \"\$progdir/\$program\"; } $RM \"\$progdir/\$file\" fi" else $ECHO "\ program='$outputname' progdir=\"\$thisdir/$objdir\" " fi $ECHO "\ if test -f \"\$progdir/\$program\"; then" # Export our shlibpath_var if we have one. if test "$shlibpath_overrides_runpath" = yes && test -n "$shlibpath_var" && test -n "$temp_rpath"; then $ECHO "\ # Add our own library path to $shlibpath_var $shlibpath_var=\"$temp_rpath\$$shlibpath_var\" # Some systems cannot cope with colon-terminated $shlibpath_var # The second colon is a workaround for a bug in BeOS R4 sed $shlibpath_var=\`\$ECHO \"X\$$shlibpath_var\" | \$Xsed -e 's/::*\$//'\` export $shlibpath_var " fi # fixup the dll searchpath if we need to. if test -n "$dllsearchpath"; then $ECHO "\ # Add the dll search path components to the executable PATH PATH=$dllsearchpath:\$PATH " fi $ECHO "\ if test \"\$libtool_execute_magic\" != \"$magic\"; then # Run the actual program with our arguments. " case $host in # Backslashes separate directories on plain windows *-*-mingw | *-*-os2* | *-cegcc*) $ECHO "\ exec \"\$progdir\\\\\$program\" \${1+\"\$@\"} " ;; *) $ECHO "\ exec \"\$progdir/\$program\" \${1+\"\$@\"} " ;; esac $ECHO "\ \$ECHO \"\$0: cannot exec \$program \$*\" 1>&2 exit 1 fi else # The program doesn't exist. \$ECHO \"\$0: error: \\\`\$progdir/\$program' does not exist\" 1>&2 \$ECHO \"This script is just a wrapper for \$program.\" 1>&2 $ECHO \"See the $PACKAGE documentation for more information.\" 1>&2 exit 1 fi fi\ " } # end: func_emit_wrapper_part2 # func_emit_wrapper [arg=no] # # Emit a libtool wrapper script on stdout. # Don't directly open a file because we may want to # incorporate the script contents within a cygwin/mingw # wrapper executable. Must ONLY be called from within # func_mode_link because it depends on a number of variables # set therein. # # ARG is the value that the WRAPPER_SCRIPT_BELONGS_IN_OBJDIR # variable will take. If 'yes', then the emitted script # will assume that the directory in which it is stored is # the $objdir directory. This is a cygwin/mingw-specific # behavior. func_emit_wrapper () { func_emit_wrapper_arg1=no if test -n "$1" ; then func_emit_wrapper_arg1=$1 fi # split this up so that func_emit_cwrapperexe_src # can call each part independently. func_emit_wrapper_part1 "${func_emit_wrapper_arg1}" func_emit_wrapper_part2 "${func_emit_wrapper_arg1}" } # func_to_host_path arg # # Convert paths to host format when used with build tools. # Intended for use with "native" mingw (where libtool itself # is running under the msys shell), or in the following cross- # build environments: # $build $host # mingw (msys) mingw [e.g. native] # cygwin mingw # *nix + wine mingw # where wine is equipped with the `winepath' executable. # In the native mingw case, the (msys) shell automatically # converts paths for any non-msys applications it launches, # but that facility isn't available from inside the cwrapper. # Similar accommodations are necessary for $host mingw and # $build cygwin. Calling this function does no harm for other # $host/$build combinations not listed above. # # ARG is the path (on $build) that should be converted to # the proper representation for $host. The result is stored # in $func_to_host_path_result. func_to_host_path () { func_to_host_path_result="$1" if test -n "$1" ; then case $host in *mingw* ) lt_sed_naive_backslashify='s|\\\\*|\\|g;s|/|\\|g;s|\\|\\\\|g' case $build in *mingw* ) # actually, msys # awkward: cmd appends spaces to result lt_sed_strip_trailing_spaces="s/[ ]*\$//" func_to_host_path_tmp1=`( cmd //c echo "$1" |\ $SED -e "$lt_sed_strip_trailing_spaces" ) 2>/dev/null || echo ""` func_to_host_path_result=`echo "$func_to_host_path_tmp1" |\ $SED -e "$lt_sed_naive_backslashify"` ;; *cygwin* ) func_to_host_path_tmp1=`cygpath -w "$1"` func_to_host_path_result=`echo "$func_to_host_path_tmp1" |\ $SED -e "$lt_sed_naive_backslashify"` ;; * ) # Unfortunately, winepath does not exit with a non-zero # error code, so we are forced to check the contents of # stdout. On the other hand, if the command is not # found, the shell will set an exit code of 127 and print # *an error message* to stdout. So we must check for both # error code of zero AND non-empty stdout, which explains # the odd construction: func_to_host_path_tmp1=`winepath -w "$1" 2>/dev/null` if test "$?" -eq 0 && test -n "${func_to_host_path_tmp1}"; then func_to_host_path_result=`echo "$func_to_host_path_tmp1" |\ $SED -e "$lt_sed_naive_backslashify"` else # Allow warning below. func_to_host_path_result="" fi ;; esac if test -z "$func_to_host_path_result" ; then func_error "Could not determine host path corresponding to" func_error " '$1'" func_error "Continuing, but uninstalled executables may not work." # Fallback: func_to_host_path_result="$1" fi ;; esac fi } # end: func_to_host_path # func_to_host_pathlist arg # # Convert pathlists to host format when used with build tools. # See func_to_host_path(), above. This function supports the # following $build/$host combinations (but does no harm for # combinations not listed here): # $build $host # mingw (msys) mingw [e.g. native] # cygwin mingw # *nix + wine mingw # # Path separators are also converted from $build format to # $host format. If ARG begins or ends with a path separator # character, it is preserved (but converted to $host format) # on output. # # ARG is a pathlist (on $build) that should be converted to # the proper representation on $host. The result is stored # in $func_to_host_pathlist_result. func_to_host_pathlist () { func_to_host_pathlist_result="$1" if test -n "$1" ; then case $host in *mingw* ) lt_sed_naive_backslashify='s|\\\\*|\\|g;s|/|\\|g;s|\\|\\\\|g' # Remove leading and trailing path separator characters from # ARG. msys behavior is inconsistent here, cygpath turns them # into '.;' and ';.', and winepath ignores them completely. func_to_host_pathlist_tmp2="$1" # Once set for this call, this variable should not be # reassigned. It is used in tha fallback case. func_to_host_pathlist_tmp1=`echo "$func_to_host_pathlist_tmp2" |\ $SED -e 's|^:*||' -e 's|:*$||'` case $build in *mingw* ) # Actually, msys. # Awkward: cmd appends spaces to result. lt_sed_strip_trailing_spaces="s/[ ]*\$//" func_to_host_pathlist_tmp2=`( cmd //c echo "$func_to_host_pathlist_tmp1" |\ $SED -e "$lt_sed_strip_trailing_spaces" ) 2>/dev/null || echo ""` func_to_host_pathlist_result=`echo "$func_to_host_pathlist_tmp2" |\ $SED -e "$lt_sed_naive_backslashify"` ;; *cygwin* ) func_to_host_pathlist_tmp2=`cygpath -w -p "$func_to_host_pathlist_tmp1"` func_to_host_pathlist_result=`echo "$func_to_host_pathlist_tmp2" |\ $SED -e "$lt_sed_naive_backslashify"` ;; * ) # unfortunately, winepath doesn't convert pathlists func_to_host_pathlist_result="" func_to_host_pathlist_oldIFS=$IFS IFS=: for func_to_host_pathlist_f in $func_to_host_pathlist_tmp1 ; do IFS=$func_to_host_pathlist_oldIFS if test -n "$func_to_host_pathlist_f" ; then func_to_host_path "$func_to_host_pathlist_f" if test -n "$func_to_host_path_result" ; then if test -z "$func_to_host_pathlist_result" ; then func_to_host_pathlist_result="$func_to_host_path_result" else func_to_host_pathlist_result="$func_to_host_pathlist_result;$func_to_host_path_result" fi fi fi IFS=: done IFS=$func_to_host_pathlist_oldIFS ;; esac if test -z "$func_to_host_pathlist_result" ; then func_error "Could not determine the host path(s) corresponding to" func_error " '$1'" func_error "Continuing, but uninstalled executables may not work." # Fallback. This may break if $1 contains DOS-style drive # specifications. The fix is not to complicate the expression # below, but for the user to provide a working wine installation # with winepath so that path translation in the cross-to-mingw # case works properly. lt_replace_pathsep_nix_to_dos="s|:|;|g" func_to_host_pathlist_result=`echo "$func_to_host_pathlist_tmp1" |\ $SED -e "$lt_replace_pathsep_nix_to_dos"` fi # Now, add the leading and trailing path separators back case "$1" in :* ) func_to_host_pathlist_result=";$func_to_host_pathlist_result" ;; esac case "$1" in *: ) func_to_host_pathlist_result="$func_to_host_pathlist_result;" ;; esac ;; esac fi } # end: func_to_host_pathlist # func_emit_cwrapperexe_src # emit the source code for a wrapper executable on stdout # Must ONLY be called from within func_mode_link because # it depends on a number of variable set therein. func_emit_cwrapperexe_src () { cat <<EOF /* $cwrappersource - temporary wrapper executable for $objdir/$outputname Generated by $PROGRAM (GNU $PACKAGE$TIMESTAMP) $VERSION The $output program cannot be directly executed until all the libtool libraries that it depends on are installed. This wrapper executable should never be moved out of the build directory. If it is, it will not operate correctly. Currently, it simply execs the wrapper *script* "$SHELL $output", but could eventually absorb all of the scripts functionality and exec $objdir/$outputname directly. */ EOF cat <<"EOF" #include <stdio.h> #include <stdlib.h> #ifdef _MSC_VER # include <direct.h> # include <process.h> # include <io.h> # define setmode _setmode #else # include <unistd.h> # include <stdint.h> # ifdef __CYGWIN__ # include <io.h> # define HAVE_SETENV # ifdef __STRICT_ANSI__ char *realpath (const char *, char *); int putenv (char *); int setenv (const char *, const char *, int); # endif # endif #endif #include <malloc.h> #include <stdarg.h> #include <assert.h> #include <string.h> #include <ctype.h> #include <errno.h> #include <fcntl.h> #include <sys/stat.h> #if defined(PATH_MAX) # define LT_PATHMAX PATH_MAX #elif defined(MAXPATHLEN) # define LT_PATHMAX MAXPATHLEN #else # define LT_PATHMAX 1024 #endif #ifndef S_IXOTH # define S_IXOTH 0 #endif #ifndef S_IXGRP # define S_IXGRP 0 #endif #ifdef _MSC_VER # define S_IXUSR _S_IEXEC # define stat _stat # ifndef _INTPTR_T_DEFINED # define intptr_t int # endif #endif #ifndef DIR_SEPARATOR # define DIR_SEPARATOR '/' # define PATH_SEPARATOR ':' #endif #if defined (_WIN32) || defined (__MSDOS__) || defined (__DJGPP__) || \ defined (__OS2__) # define HAVE_DOS_BASED_FILE_SYSTEM # define FOPEN_WB "wb" # ifndef DIR_SEPARATOR_2 # define DIR_SEPARATOR_2 '\\' # endif # ifndef PATH_SEPARATOR_2 # define PATH_SEPARATOR_2 ';' # endif #endif #ifndef DIR_SEPARATOR_2 # define IS_DIR_SEPARATOR(ch) ((ch) == DIR_SEPARATOR) #else /* DIR_SEPARATOR_2 */ # define IS_DIR_SEPARATOR(ch) \ (((ch) == DIR_SEPARATOR) || ((ch) == DIR_SEPARATOR_2)) #endif /* DIR_SEPARATOR_2 */ #ifndef PATH_SEPARATOR_2 # define IS_PATH_SEPARATOR(ch) ((ch) == PATH_SEPARATOR) #else /* PATH_SEPARATOR_2 */ # define IS_PATH_SEPARATOR(ch) ((ch) == PATH_SEPARATOR_2) #endif /* PATH_SEPARATOR_2 */ #ifdef __CYGWIN__ # define FOPEN_WB "wb" #endif #ifndef FOPEN_WB # define FOPEN_WB "w" #endif #ifndef _O_BINARY # define _O_BINARY 0 #endif #define XMALLOC(type, num) ((type *) xmalloc ((num) * sizeof(type))) #define XFREE(stale) do { \ if (stale) { free ((void *) stale); stale = 0; } \ } while (0) #undef LTWRAPPER_DEBUGPRINTF #if defined DEBUGWRAPPER # define LTWRAPPER_DEBUGPRINTF(args) ltwrapper_debugprintf args static void ltwrapper_debugprintf (const char *fmt, ...) { va_list args; va_start (args, fmt); (void) vfprintf (stderr, fmt, args); va_end (args); } #else # define LTWRAPPER_DEBUGPRINTF(args) #endif const char *program_name = NULL; void *xmalloc (size_t num); char *xstrdup (const char *string); const char *base_name (const char *name); char *find_executable (const char *wrapper); char *chase_symlinks (const char *pathspec); int make_executable (const char *path); int check_executable (const char *path); char *strendzap (char *str, const char *pat); void lt_fatal (const char *message, ...); void lt_setenv (const char *name, const char *value); char *lt_extend_str (const char *orig_value, const char *add, int to_end); void lt_opt_process_env_set (const char *arg); void lt_opt_process_env_prepend (const char *arg); void lt_opt_process_env_append (const char *arg); int lt_split_name_value (const char *arg, char** name, char** value); void lt_update_exe_path (const char *name, const char *value); void lt_update_lib_path (const char *name, const char *value); static const char *script_text_part1 = EOF func_emit_wrapper_part1 yes | $SED -e 's/\([\\"]\)/\\\1/g' \ -e 's/^/ "/' -e 's/$/\\n"/' echo ";" cat <<EOF static const char *script_text_part2 = EOF func_emit_wrapper_part2 yes | $SED -e 's/\([\\"]\)/\\\1/g' \ -e 's/^/ "/' -e 's/$/\\n"/' echo ";" cat <<EOF const char * MAGIC_EXE = "$magic_exe"; const char * LIB_PATH_VARNAME = "$shlibpath_var"; EOF if test "$shlibpath_overrides_runpath" = yes && test -n "$shlibpath_var" && test -n "$temp_rpath"; then func_to_host_pathlist "$temp_rpath" cat <<EOF const char * LIB_PATH_VALUE = "$func_to_host_pathlist_result"; EOF else cat <<"EOF" const char * LIB_PATH_VALUE = ""; EOF fi if test -n "$dllsearchpath"; then func_to_host_pathlist "$dllsearchpath:" cat <<EOF const char * EXE_PATH_VARNAME = "PATH"; const char * EXE_PATH_VALUE = "$func_to_host_pathlist_result"; EOF else cat <<"EOF" const char * EXE_PATH_VARNAME = ""; const char * EXE_PATH_VALUE = ""; EOF fi if test "$fast_install" = yes; then cat <<EOF const char * TARGET_PROGRAM_NAME = "lt-$outputname"; /* hopefully, no .exe */ EOF else cat <<EOF const char * TARGET_PROGRAM_NAME = "$outputname"; /* hopefully, no .exe */ EOF fi cat <<"EOF" #define LTWRAPPER_OPTION_PREFIX "--lt-" #define LTWRAPPER_OPTION_PREFIX_LENGTH 5 static const size_t opt_prefix_len = LTWRAPPER_OPTION_PREFIX_LENGTH; static const char *ltwrapper_option_prefix = LTWRAPPER_OPTION_PREFIX; static const char *dumpscript_opt = LTWRAPPER_OPTION_PREFIX "dump-script"; static const size_t env_set_opt_len = LTWRAPPER_OPTION_PREFIX_LENGTH + 7; static const char *env_set_opt = LTWRAPPER_OPTION_PREFIX "env-set"; /* argument is putenv-style "foo=bar", value of foo is set to bar */ static const size_t env_prepend_opt_len = LTWRAPPER_OPTION_PREFIX_LENGTH + 11; static const char *env_prepend_opt = LTWRAPPER_OPTION_PREFIX "env-prepend"; /* argument is putenv-style "foo=bar", new value of foo is bar${foo} */ static const size_t env_append_opt_len = LTWRAPPER_OPTION_PREFIX_LENGTH + 10; static const char *env_append_opt = LTWRAPPER_OPTION_PREFIX "env-append"; /* argument is putenv-style "foo=bar", new value of foo is ${foo}bar */ int main (int argc, char *argv[]) { char **newargz; int newargc; char *tmp_pathspec; char *actual_cwrapper_path; char *actual_cwrapper_name; char *target_name; char *lt_argv_zero; intptr_t rval = 127; int i; program_name = (char *) xstrdup (base_name (argv[0])); LTWRAPPER_DEBUGPRINTF (("(main) argv[0] : %s\n", argv[0])); LTWRAPPER_DEBUGPRINTF (("(main) program_name : %s\n", program_name)); /* very simple arg parsing; don't want to rely on getopt */ for (i = 1; i < argc; i++) { if (strcmp (argv[i], dumpscript_opt) == 0) { EOF case "$host" in *mingw* | *cygwin* ) # make stdout use "unix" line endings echo " setmode(1,_O_BINARY);" ;; esac cat <<"EOF" printf ("%s", script_text_part1); printf ("%s", script_text_part2); return 0; } } newargz = XMALLOC (char *, argc + 1); tmp_pathspec = find_executable (argv[0]); if (tmp_pathspec == NULL) lt_fatal ("Couldn't find %s", argv[0]); LTWRAPPER_DEBUGPRINTF (("(main) found exe (before symlink chase) at : %s\n", tmp_pathspec)); actual_cwrapper_path = chase_symlinks (tmp_pathspec); LTWRAPPER_DEBUGPRINTF (("(main) found exe (after symlink chase) at : %s\n", actual_cwrapper_path)); XFREE (tmp_pathspec); actual_cwrapper_name = xstrdup( base_name (actual_cwrapper_path)); strendzap (actual_cwrapper_path, actual_cwrapper_name); /* wrapper name transforms */ strendzap (actual_cwrapper_name, ".exe"); tmp_pathspec = lt_extend_str (actual_cwrapper_name, ".exe", 1); XFREE (actual_cwrapper_name); actual_cwrapper_name = tmp_pathspec; tmp_pathspec = 0; /* target_name transforms -- use actual target program name; might have lt- prefix */ target_name = xstrdup (base_name (TARGET_PROGRAM_NAME)); strendzap (target_name, ".exe"); tmp_pathspec = lt_extend_str (target_name, ".exe", 1); XFREE (target_name); target_name = tmp_pathspec; tmp_pathspec = 0; LTWRAPPER_DEBUGPRINTF (("(main) libtool target name: %s\n", target_name)); EOF cat <<EOF newargz[0] = XMALLOC (char, (strlen (actual_cwrapper_path) + strlen ("$objdir") + 1 + strlen (actual_cwrapper_name) + 1)); strcpy (newargz[0], actual_cwrapper_path); strcat (newargz[0], "$objdir"); strcat (newargz[0], "/"); EOF cat <<"EOF" /* stop here, and copy so we don't have to do this twice */ tmp_pathspec = xstrdup (newargz[0]); /* do NOT want the lt- prefix here, so use actual_cwrapper_name */ strcat (newargz[0], actual_cwrapper_name); /* DO want the lt- prefix here if it exists, so use target_name */ lt_argv_zero = lt_extend_str (tmp_pathspec, target_name, 1); XFREE (tmp_pathspec); tmp_pathspec = NULL; EOF case $host_os in mingw*) cat <<"EOF" { char* p; while ((p = strchr (newargz[0], '\\')) != NULL) { *p = '/'; } while ((p = strchr (lt_argv_zero, '\\')) != NULL) { *p = '/'; } } EOF ;; esac cat <<"EOF" XFREE (target_name); XFREE (actual_cwrapper_path); XFREE (actual_cwrapper_name); lt_setenv ("BIN_SH", "xpg4"); /* for Tru64 */ lt_setenv ("DUALCASE", "1"); /* for MSK sh */ lt_update_lib_path (LIB_PATH_VARNAME, LIB_PATH_VALUE); lt_update_exe_path (EXE_PATH_VARNAME, EXE_PATH_VALUE); newargc=0; for (i = 1; i < argc; i++) { if (strncmp (argv[i], env_set_opt, env_set_opt_len) == 0) { if (argv[i][env_set_opt_len] == '=') { const char *p = argv[i] + env_set_opt_len + 1; lt_opt_process_env_set (p); } else if (argv[i][env_set_opt_len] == '\0' && i + 1 < argc) { lt_opt_process_env_set (argv[++i]); /* don't copy */ } else lt_fatal ("%s missing required argument", env_set_opt); continue; } if (strncmp (argv[i], env_prepend_opt, env_prepend_opt_len) == 0) { if (argv[i][env_prepend_opt_len] == '=') { const char *p = argv[i] + env_prepend_opt_len + 1; lt_opt_process_env_prepend (p); } else if (argv[i][env_prepend_opt_len] == '\0' && i + 1 < argc) { lt_opt_process_env_prepend (argv[++i]); /* don't copy */ } else lt_fatal ("%s missing required argument", env_prepend_opt); continue; } if (strncmp (argv[i], env_append_opt, env_append_opt_len) == 0) { if (argv[i][env_append_opt_len] == '=') { const char *p = argv[i] + env_append_opt_len + 1; lt_opt_process_env_append (p); } else if (argv[i][env_append_opt_len] == '\0' && i + 1 < argc) { lt_opt_process_env_append (argv[++i]); /* don't copy */ } else lt_fatal ("%s missing required argument", env_append_opt); continue; } if (strncmp (argv[i], ltwrapper_option_prefix, opt_prefix_len) == 0) { /* however, if there is an option in the LTWRAPPER_OPTION_PREFIX namespace, but it is not one of the ones we know about and have already dealt with, above (inluding dump-script), then report an error. Otherwise, targets might begin to believe they are allowed to use options in the LTWRAPPER_OPTION_PREFIX namespace. The first time any user complains about this, we'll need to make LTWRAPPER_OPTION_PREFIX a configure-time option or a configure.ac-settable value. */ lt_fatal ("Unrecognized option in %s namespace: '%s'", ltwrapper_option_prefix, argv[i]); } /* otherwise ... */ newargz[++newargc] = xstrdup (argv[i]); } newargz[++newargc] = NULL; LTWRAPPER_DEBUGPRINTF (("(main) lt_argv_zero : %s\n", (lt_argv_zero ? lt_argv_zero : "<NULL>"))); for (i = 0; i < newargc; i++) { LTWRAPPER_DEBUGPRINTF (("(main) newargz[%d] : %s\n", i, (newargz[i] ? newargz[i] : "<NULL>"))); } EOF case $host_os in mingw*) cat <<"EOF" /* execv doesn't actually work on mingw as expected on unix */ rval = _spawnv (_P_WAIT, lt_argv_zero, (const char * const *) newargz); if (rval == -1) { /* failed to start process */ LTWRAPPER_DEBUGPRINTF (("(main) failed to launch target \"%s\": errno = %d\n", lt_argv_zero, errno)); return 127; } return rval; EOF ;; *) cat <<"EOF" execv (lt_argv_zero, newargz); return rval; /* =127, but avoids unused variable warning */ EOF ;; esac cat <<"EOF" } void * xmalloc (size_t num) { void *p = (void *) malloc (num); if (!p) lt_fatal ("Memory exhausted"); return p; } char * xstrdup (const char *string) { return string ? strcpy ((char *) xmalloc (strlen (string) + 1), string) : NULL; } const char * base_name (const char *name) { const char *base; #if defined (HAVE_DOS_BASED_FILE_SYSTEM) /* Skip over the disk name in MSDOS pathnames. */ if (isalpha ((unsigned char) name[0]) && name[1] == ':') name += 2; #endif for (base = name; *name; name++) if (IS_DIR_SEPARATOR (*name)) base = name + 1; return base; } int check_executable (const char *path) { struct stat st; LTWRAPPER_DEBUGPRINTF (("(check_executable) : %s\n", path ? (*path ? path : "EMPTY!") : "NULL!")); if ((!path) || (!*path)) return 0; if ((stat (path, &st) >= 0) && (st.st_mode & (S_IXUSR | S_IXGRP | S_IXOTH))) return 1; else return 0; } int make_executable (const char *path) { int rval = 0; struct stat st; LTWRAPPER_DEBUGPRINTF (("(make_executable) : %s\n", path ? (*path ? path : "EMPTY!") : "NULL!")); if ((!path) || (!*path)) return 0; if (stat (path, &st) >= 0) { rval = chmod (path, st.st_mode | S_IXOTH | S_IXGRP | S_IXUSR); } return rval; } /* Searches for the full path of the wrapper. Returns newly allocated full path name if found, NULL otherwise Does not chase symlinks, even on platforms that support them. */ char * find_executable (const char *wrapper) { int has_slash = 0; const char *p; const char *p_next; /* static buffer for getcwd */ char tmp[LT_PATHMAX + 1]; int tmp_len; char *concat_name; LTWRAPPER_DEBUGPRINTF (("(find_executable) : %s\n", wrapper ? (*wrapper ? wrapper : "EMPTY!") : "NULL!")); if ((wrapper == NULL) || (*wrapper == '\0')) return NULL; /* Absolute path? */ #if defined (HAVE_DOS_BASED_FILE_SYSTEM) if (isalpha ((unsigned char) wrapper[0]) && wrapper[1] == ':') { concat_name = xstrdup (wrapper); if (check_executable (concat_name)) return concat_name; XFREE (concat_name); } else { #endif if (IS_DIR_SEPARATOR (wrapper[0])) { concat_name = xstrdup (wrapper); if (check_executable (concat_name)) return concat_name; XFREE (concat_name); } #if defined (HAVE_DOS_BASED_FILE_SYSTEM) } #endif for (p = wrapper; *p; p++) if (*p == '/') { has_slash = 1; break; } if (!has_slash) { /* no slashes; search PATH */ const char *path = getenv ("PATH"); if (path != NULL) { for (p = path; *p; p = p_next) { const char *q; size_t p_len; for (q = p; *q; q++) if (IS_PATH_SEPARATOR (*q)) break; p_len = q - p; p_next = (*q == '\0' ? q : q + 1); if (p_len == 0) { /* empty path: current directory */ if (getcwd (tmp, LT_PATHMAX) == NULL) lt_fatal ("getcwd failed"); tmp_len = strlen (tmp); concat_name = XMALLOC (char, tmp_len + 1 + strlen (wrapper) + 1); memcpy (concat_name, tmp, tmp_len); concat_name[tmp_len] = '/'; strcpy (concat_name + tmp_len + 1, wrapper); } else { concat_name = XMALLOC (char, p_len + 1 + strlen (wrapper) + 1); memcpy (concat_name, p, p_len); concat_name[p_len] = '/'; strcpy (concat_name + p_len + 1, wrapper); } if (check_executable (concat_name)) return concat_name; XFREE (concat_name); } } /* not found in PATH; assume curdir */ } /* Relative path | not found in path: prepend cwd */ if (getcwd (tmp, LT_PATHMAX) == NULL) lt_fatal ("getcwd failed"); tmp_len = strlen (tmp); concat_name = XMALLOC (char, tmp_len + 1 + strlen (wrapper) + 1); memcpy (concat_name, tmp, tmp_len); concat_name[tmp_len] = '/'; strcpy (concat_name + tmp_len + 1, wrapper); if (check_executable (concat_name)) return concat_name; XFREE (concat_name); return NULL; } char * chase_symlinks (const char *pathspec) { #ifndef S_ISLNK return xstrdup (pathspec); #else char buf[LT_PATHMAX]; struct stat s; char *tmp_pathspec = xstrdup (pathspec); char *p; int has_symlinks = 0; while (strlen (tmp_pathspec) && !has_symlinks) { LTWRAPPER_DEBUGPRINTF (("checking path component for symlinks: %s\n", tmp_pathspec)); if (lstat (tmp_pathspec, &s) == 0) { if (S_ISLNK (s.st_mode) != 0) { has_symlinks = 1; break; } /* search backwards for last DIR_SEPARATOR */ p = tmp_pathspec + strlen (tmp_pathspec) - 1; while ((p > tmp_pathspec) && (!IS_DIR_SEPARATOR (*p))) p--; if ((p == tmp_pathspec) && (!IS_DIR_SEPARATOR (*p))) { /* no more DIR_SEPARATORS left */ break; } *p = '\0'; } else { char *errstr = strerror (errno); lt_fatal ("Error accessing file %s (%s)", tmp_pathspec, errstr); } } XFREE (tmp_pathspec); if (!has_symlinks) { return xstrdup (pathspec); } tmp_pathspec = realpath (pathspec, buf); if (tmp_pathspec == 0) { lt_fatal ("Could not follow symlinks for %s", pathspec); } return xstrdup (tmp_pathspec); #endif } char * strendzap (char *str, const char *pat) { size_t len, patlen; assert (str != NULL); assert (pat != NULL); len = strlen (str); patlen = strlen (pat); if (patlen <= len) { str += len - patlen; if (strcmp (str, pat) == 0) *str = '\0'; } return str; } static void lt_error_core (int exit_status, const char *mode, const char *message, va_list ap) { fprintf (stderr, "%s: %s: ", program_name, mode); vfprintf (stderr, message, ap); fprintf (stderr, ".\n"); if (exit_status >= 0) exit (exit_status); } void lt_fatal (const char *message, ...) { va_list ap; va_start (ap, message); lt_error_core (EXIT_FAILURE, "FATAL", message, ap); va_end (ap); } void lt_setenv (const char *name, const char *value) { LTWRAPPER_DEBUGPRINTF (("(lt_setenv) setting '%s' to '%s'\n", (name ? name : "<NULL>"), (value ? value : "<NULL>"))); { #ifdef HAVE_SETENV /* always make a copy, for consistency with !HAVE_SETENV */ char *str = xstrdup (value); setenv (name, str, 1); #else int len = strlen (name) + 1 + strlen (value) + 1; char *str = XMALLOC (char, len); sprintf (str, "%s=%s", name, value); if (putenv (str) != EXIT_SUCCESS) { XFREE (str); } #endif } } char * lt_extend_str (const char *orig_value, const char *add, int to_end) { char *new_value; if (orig_value && *orig_value) { int orig_value_len = strlen (orig_value); int add_len = strlen (add); new_value = XMALLOC (char, add_len + orig_value_len + 1); if (to_end) { strcpy (new_value, orig_value); strcpy (new_value + orig_value_len, add); } else { strcpy (new_value, add); strcpy (new_value + add_len, orig_value); } } else { new_value = xstrdup (add); } return new_value; } int lt_split_name_value (const char *arg, char** name, char** value) { const char *p; int len; if (!arg || !*arg) return 1; p = strchr (arg, (int)'='); if (!p) return 1; *value = xstrdup (++p); len = strlen (arg) - strlen (*value); *name = XMALLOC (char, len); strncpy (*name, arg, len-1); (*name)[len - 1] = '\0'; return 0; } void lt_opt_process_env_set (const char *arg) { char *name = NULL; char *value = NULL; if (lt_split_name_value (arg, &name, &value) != 0) { XFREE (name); XFREE (value); lt_fatal ("bad argument for %s: '%s'", env_set_opt, arg); } lt_setenv (name, value); XFREE (name); XFREE (value); } void lt_opt_process_env_prepend (const char *arg) { char *name = NULL; char *value = NULL; char *new_value = NULL; if (lt_split_name_value (arg, &name, &value) != 0) { XFREE (name); XFREE (value); lt_fatal ("bad argument for %s: '%s'", env_prepend_opt, arg); } new_value = lt_extend_str (getenv (name), value, 0); lt_setenv (name, new_value); XFREE (new_value); XFREE (name); XFREE (value); } void lt_opt_process_env_append (const char *arg) { char *name = NULL; char *value = NULL; char *new_value = NULL; if (lt_split_name_value (arg, &name, &value) != 0) { XFREE (name); XFREE (value); lt_fatal ("bad argument for %s: '%s'", env_append_opt, arg); } new_value = lt_extend_str (getenv (name), value, 1); lt_setenv (name, new_value); XFREE (new_value); XFREE (name); XFREE (value); } void lt_update_exe_path (const char *name, const char *value) { LTWRAPPER_DEBUGPRINTF (("(lt_update_exe_path) modifying '%s' by prepending '%s'\n", (name ? name : "<NULL>"), (value ? value : "<NULL>"))); if (name && *name && value && *value) { char *new_value = lt_extend_str (getenv (name), value, 0); /* some systems can't cope with a ':'-terminated path #' */ int len = strlen (new_value); while (((len = strlen (new_value)) > 0) && IS_PATH_SEPARATOR (new_value[len-1])) { new_value[len-1] = '\0'; } lt_setenv (name, new_value); XFREE (new_value); } } void lt_update_lib_path (const char *name, const char *value) { LTWRAPPER_DEBUGPRINTF (("(lt_update_lib_path) modifying '%s' by prepending '%s'\n", (name ? name : "<NULL>"), (value ? value : "<NULL>"))); if (name && *name && value && *value) { char *new_value = lt_extend_str (getenv (name), value, 0); lt_setenv (name, new_value); XFREE (new_value); } } EOF } # end: func_emit_cwrapperexe_src # func_mode_link arg... func_mode_link () { $opt_debug case $host in *-*-cygwin* | *-*-mingw* | *-*-pw32* | *-*-os2* | *-cegcc*) # It is impossible to link a dll without this setting, and # we shouldn't force the makefile maintainer to figure out # which system we are compiling for in order to pass an extra # flag for every libtool invocation. # allow_undefined=no # FIXME: Unfortunately, there are problems with the above when trying # to make a dll which has undefined symbols, in which case not # even a static library is built. For now, we need to specify # -no-undefined on the libtool link line when we can be certain # that all symbols are satisfied, otherwise we get a static library. allow_undefined=yes ;; *) allow_undefined=yes ;; esac libtool_args=$nonopt base_compile="$nonopt $@" compile_command=$nonopt finalize_command=$nonopt compile_rpath= finalize_rpath= compile_shlibpath= finalize_shlibpath= convenience= old_convenience= deplibs= old_deplibs= compiler_flags= linker_flags= dllsearchpath= lib_search_path=`pwd` inst_prefix_dir= new_inherited_linker_flags= avoid_version=no dlfiles= dlprefiles= dlself=no export_dynamic=no export_symbols= export_symbols_regex= generated= libobjs= ltlibs= module=no no_install=no objs= non_pic_objects= precious_files_regex= prefer_static_libs=no preload=no prev= prevarg= release= rpath= xrpath= perm_rpath= temp_rpath= thread_safe=no vinfo= vinfo_number=no weak_libs= single_module="${wl}-single_module" func_infer_tag $base_compile # We need to know -static, to get the right output filenames. for arg do case $arg in -shared) test "$build_libtool_libs" != yes && \ func_fatal_configuration "can not build a shared library" build_old_libs=no break ;; -all-static | -static | -static-libtool-libs) case $arg in -all-static) if test "$build_libtool_libs" = yes && test -z "$link_static_flag"; then func_warning "complete static linking is impossible in this configuration" fi if test -n "$link_static_flag"; then dlopen_self=$dlopen_self_static fi prefer_static_libs=yes ;; -static) if test -z "$pic_flag" && test -n "$link_static_flag"; then dlopen_self=$dlopen_self_static fi prefer_static_libs=built ;; -static-libtool-libs) if test -z "$pic_flag" && test -n "$link_static_flag"; then dlopen_self=$dlopen_self_static fi prefer_static_libs=yes ;; esac build_libtool_libs=no build_old_libs=yes break ;; esac done # See if our shared archives depend on static archives. test -n "$old_archive_from_new_cmds" && build_old_libs=yes # Go through the arguments, transforming them on the way. while test "$#" -gt 0; do arg="$1" shift func_quote_for_eval "$arg" qarg=$func_quote_for_eval_unquoted_result func_append libtool_args " $func_quote_for_eval_result" # If the previous option needs an argument, assign it. if test -n "$prev"; then case $prev in output) func_append compile_command " @OUTPUT@" func_append finalize_command " @OUTPUT@" ;; esac case $prev in dlfiles|dlprefiles) if test "$preload" = no; then # Add the symbol object into the linking commands. func_append compile_command " @SYMFILE@" func_append finalize_command " @SYMFILE@" preload=yes fi case $arg in *.la | *.lo) ;; # We handle these cases below. force) if test "$dlself" = no; then dlself=needless export_dynamic=yes fi prev= continue ;; self) if test "$prev" = dlprefiles; then dlself=yes elif test "$prev" = dlfiles && test "$dlopen_self" != yes; then dlself=yes else dlself=needless export_dynamic=yes fi prev= continue ;; *) if test "$prev" = dlfiles; then dlfiles="$dlfiles $arg" else dlprefiles="$dlprefiles $arg" fi prev= continue ;; esac ;; expsyms) export_symbols="$arg" test -f "$arg" \ || func_fatal_error "symbol file \`$arg' does not exist" prev= continue ;; expsyms_regex) export_symbols_regex="$arg" prev= continue ;; framework) case $host in *-*-darwin*) case "$deplibs " in *" $qarg.ltframework "*) ;; *) deplibs="$deplibs $qarg.ltframework" # this is fixed later ;; esac ;; esac prev= continue ;; inst_prefix) inst_prefix_dir="$arg" prev= continue ;; objectlist) if test -f "$arg"; then save_arg=$arg moreargs= for fil in `cat "$save_arg"` do # moreargs="$moreargs $fil" arg=$fil # A libtool-controlled object. # Check to see that this really is a libtool object. if func_lalib_unsafe_p "$arg"; then pic_object= non_pic_object= # Read the .lo file func_source "$arg" if test -z "$pic_object" || test -z "$non_pic_object" || test "$pic_object" = none && test "$non_pic_object" = none; then func_fatal_error "cannot find name of object for \`$arg'" fi # Extract subdirectory from the argument. func_dirname "$arg" "/" "" xdir="$func_dirname_result" if test "$pic_object" != none; then # Prepend the subdirectory the object is found in. pic_object="$xdir$pic_object" if test "$prev" = dlfiles; then if test "$build_libtool_libs" = yes && test "$dlopen_support" = yes; then dlfiles="$dlfiles $pic_object" prev= continue else # If libtool objects are unsupported, then we need to preload. prev=dlprefiles fi fi # CHECK ME: I think I busted this. -Ossama if test "$prev" = dlprefiles; then # Preload the old-style object. dlprefiles="$dlprefiles $pic_object" prev= fi # A PIC object. func_append libobjs " $pic_object" arg="$pic_object" fi # Non-PIC object. if test "$non_pic_object" != none; then # Prepend the subdirectory the object is found in. non_pic_object="$xdir$non_pic_object" # A standard non-PIC object func_append non_pic_objects " $non_pic_object" if test -z "$pic_object" || test "$pic_object" = none ; then arg="$non_pic_object" fi else # If the PIC object exists, use it instead. # $xdir was prepended to $pic_object above. non_pic_object="$pic_object" func_append non_pic_objects " $non_pic_object" fi else # Only an error if not doing a dry-run. if $opt_dry_run; then # Extract subdirectory from the argument. func_dirname "$arg" "/" "" xdir="$func_dirname_result" func_lo2o "$arg" pic_object=$xdir$objdir/$func_lo2o_result non_pic_object=$xdir$func_lo2o_result func_append libobjs " $pic_object" func_append non_pic_objects " $non_pic_object" else func_fatal_error "\`$arg' is not a valid libtool object" fi fi done else func_fatal_error "link input file \`$arg' does not exist" fi arg=$save_arg prev= continue ;; precious_regex) precious_files_regex="$arg" prev= continue ;; release) release="-$arg"
{ "url": "https://android.googlesource.com/platform/external/open-vcdiff/+/refs/tags/android-4.4.2_r1.0.1/ltmain.sh", "source_domain": "android.googlesource.com", "snapshot_id": "CC-MAIN-2024-10", "warc_metadata": { "Content-Length": "1049349", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:OLZPDZAMJQIDTVFUK4UCESUYEUXUHYWV", "WARC-Concurrent-To": "<urn:uuid:9ef8f457-a25a-45ff-97bb-f50b7959aaf1>", "WARC-Date": "2024-03-01T08:54:40Z", "WARC-IP-Address": "172.253.63.82", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:PAFF7MUVP6NFOERNYXXB4CZ3UVUMWOZD", "WARC-Record-ID": "<urn:uuid:3e61bdd4-1e7b-4104-aaa6-4490a9d9e5f7>", "WARC-Target-URI": "https://android.googlesource.com/platform/external/open-vcdiff/+/refs/tags/android-4.4.2_r1.0.1/ltmain.sh", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2cbd7e8d-7580-4e6a-a05f-9689666ea55c>" }, "warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-69\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 68, 98, 131, 190, 307, 383, 461, 531, 602, 670, 708, 710, 770, 837, 903, 972, 974, 1043, 1104, 1171, 1214, 1216, 1284, 1347, 1410, 1474, 1537, 1582, 1584, 1641, 1643, 1687, 1726, 1787, 1849, 1887, 1953, 2008, 2061, 2116, 2154, 2200, 2202, 2239, 2241, 2287, 2341, 2402, 2458, 2501, 2542, 2599, 2601, 2641, 2719, 2721, 2793, 2830, 2832, 2854, 2870, 2888, 2916, 2950, 3007, 3037, 3067, 3069, 3109, 3127, 3143, 3183, 3196, 3220, 3243, 3313, 3324, 3334, 3396, 3446, 3474, 3495, 3500, 3560, 3563, 3602, 3643, 3715, 3763, 3838, 3867, 3883, 3899, 3966, 3969, 4015, 4038, 4048, 4063, 4126, 4173, 4177, 4182, 4199, 4215, 4232, 4258, 4284, 4306, 4324, 4341, 4360, 4376, 4392, 4412, 4449, 4477, 4497, 4512, 4527, 4603, 4674, 4700, 4739, 4747, 4749, 4763, 4785, 4805, 4864, 4926, 4934, 4987, 5036, 5061, 5104, 5142, 5185, 5246, 5305, 5369, 5398, 5400, 5442, 5500, 5548, 5575, 5580, 5627, 5630, 5690, 5692, 5735, 5808, 5880, 5949, 6019, 6031, 6045, 6073, 6150, 6216, 6254, 6285, 6303, 6331, 6336, 6390, 6408, 6432, 6441, 6470, 6501, 6531, 6534, 6537, 6553, 6559, 6584, 6600, 6638, 6643, 6659, 6695, 6725, 6728, 6733, 6803, 6872, 6899, 6938, 6993, 7034, 7106, 7176, 7249, 7320, 7383, 7391, 7402, 7417, 7429, 7453, 7464, 7467, 7488, 7534, 7543, 7563, 7581, 7596, 7612, 7630, 7644, 7663, 7729, 7760, 7773, 7775, 7812, 7814, 7836, 7895, 7911, 7913, 7949, 8013, 8076, 8096, 8098, 8100, 8120, 8176, 8190, 8192, 8241, 8243, 8265, 8329, 8345, 8347, 8421, 8439, 8441, 8443, 8469, 8535, 8555, 8557, 8578, 8597, 8599, 8624, 8692, 8717, 8736, 8738, 8759, 8784, 8786, 8850, 8882, 8955, 8968, 8970, 9002, 9004, 9034, 9094, 9110, 9112, 9135, 9148, 9216, 9260, 9287, 9335, 9340, 9390, 9431, 9494, 9550, 9596, 9661, 9713, 9768, 9838, 9843, 9900, 9933, 9964, 9988, 10048, 10107, 10128, 10162, 10167, 10191, 10262, 10296, 10338, 10341, 10343, 10369, 10434, 10498, 10550, 10568, 10570, 10614, 10649, 10712, 10742, 10747, 10794, 10854, 10886, 10947, 10988, 11017, 11028, 11048, 11076, 11079, 11131, 11157, 11224, 11227, 11255, 11257, 11283, 11329, 11392, 11452, 11516, 11578, 11601, 11603, 11614, 11628, 11711, 11714, 11758, 11763, 11808, 11869, 11925, 11960, 12020, 12065, 12114, 12184, 12187, 12190, 12256, 12261, 12263, 12291, 12352, 12392, 12417, 12419, 12430, 12442, 12472, 12528, 12531, 12546, 12551, 12567, 12628, 12693, 12753, 12798, 12847, 12868, 12871, 12876, 12915, 12917, 12949, 13018, 13089, 13119, 13137, 13139, 13151, 13172, 13197, 13229, 13276, 13278, 13316, 13331, 13344, 13385, 13424, 13427, 13430, 13432, 13471, 13540, 13611, 13678, 13703, 13705, 13717, 13738, 13763, 13795, 13842, 13844, 13882, 13904, 13913, 13926, 13949, 13990, 14029, 14032, 14035, 14037, 14052, 14104, 14120, 14122, 14170, 14178, 14188, 14229, 14231, 14248, 14256, 14258, 14271, 14326, 14340, 14342, 14372, 14380, 14390, 14416, 14418, 14435, 14441, 14495, 14503, 14505, 14517, 14571, 14584, 14586, 14628, 14636, 14646, 14672, 14692, 14714, 14734, 14762, 14778, 14812, 14882, 14952, 14954, 14971, 14979, 14981, 15008, 15078, 15090, 15110, 15112, 15149, 15163, 15165, 15176, 15214, 15249, 15295, 15301, 15342, 15392, 15394, 15451, 15474, 15476, 15481, 15548, 15594, 15597, 15636, 15660, 15666, 15676, 15679, 15683, 15702, 15705, 15734, 15771, 15791, 15808, 15816, 15833, 15848, 15877, 15906, 15926, 15945, 15963, 15988, 16005, 16017, 16084, 16153, 16176, 16186, 16220, 16288, 16330, 16358, 16360, 16381, 16447, 16493, 16495, 16509, 16570, 16585, 16587, 16621, 16651, 16676, 16744, 16789, 16817, 16914, 16919, 16927, 16929, 16945, 16994, 17011, 17013, 17033, 17075, 17107, 17112, 17145, 17148, 17186, 17218, 17223, 17256, 17259, 17267, 17269, 17295, 17365, 17434, 17451, 17470, 17472, 17491, 17504, 17561, 17614, 17657, 17677, 17694, 17714, 17760, 17763, 17768, 17822, 17856, 17873, 17880, 17883, 17940, 17968, 18027, 18087, 18149, 18187, 18243, 18263, 18268, 18311, 18314, 18317, 18322, 18324, 18392, 18461, 18463, 18524, 18535, 18554, 18601, 18604, 18640, 18689, 18692, 18728, 18777, 18780, 18808, 18856, 18859, 18895, 18944, 18947, 18962, 19008, 19011, 19066, 19117, 19120, 19125, 19162, 19188, 19197, 19203, 19216, 19241, 19286, 19324, 19343, 19354, 19357, 19418, 19456, 19462, 19465, 19498, 19527, 19554, 19614, 19625, 19649, 19659, 19671, 19683, 19694, 19706, 19715, 19726, 19740, 19774, 19816, 19830, 19836, 19839, 19844, 19854, 19860, 19863, 19884, 19908, 19962, 19975, 19978, 20029, 20046, 20049, 20108, 20147, 20190, 20196, 20199, 20235, 20263, 20285, 20349, 20355, 20358, 20380, 20402, 20429, 20482, 20499, 20505, 20508, 20513, 20518, 20532, 20571, 20628, 20668, 20671, 20674, 20732, 20735, 20740, 20801, 20823, 20847, 20849, 20876, 20947, 20969, 20997, 20999, 21054, 21099, 21133, 21151, 21221, 21288, 21365, 21400, 21408, 21413, 21431, 21501, 21575, 21652, 21687, 21695, 21698, 21703, 21721, 21811, 21894, 21980, 22036, 22044, 22047, 22067, 22070, 22072, 22090, 22102, 22120, 22135, 22158, 22183, 22259, 22330, 22333, 22403, 22418, 22451, 22505, 22568, 22612, 22631, 22650, 22653, 22703, 22724, 22790, 22792, 22812, 22877, 22948, 22972, 22988, 22990, 23006, 23036, 23090, 23092, 23119, 23184, 23250, 23320, 23389, 23457, 23505, 23528, 23530, 23541, 23598, 23623, 23626, 23644, 23668, 23721, 23726, 23731, 23746, 23749, 23771, 23773, 23804, 23848, 23919, 23943, 23970, 23972, 23990, 23992, 24027, 24075, 24146, 24170, 24201, 24203, 24231, 24242, 24252, 24290, 24295, 24362, 24364, 24397, 24439, 24496, 24526, 24555, 24557, 24593, 24635, 24673, 24722, 24823, 24826, 24828, 24852, 24918, 24989, 25013, 25033, 25035, 25100, 25102, 25140, 25176, 25224, 25288, 25309, 25311, 25322, 25345, 25363, 25377, 25395, 25426, 25431, 25445, 25447, 25466, 25522, 25589, 25656, 25725, 25775, 25790, 25792, 25803, 25814, 25836, 25851, 25856, 25858, 25879, 25940, 26000, 26056, 26102, 26141, 26159, 26161, 26172, 26229, 26240, 26259, 26286, 26337, 26342, 26353, 26422, 26489, 26634, 26697, 26735, 26738, 26767, 26847, 26877, 26994, 27005, 27024, 27083, 27110, 27161, 27166, 27180, 27322, 27373, 27412, 27463, 27474, 27480, 27483, 27488, 27491, 27496, 27556, 27615, 27643, 27671, 27720, 27767, 27774, 27827, 27830, 27833, 27838, 27841, 27843, 27904, 27964, 28012, 28041, 28043, 28061, 28103, 28123, 28128, 28144, 28147, 28185, 28207, 28212, 28230, 28233, 28251, 28279, 28319, 28377, 28379, 28413, 28456, 28482, 28505, 28534, 28563, 28567, 28608, 28610, 28612, 28639, 28660, 28662, 28673, 28724, 28738, 28801, 28818, 28835, 28851, 28859, 28866, 28876, 28884, 28887, 28905, 28911, 28966, 28981, 28997, 29000, 29009, 29023, 29039, 29048, 29051, 29060, 29095, 29108, 29112, 29135, 29194, 29210, 29219, 29222, 29244, 29270, 29279, 29282, 29333, 29353, 29362, 29365, 29379, 29395, 29404, 29407, 29419, 29485, 29545, 29601, 29608, 29640, 29668, 29677, 29702, 29723, 29739, 29766, 29813, 29818, 29834, 29867, 29898, 29935, 29973, 29982, 29985, 29988, 30038, 30093, 30095, 30114, 30129, 30132, 30149, 30152, 30174, 30219, 30250, 30307, 30322, 30340, 30345, 30407, 30410, 30418, 30474, 30477, 30480, 30518, 30541, 30566, 30597, 30599, 30602, 30607, 30652, 30715, 30731, 30749, 30783, 30833, 30878, 30899, 30925, 30928, 30933, 30949, 31001, 31004, 31079, 31082, 31087, 31116, 31138, 31151, 31160, 31199, 31257, 31275, 31284, 31287, 31296, 31318, 31337, 31346, 31349, 31362, 31375, 31384, 31387, 31404, 31416, 31425, 31428, 31433, 31438, 31468, 31520, 31580, 31663, 31703, 31735, 31763, 31792, 31821, 31878, 31917, 31955, 31998, 32003, 32041, 32044, 32118, 32135, 32177, 32194, 32197, 32202, 32277, 32329, 32346, 32349, 32412, 32437, 32472, 32553, 32581, 32586, 32598, 32612, 32622, 32625, 32670, 32744, 32778, 32843, 32891, 32899, 32904, 32941, 32970, 32979, 33021, 33049, 33111, 33179, 33243, 33314, 33380, 33391, 33423, 33442, 33445, 33482, 33513, 33516, 33548, 33583, 33649, 33686, 33721, 33724, 33755, 33792, 33856, 33898, 33952, 33986, 34018, 34062, 34067, 34090, 34124, 34127, 34155, 34186, 34217, 34245, 34248, 34283, 34346, 34378, 34435, 34444, 34475, 34503, 34526, 34535, 34597, 34665, 34729, 34800, 34866, 34877, 34909, 34928, 34931, 35000, 35066, 35111, 35168, 35171, 35227, 35263, 35298, 35301, 35304, 35372, 35410, 35443, 35466, 35509, 35514, 35558, 35561, 35597, 35624, 35627, 35691, 35726, 35761, 35815, 35847, 35904, 35913, 35944, 35972, 35995, 36004, 36066, 36134, 36198, 36269, 36335, 36346, 36378, 36397, 36400, 36433, 36498, 36542, 36599, 36602, 36605, 36623, 36689, 36736, 36770, 36791, 36807, 36810, 36812, 36831, 36833, 36848, 36902, 36904, 36922, 36924, 36973, 36987, 36991, 37043, 37072, 37082, 37085, 37092, 37100, 37169, 37208, 37287, 37363, 37370, 37444, 37515, 37518, 37527, 37535, 37610, 37663, 37715, 37770, 37835, 37880, 37933, 37995, 38055, 38133, 38160, 38236, 38306, 38338, 38341, 38350, 38358, 38421, 38473, 38525, 38592, 38669, 38676, 38753, 38832, 38875, 38927, 38930, 38938, 38946, 39002, 39050, 39110, 39185, 39258, 39261, 39270, 39278, 39342, 39376, 39451, 39491, 39558, 39632, 39710, 39759, 39762, 39768, 39776, 39834, 39905, 39935, 40011, 40048, 40112, 40161, 40216, 40284, 40357, 40433, 40457, 40506, 40534, 40580, 40636, 40694, 40736, 40783, 40829, 40901, 40962, 41039, 41067, 41108, 41161, 41234, 41303, 41356, 41423, 41494, 41515, 41566, 41605, 41664, 41733, 41796, 41870, 41948, 41962, 42032, 42103, 42157, 42233, 42288, 42366, 42423, 42426, 42437, 42445, 42518, 42567, 42646, 42722, 42729, 42805, 42855, 42858, 42861, 42911, 42914, 42919, 42925, 42997, 43005, 43007, 43080, 43108, 43135, 43156, 43158, 43169, 43211, 43225, 43245, 43290, 43326, 43359, 43377, 43421, 43426, 43440, 43446, 43500, 43530, 43590, 43618, 43626, 43641, 43661, 43707, 43734, 43769, 43799, 43862, 43871, 43874, 43902, 43929, 43969, 43988, 43993, 44027, 44099, 44102, 44105, 44108, 44114, 44164, 44192, 44219, 44222, 44225, 44300, 44309, 44312, 44317, 44346, 44372, 44407, 44449, 44494, 44526, 44531, 44580, 44583, 44588, 44652, 44690, 44721, 44774, 44780, 44789, 44792, 44806, 44813, 44816, 44872, 44913, 44933, 44966, 44991, 45038, 45072, 45120, 45153, 45178, 45181, 45184, 45189, 45243, 45271, 45312, 45317, 45356, 45390, 45418, 45447, 45450, 45488, 45555, 45558, 45609, 45648, 45653, 45671, 45675, 45680, 45724, 45746, 45751, 45781, 45815, 45866, 45896, 45899, 45917, 45936, 45939, 45941, 45995, 46021, 46041, 46043, 46054, 46072, 46083, 46149, 46157, 46160, 46184, 46189, 46216, 46248, 46290, 46346, 46357, 46360, 46392, 46421, 46448, 46502, 46509, 46512, 46517, 46520, 46560, 46594, 46682, 46724, 46751, 46768, 46773, 46779, 46850, 46921, 46994, 47060, 47094, 47162, 47188, 47191, 47223, 47289, 47313, 47316, 47362, 47376, 47417, 47457, 47460, 47490, 47562, 47565, 47598, 47673, 47676, 47682, 47756, 47770, 47803, 47876, 47891, 47894, 47897, 47968, 47971, 47976, 48064, 48083, 48085, 48137, 48164, 48185, 48187, 48198, 48260, 48303, 48363, 48412, 48461, 48487, 48517, 48561, 48568, 48574, 48579, 48593, 48605, 48608, 48682, 48708, 48735, 48791, 48847, 48853, 48860, 48866, 48872, 48886, 48895, 48904, 48912, 48915, 48940, 48961, 48971, 48980, 48983, 48996, 49013, 49017, 49043, 49061, 49077, 49082, 49085, 49099, 49109, 49112, 49116, 49130, 49139, 49142, 49146, 49149, 49152, 49211, 49236, 49242, 49247, 49257, 49266, 49269, 49272, 49277, 49313, 49340, 49397, 49402, 49431, 49485, 49506, 49565, 49591, 49616, 49667, 49672, 49721, 49724, 49727, 49776, 49806, 49834, 49886, 49915, 49944, 49960, 49970, 49975, 50016, 50047, 50080, 50154, 50178, 50199, 50245, 50248, 50265, 50294, 50297, 50320, 50334, 50343, 50346, 50411, 50414, 50419, 50424, 50427, 50432, 50499, 50530, 50561, 50573, 50589, 50606, 50629, 50653, 50667, 50678, 50711, 50742, 50745, 50751, 50805, 50835, 50896, 50911, 50924, 50940, 50960, 51022, 51061, 51089, 51107, 51156, 51161, 51166, 51204, 51231, 51249, 51296, 51301, 51304, 51332, 51359, 51377, 51412, 51475, 51538, 51597, 51659, 51695, 51755, 51820, 51860, 51902, 51989, 52025, 52081, 52191, 52196, 52273, 52276, 52310, 52345, 52436, 52439, 52478, 52510, 52532, 52546, 52552, 52572, 52622, 52675, 52741, 52751, 52771, 52788, 52823, 52841, 52850, 52862, 52865, 52870, 52873, 52878, 52930, 52986, 52989, 53014, 53062, 53124, 53190, 53228, 53241, 53244, 53278, 53400, 53405, 53408, 53455, 53480, 53528, 53531, 53586, 53608, 53637, 53660, 53726, 53767, 53836, 53839, 53845, 53885, 53953, 53982, 54012, 54017, 54039, 54072, 54102, 54105, 54165, 54183, 54189, 54211, 54240, 54243, 54254, 54277, 54287, 54290, 54293, 54356, 54359, 54364, 54407, 54432, 54489, 54526, 54564, 54612, 54630, 54658, 54724, 54727, 54746, 54749, 54752, 54820, 54849, 54879, 54884, 54906, 54939, 54969, 54972, 55039, 55104, 55114, 55130, 55144, 55151, 55178, 55211, 55239, 55259, 55262, 55265, 55270, 55326, 55340, 55360, 55405, 55439, 55481, 55486, 55519, 55550, 55553, 55556, 55559, 55573, 55576, 55581, 55625, 55642, 55658, 55681, 55730, 55775, 55837, 55850, 55882, 55929, 55937, 55961, 55980, 55983, 56080, 56131, 56191, 56203, 56206, 56211, 56227, 56250, 56262, 56326, 56344, 56376, 56400, 56435, 56464, 56491, 56532, 56616, 56633, 56673, 56720, 56722, 56756, 56761, 56841, 56874, 56883, 56886, 56905, 56910, 56948, 56951, 56953, 56958, 57005, 57078, 57081, 57084, 57148, 57161, 57189, 57218, 57242, 57255, 57268, 57271, 57280, 57303, 57306, 57315, 57352, 57384, 57387, 57392, 57395, 57400, 57468, 57515, 57532, 57535, 57538, 57543, 57548, 57576, 57598, 57627, 57659, 57683, 57740, 57795, 57844, 57847, 57894, 57946, 57951, 57982, 58050, 58086, 58113, 58167, 58235, 58240, 58259, 58262, 58264, 58318, 58369, 58436, 58464, 58488, 58490, 58501, 58520, 58539, 58558, 58620, 58631, 58694, 58750, 58782, 58787, 58864, 58867, 58870, 58900, 58919, 58926, 58931, 58976, 59019, 59067, 59109, 59159, 59214, 59296, 59358, 59377, 59392, 59399, 59453, 59455, 59485, 59538, 59585, 59635, 59711, 59742, 59803, 59874, 59879, 59915, 59933, 59994, 60024, 60026, 60029, 60070, 60088, 60150, 60180, 60182, 60185, 60224, 60259, 60307, 60325, 60345, 60442, 60456, 60487, 60544, 60609, 60612, 60617, 60619, 60624, 60642, 60766, 60838, 60868, 60882, 60912, 60969, 61025, 61028, 61033, 61035, 61038, 61041, 61074, 61136, 61163, 61192, 61210, 61246, 61314, 61316, 61321, 61339, 61383, 61416, 61452, 61506, 61529, 61532, 61574, 61605, 61651, 61661, 61666, 61674, 61679, 61702, 61704, 61709, 61747, 61750, 61777, 61853, 61858, 61908, 61911, 61951, 62003, 62020, 62038, 62053, 62069, 62071, 62085, 62116, 62156, 62215, 62275, 62297, 62316, 62324, 62363, 62432, 62451, 62454, 62478, 62483, 62523, 62559, 62600, 62629, 62671, 62674, 62711, 62736, 62740, 62822, 62825, 62828, 62921, 62924, 62929, 62969, 62985, 62988, 63040, 63066, 63108, 63154, 63156, 63163, 63182, 63184, 63192, 63194, 63212, 63235, 63263, 63281, 63284, 63298, 63359, 63417, 63475, 63535, 63580, 63630, 63689, 63700, 63738, 63741, 63775, 63810, 63813, 63816, 63821, 63824, 63829, 63844, 63869, 63882, 63907, 63949, 63954, 63959, 63998, 64122, 64154, 64236, 64287, 64341, 64355, 64386, 64439, 64555, 64673, 64678, 64760, 64844, 64847, 64850, 64853, 64935, 65019, 65022, 65027, 65030, 65033, 65085, 65088, 65093, 65098, 65152, 65219, 65242, 65269, 65341, 65415, 65418, 65420, 65443, 65483, 65485, 65543, 65603, 65658, 65678, 65680, 65691, 65718, 65757, 65780, 65832, 65870, 65873, 65920, 65973, 66043, 66082, 66095, 66102, 66109, 66122, 66124, 66126, 66128, 66132, 66153, 66202, 66245, 66250, 66253, 66256, 66263, 66290, 66293, 66351, 66374, 66400, 66427, 66430, 66435, 66438, 66443, 66469, 66471, 66508, 66535, 66537, 66548, 66575, 66598, 66680, 66752, 66754, 66759, 66847, 66850, 66852, 66894, 66919, 66921, 66932, 66954, 66975, 66989, 67000, 67011, 67022, 67053, 67076, 67093, 67141, 67172, 67177, 67202, 67234, 67253, 67265, 67297, 67315, 67348, 67384, 67426, 67438, 67443, 67448, 67500, 67532, 67556, 67570, 67581, 67616, 67665, 67683, 67705, 67728, 67752, 67772, 67821, 67921, 67955, 68017, 68030, 68108, 68147, 68209, 68334, 68386, 68443, 68463, 68539, 68561, 68628, 68740, 68753, 68767, 68807, 68871, 68922, 68946, 68963, 68985, 68990, 69010, 69056, 69076, 69094, 69097, 69100, 69146, 69149, 69154, 69250, 69255, 69298, 69300, 69335, 69337, 69398, 69458, 69488, 69515, 69517, 69549, 69572, 69604, 69607, 69616, 69626, 69687, 69745, 69747, 69819, 69865, 69867, 69939, 69982, 70052, 70121, 70146, 70181, 70204, 70277, 70288, 70298, 70364, 70414, 70449, 70470, 70475, 70537, 70540, 70579, 70620, 70689, 70709, 70756, 70791, 70850, 70905, 70951, 70997, 71032, 71037, 71111, 71167, 71183, 71196, 71220, 71258, 71304, 71310, 71372, 71396, 71398, 71403, 71471, 71517, 71520, 71524, 71526, 71535, 71583, 71640, 71687, 71745, 71797, 71826, 71884, 71943, 71987, 72009, 72064, 72102, 72107, 72110, 72161, 72223, 72228, 72230, 72232, 72263, 72298, 72300, 72362, 72422, 72452, 72479, 72481, 72513, 72536, 72568, 72571, 72580, 72638, 72654, 72717, 72780, 72803, 72839, 72855, 72858, 72886, 72908, 72999, 73022, 73027, 73030, 73072, 73107, 73152, 73154, 73190, 73199, 73231, 73261, 73301, 73399, 73453, 73477, 73510, 73531, 73536, 73561, 73565, 73574, 73607, 73645, 73709, 73714, 73752, 73777, 73784, 73787, 73790, 73854, 73885, 73937, 73962, 73966, 73971, 73980, 74002, 74032, 74034, 74037, 74046, 74088, 74131, 74235, 74244, 74289, 74336, 74400, 74460, 74532, 74554, 74556, 74559, 74601, 74635, 74644, 74704, 74731, 74733, 74736, 74745, 74801, 74846, 74848, 74862, 74914, 74947, 74956, 75002, 75004, 75007, 75010, 75019, 75062, 75064, 75067, 75072, 75081, 75128, 75135, 75138, 75143, 75172, 75240, 75301, 75369, 75376, 75379, 75383, 75385, 75387, 75418, 75447, 75449, 75492, 75544, 75600, 75654, 75715, 75730, 75732, 75793, 75849, 75907, 75964, 75976, 75997, 75999, 76025, 76048, 76074, 76077, 76127, 76163, 76215, 76267, 76269, 76293, 76295, 76354, 76415, 76478, 76500, 76515, 76550, 76565, 76585, 76642, 76701, 76761, 76823, 76882, 76944, 76990, 76992, 77050, 77110, 77142, 77163, 77165, 77195, 77218, 77232, 77242, 77304, 77319, 77346, 77386, 77428, 77475, 77541, 77601, 77639, 77642, 77653, 77694, 77754, 77792, 77795, 77799, 77855, 77911, 77962, 78020, 78078, 78136, 78160, 78214, 78278, 78338, 78376, 78381, 78404, 78432, 78435, 78438, 78443, 78489, 78549, 78568, 78635, 78647, 78677, 78680, 78683, 78688, 78691, 78693, 78718, 78746, 78748, 78811, 78872, 78932, 78965, 78980, 79015, 79030, 79050, 79052, 79111, 79171, 79232, 79245, 79247, 79307, 79366, 79402, 79427, 79429, 79463, 79486, 79500, 79510, 79572, 79633, 79695, 79755, 79787, 79841, 79888, 79954, 79986, 80001, 80029, 80070, 80112, 80188, 80254, 80322, 80360, 80363, 80374, 80447, 80515, 80553, 80556, 80560, 80612, 80644, 80678, 80684, 80748, 80782, 80827, 80872, 80918, 80968, 81025, 81030, 81117, 81120, 81123, 81126, 81132, 81137, 81171, 81174, 81179, 81229, 81296, 81315, 81382, 81440, 81502, 81567, 81630, 81653, 81693, 81761, 81803, 81806, 81863, 81876, 81943, 81946, 81951, 81964, 82031, 82034, 82039, 82042, 82047, 82050, 82052, 82081, 82109, 82167, 82224, 82274, 82303, 82305, 82315, 82389, 82445, 82515, 82559, 82633, 82674, 82740, 82805, 82840, 82843, 82847, 82859, 82878, 82898, 82914, 82935, 82957, 82974, 83000, 83006, 83027, 83048, 83067, 83084, 83105, 83129, 83168, 83189, 83235, 83243, 83251, 83258, 83278, 83298, 83318, 83338, 83357, 83376, 83395, 83417, 83439, 83468, 83494, 83525, 83531, 83556, 83563, 83579, 83598, 83605, 83621, 83640, 83647, 83663, 83689, 83709, 83736, 83758, 83766, 83773, 83795, 83822, 83850, 83857, 83929, 83947, 83983, 84006, 84031, 84061, 84069, 84095, 84125, 84133, 84140, 84164, 84218, 84246, 84278, 84333, 84362, 84387, 84443, 84472, 84530, 84560, 84578, 84601, 84608, 84625, 84647, 84654, 84672, 84693, 84700, 84769, 84797, 84848, 84860, 84889, 84914, 84978, 84990, 85035, 85037, 85051, 85073, 85110, 85125, 85127, 85133, 85170, 85177, 85210, 85238, 85274, 85316, 85361, 85406, 85446, 85487, 85533, 85575, 85629, 85704, 85751, 85802, 85852, 85922, 85985, 86048, 86087, 86091, 86121, 86152, 86180, 86189, 86199, 86238, 86242, 86272, 86303, 86331, 86340, 86350, 86389, 86439, 86443, 86547, 86583, 86593, 86656, 86660, 86665, 86677, 86711, 86715, 86718, 86752, 86792, 86802, 86842, 86905, 86909, 86914, 86926, 86962, 86996, 87000, 87003, 87039, 87049, 87127, 87131, 87136, 87146, 87221, 87225, 87228, 87240, 87280, 87321, 87390, 87460, 87535, 87609, 87677, 87746, 87825, 87901, 87973, 88051, 88125, 88197, 88201, 88231, 88233, 88249, 88262, 88282, 88310, 88338, 88357, 88377, 88398, 88405, 88460, 88520, 88590, 88650, 88677, 88679, 88722, 88724, 88728, 88744, 88765, 88803, 88833, 88836, 88841, 88853, 88887, 88921, 88931, 88933, 88935, 88973, 89015, 89041, 89081, 89158, 89174, 89228, 89304, 89328, 89350, 89417, 89473, 89503, 89545, 89609, 89639, 89676, 89694, 89780, 89837, 89870, 89925, 89946, 89974, 89992, 90052, 90067, 90071, 90081, 90094, 90142, 90204, 90247, 90279, 90305, 90309, 90321, 90381, 90418, 90485, 90528, 90595, 90656, 90678, 90699, 90703, 90720, 90728, 90740, 90742, 90751, 90799, 90801, 90811, 90813, 90863, 90865, 90875, 90877, 90879, 90883, 90886, 90891, 90903, 90924, 90954, 90984, 91030, 91076, 91131, 91186, 91197, 91224, 91226, 91284, 91286, 91323, 91325, 91372, 91400, 91402, 91461, 91463, 91516, 91518, 91523, 91579, 91589, 91591, 91657, 91659, 91700, 91702, 91753, 91785, 91787, 91850, 91852, 91909, 91911, 91916, 91976, 91986, 91988, 92052, 92054, 92094, 92096, 92146, 92177, 92179, 92241, 92243, 92299, 92301, 92306, 92365, 92375, 92377, 92446, 92448, 92513, 92572, 92632, 92691, 92754, 92817, 92878, 92912, 92915, 92970, 93005, 93007, 93027, 93067, 93069, 93096, 93194, 93224, 93226, 93322, 93324, 93328, 93345, 93353, 93365, 93428, 93500, 93516, 93518, 93548, 93650, 93662, 93664, 93677, 93681, 93684, 93687, 93699, 93730, 93790, 93794, 93797, 93802, 93814, 93816, 93823, 93844, 93846, 93879, 93887, 93918, 93928, 93930, 93937, 93966, 93968, 94032, 94048, 94050, 94063, 94092, 94094, 94112, 94153, 94203, 94260, 94271, 94278, 94311, 94341, 94358, 94371, 94373, 94377, 94413, 94415, 94431, 94484, 94530, 94555, 94565, 94593, 94642, 94652, 94657, 94667, 94669, 94673, 94708, 94710, 94724, 94740, 94792, 94838, 94863, 94873, 94900, 94902, 94965, 94967, 94980, 94982, 95036, 95092, 95154, 95157, 95164, 95202, 95204, 95223, 95238, 95258, 95289, 95315, 95328, 95347, 95399, 95454, 95499, 95512, 95533, 95574, 95637, 95639, 95672, 95708, 95728, 95749, 95751, 95756, 95758, 95765, 95800, 95802, 95835, 95871, 95891, 95912, 95914, 95955, 95957, 95964, 95991, 96006, 96008, 96023, 96030, 96032, 96048, 96050, 96080, 96116, 96134, 96136, 96167, 96169, 96184, 96198, 96219, 96247, 96254, 96269, 96304, 96320, 96322, 96358, 96396, 96424, 96448, 96462, 96514, 96550, 96578, 96623, 96625, 96630, 96632, 96646, 96696, 96728, 96754, 96797, 96799, 96835, 96855, 96876, 96878, 96880, 96919, 96921, 96974, 97012, 97040, 97064, 97130, 97166, 97194, 97239, 97275, 97295, 97316, 97329, 97331, 97338, 97376, 97378, 97394, 97421, 97427, 97449, 97464, 97505, 97514, 97536, 97583, 97585, 97655, 97671, 97706, 97708, 97738, 97740, 97758, 97765, 97767, 97813, 97859, 97914, 97919, 97972, 97974, 98008, 98015, 98017, 98028, 98030, 98035, 98037, 98070, 98135, 98137, 98139, 98161, 98180, 98182, 98209, 98211, 98252, 98275, 98277, 98334, 98336, 98367, 98374, 98376, 98383, 98422, 98424, 98444, 98466, 98488, 98508, 98531, 98550, 98552, 98573, 98601, 98614, 98616, 98628, 98630, 98642, 98692, 98725, 98727, 98777, 98809, 98834, 98856, 98876, 98878, 98883, 98919, 98921, 98933, 98957, 99009, 99022, 99024, 99029, 99077, 99079, 99141, 99167, 99197, 99199, 99218, 99278, 99307, 99330, 99336, 99386, 99419, 99456, 99490, 99492, 99505, 99507, 99514, 99516, 99518, 99525, 99593, 99595, 99612, 99643, 99645, 99687, 99715, 99773, 99785, 99787, 99819, 99861, 99863, 99868, 99870, 99895, 99937, 99939, 99941, 99946, 99948, 99975, 99977, 99995, 99997, 100001, 100066, 100068, 100083, 100092, 100111, 100121, 100149, 100157, 100167, 100191, 100229, 100258, 100287, 100312, 100322, 100324, 100329, 100370, 100372, 100391, 100411, 100462, 100464, 100478, 100493, 100551, 100553, 100578, 100592, 100607, 100609, 100614, 100659, 100661, 100680, 100700, 100724, 100775, 100777, 100791, 100806, 100868, 100870, 100923, 100952, 100971, 100985, 101000, 101002, 101007, 101051, 101053, 101072, 101092, 101116, 101167, 101169, 101183, 101198, 101259, 101261, 101314, 101343, 101362, 101376, 101391, 101393, 101398, 101455, 101457, 101541, 101567, 101597, 101635, 101637, 101696, 101756, 101786, 101867, 101869, 101894, 101896, 101925, 101944, 101946, 101948, 101953, 102010, 102012, 102096, 102122, 102152, 102190, 102192, 102251, 102280, 102299, 102301, 102303, 102307, 102309, 102342, 102366, 102384, 102386, 102397, 102411, 102471, 102530, 102589, 102651, 102688, 102709, 102779, 102842, 102904, 102968, 103037, 103057, 103060, 103063, 103083, 103086, 103091, 103112, 103138, 103162, 103187, 103202, 103218, 103237, 103257, 103270, 103287, 103296, 103309, 103325, 103339, 103354, 103376, 103393, 103421, 103438, 103447, 103459, 103469, 103487, 103503, 103525, 103536, 103545, 103553, 103563, 103577, 103583, 103600, 103622, 103644, 103655, 103661, 103670, 103679, 103686, 103694, 103706, 103718, 103733, 103740, 103756, 103767, 103803, 103832, 103894, 103902, 103905, 103918, 103927, 103966, 104024, 104042, 104048, 104051, 104097, 104110, 104123, 104196, 104271, 104274, 104311, 104343, 104346, 104369, 104372, 104381, 104441, 104473, 104476, 104501, 104504, 104526, 104586, 104618, 104621, 104644, 104647, 104652, 104674, 104693, 104699, 104702, 104707, 104712, 104768, 104827, 104885, 104911, 104920, 104926, 104953, 104995, 105051, 105106, 105131, 105145, 105153, 105193, 105234, 105237, 105242, 105256, 105276, 105306, 105357, 105398, 105440, 105452, 105455, 105468, 105515, 105522, 105551, 105567, 105586, 105589, 105595, 105604, 105607, 105613, 105648, 105659, 105723, 105734, 105739, 105755, 105774, 105777, 105783, 105792, 105795, 105798, 105830, 105854, 105859, 105889, 105892, 105898, 105907, 105910, 105915, 105918, 105927, 105949, 105966, 106023, 106029, 106038, 106041, 106056, 106084, 106090, 106099, 106102, 106113, 106127, 106140, 106160, 106188, 106250, 106253, 106258, 106261, 106266, 106272, 106281, 106284, 106297, 106320, 106326, 106335, 106338, 106350, 106374, 106388, 106398, 106427, 106430, 106458, 106467, 106498, 106551, 106587, 106599, 106615, 106635, 106654, 106682, 106711, 106740, 106776, 106834, 106837, 106879, 106906, 106934, 106970, 107021, 107051, 107083, 107157, 107188, 107194, 107203, 107208, 107271, 107287, 107290, 107293, 107336, 107371, 107403, 107440, 107446, 107449, 107465, 107500, 107518, 107521, 107539, 107579, 107630, 107668, 107696, 107743, 107804, 107826, 107829, 107834, 107878, 107922, 107951, 107998, 108001, 108006, 108046, 108068, 108110, 108137, 108165, 108182, 108224, 108262, 108297, 108344, 108349, 108406, 108409, 108412, 108417, 108422, 108480, 108483, 108497, 108503, 108512, 108515, 108531, 108559, 108565, 108574, 108577, 108586 ], "line_end_idx": [ 68, 98, 131, 190, 307, 383, 461, 531, 602, 670, 708, 710, 770, 837, 903, 972, 974, 1043, 1104, 1171, 1214, 1216, 1284, 1347, 1410, 1474, 1537, 1582, 1584, 1641, 1643, 1687, 1726, 1787, 1849, 1887, 1953, 2008, 2061, 2116, 2154, 2200, 2202, 2239, 2241, 2287, 2341, 2402, 2458, 2501, 2542, 2599, 2601, 2641, 2719, 2721, 2793, 2830, 2832, 2854, 2870, 2888, 2916, 2950, 3007, 3037, 3067, 3069, 3109, 3127, 3143, 3183, 3196, 3220, 3243, 3313, 3324, 3334, 3396, 3446, 3474, 3495, 3500, 3560, 3563, 3602, 3643, 3715, 3763, 3838, 3867, 3883, 3899, 3966, 3969, 4015, 4038, 4048, 4063, 4126, 4173, 4177, 4182, 4199, 4215, 4232, 4258, 4284, 4306, 4324, 4341, 4360, 4376, 4392, 4412, 4449, 4477, 4497, 4512, 4527, 4603, 4674, 4700, 4739, 4747, 4749, 4763, 4785, 4805, 4864, 4926, 4934, 4987, 5036, 5061, 5104, 5142, 5185, 5246, 5305, 5369, 5398, 5400, 5442, 5500, 5548, 5575, 5580, 5627, 5630, 5690, 5692, 5735, 5808, 5880, 5949, 6019, 6031, 6045, 6073, 6150, 6216, 6254, 6285, 6303, 6331, 6336, 6390, 6408, 6432, 6441, 6470, 6501, 6531, 6534, 6537, 6553, 6559, 6584, 6600, 6638, 6643, 6659, 6695, 6725, 6728, 6733, 6803, 6872, 6899, 6938, 6993, 7034, 7106, 7176, 7249, 7320, 7383, 7391, 7402, 7417, 7429, 7453, 7464, 7467, 7488, 7534, 7543, 7563, 7581, 7596, 7612, 7630, 7644, 7663, 7729, 7760, 7773, 7775, 7812, 7814, 7836, 7895, 7911, 7913, 7949, 8013, 8076, 8096, 8098, 8100, 8120, 8176, 8190, 8192, 8241, 8243, 8265, 8329, 8345, 8347, 8421, 8439, 8441, 8443, 8469, 8535, 8555, 8557, 8578, 8597, 8599, 8624, 8692, 8717, 8736, 8738, 8759, 8784, 8786, 8850, 8882, 8955, 8968, 8970, 9002, 9004, 9034, 9094, 9110, 9112, 9135, 9148, 9216, 9260, 9287, 9335, 9340, 9390, 9431, 9494, 9550, 9596, 9661, 9713, 9768, 9838, 9843, 9900, 9933, 9964, 9988, 10048, 10107, 10128, 10162, 10167, 10191, 10262, 10296, 10338, 10341, 10343, 10369, 10434, 10498, 10550, 10568, 10570, 10614, 10649, 10712, 10742, 10747, 10794, 10854, 10886, 10947, 10988, 11017, 11028, 11048, 11076, 11079, 11131, 11157, 11224, 11227, 11255, 11257, 11283, 11329, 11392, 11452, 11516, 11578, 11601, 11603, 11614, 11628, 11711, 11714, 11758, 11763, 11808, 11869, 11925, 11960, 12020, 12065, 12114, 12184, 12187, 12190, 12256, 12261, 12263, 12291, 12352, 12392, 12417, 12419, 12430, 12442, 12472, 12528, 12531, 12546, 12551, 12567, 12628, 12693, 12753, 12798, 12847, 12868, 12871, 12876, 12915, 12917, 12949, 13018, 13089, 13119, 13137, 13139, 13151, 13172, 13197, 13229, 13276, 13278, 13316, 13331, 13344, 13385, 13424, 13427, 13430, 13432, 13471, 13540, 13611, 13678, 13703, 13705, 13717, 13738, 13763, 13795, 13842, 13844, 13882, 13904, 13913, 13926, 13949, 13990, 14029, 14032, 14035, 14037, 14052, 14104, 14120, 14122, 14170, 14178, 14188, 14229, 14231, 14248, 14256, 14258, 14271, 14326, 14340, 14342, 14372, 14380, 14390, 14416, 14418, 14435, 14441, 14495, 14503, 14505, 14517, 14571, 14584, 14586, 14628, 14636, 14646, 14672, 14692, 14714, 14734, 14762, 14778, 14812, 14882, 14952, 14954, 14971, 14979, 14981, 15008, 15078, 15090, 15110, 15112, 15149, 15163, 15165, 15176, 15214, 15249, 15295, 15301, 15342, 15392, 15394, 15451, 15474, 15476, 15481, 15548, 15594, 15597, 15636, 15660, 15666, 15676, 15679, 15683, 15702, 15705, 15734, 15771, 15791, 15808, 15816, 15833, 15848, 15877, 15906, 15926, 15945, 15963, 15988, 16005, 16017, 16084, 16153, 16176, 16186, 16220, 16288, 16330, 16358, 16360, 16381, 16447, 16493, 16495, 16509, 16570, 16585, 16587, 16621, 16651, 16676, 16744, 16789, 16817, 16914, 16919, 16927, 16929, 16945, 16994, 17011, 17013, 17033, 17075, 17107, 17112, 17145, 17148, 17186, 17218, 17223, 17256, 17259, 17267, 17269, 17295, 17365, 17434, 17451, 17470, 17472, 17491, 17504, 17561, 17614, 17657, 17677, 17694, 17714, 17760, 17763, 17768, 17822, 17856, 17873, 17880, 17883, 17940, 17968, 18027, 18087, 18149, 18187, 18243, 18263, 18268, 18311, 18314, 18317, 18322, 18324, 18392, 18461, 18463, 18524, 18535, 18554, 18601, 18604, 18640, 18689, 18692, 18728, 18777, 18780, 18808, 18856, 18859, 18895, 18944, 18947, 18962, 19008, 19011, 19066, 19117, 19120, 19125, 19162, 19188, 19197, 19203, 19216, 19241, 19286, 19324, 19343, 19354, 19357, 19418, 19456, 19462, 19465, 19498, 19527, 19554, 19614, 19625, 19649, 19659, 19671, 19683, 19694, 19706, 19715, 19726, 19740, 19774, 19816, 19830, 19836, 19839, 19844, 19854, 19860, 19863, 19884, 19908, 19962, 19975, 19978, 20029, 20046, 20049, 20108, 20147, 20190, 20196, 20199, 20235, 20263, 20285, 20349, 20355, 20358, 20380, 20402, 20429, 20482, 20499, 20505, 20508, 20513, 20518, 20532, 20571, 20628, 20668, 20671, 20674, 20732, 20735, 20740, 20801, 20823, 20847, 20849, 20876, 20947, 20969, 20997, 20999, 21054, 21099, 21133, 21151, 21221, 21288, 21365, 21400, 21408, 21413, 21431, 21501, 21575, 21652, 21687, 21695, 21698, 21703, 21721, 21811, 21894, 21980, 22036, 22044, 22047, 22067, 22070, 22072, 22090, 22102, 22120, 22135, 22158, 22183, 22259, 22330, 22333, 22403, 22418, 22451, 22505, 22568, 22612, 22631, 22650, 22653, 22703, 22724, 22790, 22792, 22812, 22877, 22948, 22972, 22988, 22990, 23006, 23036, 23090, 23092, 23119, 23184, 23250, 23320, 23389, 23457, 23505, 23528, 23530, 23541, 23598, 23623, 23626, 23644, 23668, 23721, 23726, 23731, 23746, 23749, 23771, 23773, 23804, 23848, 23919, 23943, 23970, 23972, 23990, 23992, 24027, 24075, 24146, 24170, 24201, 24203, 24231, 24242, 24252, 24290, 24295, 24362, 24364, 24397, 24439, 24496, 24526, 24555, 24557, 24593, 24635, 24673, 24722, 24823, 24826, 24828, 24852, 24918, 24989, 25013, 25033, 25035, 25100, 25102, 25140, 25176, 25224, 25288, 25309, 25311, 25322, 25345, 25363, 25377, 25395, 25426, 25431, 25445, 25447, 25466, 25522, 25589, 25656, 25725, 25775, 25790, 25792, 25803, 25814, 25836, 25851, 25856, 25858, 25879, 25940, 26000, 26056, 26102, 26141, 26159, 26161, 26172, 26229, 26240, 26259, 26286, 26337, 26342, 26353, 26422, 26489, 26634, 26697, 26735, 26738, 26767, 26847, 26877, 26994, 27005, 27024, 27083, 27110, 27161, 27166, 27180, 27322, 27373, 27412, 27463, 27474, 27480, 27483, 27488, 27491, 27496, 27556, 27615, 27643, 27671, 27720, 27767, 27774, 27827, 27830, 27833, 27838, 27841, 27843, 27904, 27964, 28012, 28041, 28043, 28061, 28103, 28123, 28128, 28144, 28147, 28185, 28207, 28212, 28230, 28233, 28251, 28279, 28319, 28377, 28379, 28413, 28456, 28482, 28505, 28534, 28563, 28567, 28608, 28610, 28612, 28639, 28660, 28662, 28673, 28724, 28738, 28801, 28818, 28835, 28851, 28859, 28866, 28876, 28884, 28887, 28905, 28911, 28966, 28981, 28997, 29000, 29009, 29023, 29039, 29048, 29051, 29060, 29095, 29108, 29112, 29135, 29194, 29210, 29219, 29222, 29244, 29270, 29279, 29282, 29333, 29353, 29362, 29365, 29379, 29395, 29404, 29407, 29419, 29485, 29545, 29601, 29608, 29640, 29668, 29677, 29702, 29723, 29739, 29766, 29813, 29818, 29834, 29867, 29898, 29935, 29973, 29982, 29985, 29988, 30038, 30093, 30095, 30114, 30129, 30132, 30149, 30152, 30174, 30219, 30250, 30307, 30322, 30340, 30345, 30407, 30410, 30418, 30474, 30477, 30480, 30518, 30541, 30566, 30597, 30599, 30602, 30607, 30652, 30715, 30731, 30749, 30783, 30833, 30878, 30899, 30925, 30928, 30933, 30949, 31001, 31004, 31079, 31082, 31087, 31116, 31138, 31151, 31160, 31199, 31257, 31275, 31284, 31287, 31296, 31318, 31337, 31346, 31349, 31362, 31375, 31384, 31387, 31404, 31416, 31425, 31428, 31433, 31438, 31468, 31520, 31580, 31663, 31703, 31735, 31763, 31792, 31821, 31878, 31917, 31955, 31998, 32003, 32041, 32044, 32118, 32135, 32177, 32194, 32197, 32202, 32277, 32329, 32346, 32349, 32412, 32437, 32472, 32553, 32581, 32586, 32598, 32612, 32622, 32625, 32670, 32744, 32778, 32843, 32891, 32899, 32904, 32941, 32970, 32979, 33021, 33049, 33111, 33179, 33243, 33314, 33380, 33391, 33423, 33442, 33445, 33482, 33513, 33516, 33548, 33583, 33649, 33686, 33721, 33724, 33755, 33792, 33856, 33898, 33952, 33986, 34018, 34062, 34067, 34090, 34124, 34127, 34155, 34186, 34217, 34245, 34248, 34283, 34346, 34378, 34435, 34444, 34475, 34503, 34526, 34535, 34597, 34665, 34729, 34800, 34866, 34877, 34909, 34928, 34931, 35000, 35066, 35111, 35168, 35171, 35227, 35263, 35298, 35301, 35304, 35372, 35410, 35443, 35466, 35509, 35514, 35558, 35561, 35597, 35624, 35627, 35691, 35726, 35761, 35815, 35847, 35904, 35913, 35944, 35972, 35995, 36004, 36066, 36134, 36198, 36269, 36335, 36346, 36378, 36397, 36400, 36433, 36498, 36542, 36599, 36602, 36605, 36623, 36689, 36736, 36770, 36791, 36807, 36810, 36812, 36831, 36833, 36848, 36902, 36904, 36922, 36924, 36973, 36987, 36991, 37043, 37072, 37082, 37085, 37092, 37100, 37169, 37208, 37287, 37363, 37370, 37444, 37515, 37518, 37527, 37535, 37610, 37663, 37715, 37770, 37835, 37880, 37933, 37995, 38055, 38133, 38160, 38236, 38306, 38338, 38341, 38350, 38358, 38421, 38473, 38525, 38592, 38669, 38676, 38753, 38832, 38875, 38927, 38930, 38938, 38946, 39002, 39050, 39110, 39185, 39258, 39261, 39270, 39278, 39342, 39376, 39451, 39491, 39558, 39632, 39710, 39759, 39762, 39768, 39776, 39834, 39905, 39935, 40011, 40048, 40112, 40161, 40216, 40284, 40357, 40433, 40457, 40506, 40534, 40580, 40636, 40694, 40736, 40783, 40829, 40901, 40962, 41039, 41067, 41108, 41161, 41234, 41303, 41356, 41423, 41494, 41515, 41566, 41605, 41664, 41733, 41796, 41870, 41948, 41962, 42032, 42103, 42157, 42233, 42288, 42366, 42423, 42426, 42437, 42445, 42518, 42567, 42646, 42722, 42729, 42805, 42855, 42858, 42861, 42911, 42914, 42919, 42925, 42997, 43005, 43007, 43080, 43108, 43135, 43156, 43158, 43169, 43211, 43225, 43245, 43290, 43326, 43359, 43377, 43421, 43426, 43440, 43446, 43500, 43530, 43590, 43618, 43626, 43641, 43661, 43707, 43734, 43769, 43799, 43862, 43871, 43874, 43902, 43929, 43969, 43988, 43993, 44027, 44099, 44102, 44105, 44108, 44114, 44164, 44192, 44219, 44222, 44225, 44300, 44309, 44312, 44317, 44346, 44372, 44407, 44449, 44494, 44526, 44531, 44580, 44583, 44588, 44652, 44690, 44721, 44774, 44780, 44789, 44792, 44806, 44813, 44816, 44872, 44913, 44933, 44966, 44991, 45038, 45072, 45120, 45153, 45178, 45181, 45184, 45189, 45243, 45271, 45312, 45317, 45356, 45390, 45418, 45447, 45450, 45488, 45555, 45558, 45609, 45648, 45653, 45671, 45675, 45680, 45724, 45746, 45751, 45781, 45815, 45866, 45896, 45899, 45917, 45936, 45939, 45941, 45995, 46021, 46041, 46043, 46054, 46072, 46083, 46149, 46157, 46160, 46184, 46189, 46216, 46248, 46290, 46346, 46357, 46360, 46392, 46421, 46448, 46502, 46509, 46512, 46517, 46520, 46560, 46594, 46682, 46724, 46751, 46768, 46773, 46779, 46850, 46921, 46994, 47060, 47094, 47162, 47188, 47191, 47223, 47289, 47313, 47316, 47362, 47376, 47417, 47457, 47460, 47490, 47562, 47565, 47598, 47673, 47676, 47682, 47756, 47770, 47803, 47876, 47891, 47894, 47897, 47968, 47971, 47976, 48064, 48083, 48085, 48137, 48164, 48185, 48187, 48198, 48260, 48303, 48363, 48412, 48461, 48487, 48517, 48561, 48568, 48574, 48579, 48593, 48605, 48608, 48682, 48708, 48735, 48791, 48847, 48853, 48860, 48866, 48872, 48886, 48895, 48904, 48912, 48915, 48940, 48961, 48971, 48980, 48983, 48996, 49013, 49017, 49043, 49061, 49077, 49082, 49085, 49099, 49109, 49112, 49116, 49130, 49139, 49142, 49146, 49149, 49152, 49211, 49236, 49242, 49247, 49257, 49266, 49269, 49272, 49277, 49313, 49340, 49397, 49402, 49431, 49485, 49506, 49565, 49591, 49616, 49667, 49672, 49721, 49724, 49727, 49776, 49806, 49834, 49886, 49915, 49944, 49960, 49970, 49975, 50016, 50047, 50080, 50154, 50178, 50199, 50245, 50248, 50265, 50294, 50297, 50320, 50334, 50343, 50346, 50411, 50414, 50419, 50424, 50427, 50432, 50499, 50530, 50561, 50573, 50589, 50606, 50629, 50653, 50667, 50678, 50711, 50742, 50745, 50751, 50805, 50835, 50896, 50911, 50924, 50940, 50960, 51022, 51061, 51089, 51107, 51156, 51161, 51166, 51204, 51231, 51249, 51296, 51301, 51304, 51332, 51359, 51377, 51412, 51475, 51538, 51597, 51659, 51695, 51755, 51820, 51860, 51902, 51989, 52025, 52081, 52191, 52196, 52273, 52276, 52310, 52345, 52436, 52439, 52478, 52510, 52532, 52546, 52552, 52572, 52622, 52675, 52741, 52751, 52771, 52788, 52823, 52841, 52850, 52862, 52865, 52870, 52873, 52878, 52930, 52986, 52989, 53014, 53062, 53124, 53190, 53228, 53241, 53244, 53278, 53400, 53405, 53408, 53455, 53480, 53528, 53531, 53586, 53608, 53637, 53660, 53726, 53767, 53836, 53839, 53845, 53885, 53953, 53982, 54012, 54017, 54039, 54072, 54102, 54105, 54165, 54183, 54189, 54211, 54240, 54243, 54254, 54277, 54287, 54290, 54293, 54356, 54359, 54364, 54407, 54432, 54489, 54526, 54564, 54612, 54630, 54658, 54724, 54727, 54746, 54749, 54752, 54820, 54849, 54879, 54884, 54906, 54939, 54969, 54972, 55039, 55104, 55114, 55130, 55144, 55151, 55178, 55211, 55239, 55259, 55262, 55265, 55270, 55326, 55340, 55360, 55405, 55439, 55481, 55486, 55519, 55550, 55553, 55556, 55559, 55573, 55576, 55581, 55625, 55642, 55658, 55681, 55730, 55775, 55837, 55850, 55882, 55929, 55937, 55961, 55980, 55983, 56080, 56131, 56191, 56203, 56206, 56211, 56227, 56250, 56262, 56326, 56344, 56376, 56400, 56435, 56464, 56491, 56532, 56616, 56633, 56673, 56720, 56722, 56756, 56761, 56841, 56874, 56883, 56886, 56905, 56910, 56948, 56951, 56953, 56958, 57005, 57078, 57081, 57084, 57148, 57161, 57189, 57218, 57242, 57255, 57268, 57271, 57280, 57303, 57306, 57315, 57352, 57384, 57387, 57392, 57395, 57400, 57468, 57515, 57532, 57535, 57538, 57543, 57548, 57576, 57598, 57627, 57659, 57683, 57740, 57795, 57844, 57847, 57894, 57946, 57951, 57982, 58050, 58086, 58113, 58167, 58235, 58240, 58259, 58262, 58264, 58318, 58369, 58436, 58464, 58488, 58490, 58501, 58520, 58539, 58558, 58620, 58631, 58694, 58750, 58782, 58787, 58864, 58867, 58870, 58900, 58919, 58926, 58931, 58976, 59019, 59067, 59109, 59159, 59214, 59296, 59358, 59377, 59392, 59399, 59453, 59455, 59485, 59538, 59585, 59635, 59711, 59742, 59803, 59874, 59879, 59915, 59933, 59994, 60024, 60026, 60029, 60070, 60088, 60150, 60180, 60182, 60185, 60224, 60259, 60307, 60325, 60345, 60442, 60456, 60487, 60544, 60609, 60612, 60617, 60619, 60624, 60642, 60766, 60838, 60868, 60882, 60912, 60969, 61025, 61028, 61033, 61035, 61038, 61041, 61074, 61136, 61163, 61192, 61210, 61246, 61314, 61316, 61321, 61339, 61383, 61416, 61452, 61506, 61529, 61532, 61574, 61605, 61651, 61661, 61666, 61674, 61679, 61702, 61704, 61709, 61747, 61750, 61777, 61853, 61858, 61908, 61911, 61951, 62003, 62020, 62038, 62053, 62069, 62071, 62085, 62116, 62156, 62215, 62275, 62297, 62316, 62324, 62363, 62432, 62451, 62454, 62478, 62483, 62523, 62559, 62600, 62629, 62671, 62674, 62711, 62736, 62740, 62822, 62825, 62828, 62921, 62924, 62929, 62969, 62985, 62988, 63040, 63066, 63108, 63154, 63156, 63163, 63182, 63184, 63192, 63194, 63212, 63235, 63263, 63281, 63284, 63298, 63359, 63417, 63475, 63535, 63580, 63630, 63689, 63700, 63738, 63741, 63775, 63810, 63813, 63816, 63821, 63824, 63829, 63844, 63869, 63882, 63907, 63949, 63954, 63959, 63998, 64122, 64154, 64236, 64287, 64341, 64355, 64386, 64439, 64555, 64673, 64678, 64760, 64844, 64847, 64850, 64853, 64935, 65019, 65022, 65027, 65030, 65033, 65085, 65088, 65093, 65098, 65152, 65219, 65242, 65269, 65341, 65415, 65418, 65420, 65443, 65483, 65485, 65543, 65603, 65658, 65678, 65680, 65691, 65718, 65757, 65780, 65832, 65870, 65873, 65920, 65973, 66043, 66082, 66095, 66102, 66109, 66122, 66124, 66126, 66128, 66132, 66153, 66202, 66245, 66250, 66253, 66256, 66263, 66290, 66293, 66351, 66374, 66400, 66427, 66430, 66435, 66438, 66443, 66469, 66471, 66508, 66535, 66537, 66548, 66575, 66598, 66680, 66752, 66754, 66759, 66847, 66850, 66852, 66894, 66919, 66921, 66932, 66954, 66975, 66989, 67000, 67011, 67022, 67053, 67076, 67093, 67141, 67172, 67177, 67202, 67234, 67253, 67265, 67297, 67315, 67348, 67384, 67426, 67438, 67443, 67448, 67500, 67532, 67556, 67570, 67581, 67616, 67665, 67683, 67705, 67728, 67752, 67772, 67821, 67921, 67955, 68017, 68030, 68108, 68147, 68209, 68334, 68386, 68443, 68463, 68539, 68561, 68628, 68740, 68753, 68767, 68807, 68871, 68922, 68946, 68963, 68985, 68990, 69010, 69056, 69076, 69094, 69097, 69100, 69146, 69149, 69154, 69250, 69255, 69298, 69300, 69335, 69337, 69398, 69458, 69488, 69515, 69517, 69549, 69572, 69604, 69607, 69616, 69626, 69687, 69745, 69747, 69819, 69865, 69867, 69939, 69982, 70052, 70121, 70146, 70181, 70204, 70277, 70288, 70298, 70364, 70414, 70449, 70470, 70475, 70537, 70540, 70579, 70620, 70689, 70709, 70756, 70791, 70850, 70905, 70951, 70997, 71032, 71037, 71111, 71167, 71183, 71196, 71220, 71258, 71304, 71310, 71372, 71396, 71398, 71403, 71471, 71517, 71520, 71524, 71526, 71535, 71583, 71640, 71687, 71745, 71797, 71826, 71884, 71943, 71987, 72009, 72064, 72102, 72107, 72110, 72161, 72223, 72228, 72230, 72232, 72263, 72298, 72300, 72362, 72422, 72452, 72479, 72481, 72513, 72536, 72568, 72571, 72580, 72638, 72654, 72717, 72780, 72803, 72839, 72855, 72858, 72886, 72908, 72999, 73022, 73027, 73030, 73072, 73107, 73152, 73154, 73190, 73199, 73231, 73261, 73301, 73399, 73453, 73477, 73510, 73531, 73536, 73561, 73565, 73574, 73607, 73645, 73709, 73714, 73752, 73777, 73784, 73787, 73790, 73854, 73885, 73937, 73962, 73966, 73971, 73980, 74002, 74032, 74034, 74037, 74046, 74088, 74131, 74235, 74244, 74289, 74336, 74400, 74460, 74532, 74554, 74556, 74559, 74601, 74635, 74644, 74704, 74731, 74733, 74736, 74745, 74801, 74846, 74848, 74862, 74914, 74947, 74956, 75002, 75004, 75007, 75010, 75019, 75062, 75064, 75067, 75072, 75081, 75128, 75135, 75138, 75143, 75172, 75240, 75301, 75369, 75376, 75379, 75383, 75385, 75387, 75418, 75447, 75449, 75492, 75544, 75600, 75654, 75715, 75730, 75732, 75793, 75849, 75907, 75964, 75976, 75997, 75999, 76025, 76048, 76074, 76077, 76127, 76163, 76215, 76267, 76269, 76293, 76295, 76354, 76415, 76478, 76500, 76515, 76550, 76565, 76585, 76642, 76701, 76761, 76823, 76882, 76944, 76990, 76992, 77050, 77110, 77142, 77163, 77165, 77195, 77218, 77232, 77242, 77304, 77319, 77346, 77386, 77428, 77475, 77541, 77601, 77639, 77642, 77653, 77694, 77754, 77792, 77795, 77799, 77855, 77911, 77962, 78020, 78078, 78136, 78160, 78214, 78278, 78338, 78376, 78381, 78404, 78432, 78435, 78438, 78443, 78489, 78549, 78568, 78635, 78647, 78677, 78680, 78683, 78688, 78691, 78693, 78718, 78746, 78748, 78811, 78872, 78932, 78965, 78980, 79015, 79030, 79050, 79052, 79111, 79171, 79232, 79245, 79247, 79307, 79366, 79402, 79427, 79429, 79463, 79486, 79500, 79510, 79572, 79633, 79695, 79755, 79787, 79841, 79888, 79954, 79986, 80001, 80029, 80070, 80112, 80188, 80254, 80322, 80360, 80363, 80374, 80447, 80515, 80553, 80556, 80560, 80612, 80644, 80678, 80684, 80748, 80782, 80827, 80872, 80918, 80968, 81025, 81030, 81117, 81120, 81123, 81126, 81132, 81137, 81171, 81174, 81179, 81229, 81296, 81315, 81382, 81440, 81502, 81567, 81630, 81653, 81693, 81761, 81803, 81806, 81863, 81876, 81943, 81946, 81951, 81964, 82031, 82034, 82039, 82042, 82047, 82050, 82052, 82081, 82109, 82167, 82224, 82274, 82303, 82305, 82315, 82389, 82445, 82515, 82559, 82633, 82674, 82740, 82805, 82840, 82843, 82847, 82859, 82878, 82898, 82914, 82935, 82957, 82974, 83000, 83006, 83027, 83048, 83067, 83084, 83105, 83129, 83168, 83189, 83235, 83243, 83251, 83258, 83278, 83298, 83318, 83338, 83357, 83376, 83395, 83417, 83439, 83468, 83494, 83525, 83531, 83556, 83563, 83579, 83598, 83605, 83621, 83640, 83647, 83663, 83689, 83709, 83736, 83758, 83766, 83773, 83795, 83822, 83850, 83857, 83929, 83947, 83983, 84006, 84031, 84061, 84069, 84095, 84125, 84133, 84140, 84164, 84218, 84246, 84278, 84333, 84362, 84387, 84443, 84472, 84530, 84560, 84578, 84601, 84608, 84625, 84647, 84654, 84672, 84693, 84700, 84769, 84797, 84848, 84860, 84889, 84914, 84978, 84990, 85035, 85037, 85051, 85073, 85110, 85125, 85127, 85133, 85170, 85177, 85210, 85238, 85274, 85316, 85361, 85406, 85446, 85487, 85533, 85575, 85629, 85704, 85751, 85802, 85852, 85922, 85985, 86048, 86087, 86091, 86121, 86152, 86180, 86189, 86199, 86238, 86242, 86272, 86303, 86331, 86340, 86350, 86389, 86439, 86443, 86547, 86583, 86593, 86656, 86660, 86665, 86677, 86711, 86715, 86718, 86752, 86792, 86802, 86842, 86905, 86909, 86914, 86926, 86962, 86996, 87000, 87003, 87039, 87049, 87127, 87131, 87136, 87146, 87221, 87225, 87228, 87240, 87280, 87321, 87390, 87460, 87535, 87609, 87677, 87746, 87825, 87901, 87973, 88051, 88125, 88197, 88201, 88231, 88233, 88249, 88262, 88282, 88310, 88338, 88357, 88377, 88398, 88405, 88460, 88520, 88590, 88650, 88677, 88679, 88722, 88724, 88728, 88744, 88765, 88803, 88833, 88836, 88841, 88853, 88887, 88921, 88931, 88933, 88935, 88973, 89015, 89041, 89081, 89158, 89174, 89228, 89304, 89328, 89350, 89417, 89473, 89503, 89545, 89609, 89639, 89676, 89694, 89780, 89837, 89870, 89925, 89946, 89974, 89992, 90052, 90067, 90071, 90081, 90094, 90142, 90204, 90247, 90279, 90305, 90309, 90321, 90381, 90418, 90485, 90528, 90595, 90656, 90678, 90699, 90703, 90720, 90728, 90740, 90742, 90751, 90799, 90801, 90811, 90813, 90863, 90865, 90875, 90877, 90879, 90883, 90886, 90891, 90903, 90924, 90954, 90984, 91030, 91076, 91131, 91186, 91197, 91224, 91226, 91284, 91286, 91323, 91325, 91372, 91400, 91402, 91461, 91463, 91516, 91518, 91523, 91579, 91589, 91591, 91657, 91659, 91700, 91702, 91753, 91785, 91787, 91850, 91852, 91909, 91911, 91916, 91976, 91986, 91988, 92052, 92054, 92094, 92096, 92146, 92177, 92179, 92241, 92243, 92299, 92301, 92306, 92365, 92375, 92377, 92446, 92448, 92513, 92572, 92632, 92691, 92754, 92817, 92878, 92912, 92915, 92970, 93005, 93007, 93027, 93067, 93069, 93096, 93194, 93224, 93226, 93322, 93324, 93328, 93345, 93353, 93365, 93428, 93500, 93516, 93518, 93548, 93650, 93662, 93664, 93677, 93681, 93684, 93687, 93699, 93730, 93790, 93794, 93797, 93802, 93814, 93816, 93823, 93844, 93846, 93879, 93887, 93918, 93928, 93930, 93937, 93966, 93968, 94032, 94048, 94050, 94063, 94092, 94094, 94112, 94153, 94203, 94260, 94271, 94278, 94311, 94341, 94358, 94371, 94373, 94377, 94413, 94415, 94431, 94484, 94530, 94555, 94565, 94593, 94642, 94652, 94657, 94667, 94669, 94673, 94708, 94710, 94724, 94740, 94792, 94838, 94863, 94873, 94900, 94902, 94965, 94967, 94980, 94982, 95036, 95092, 95154, 95157, 95164, 95202, 95204, 95223, 95238, 95258, 95289, 95315, 95328, 95347, 95399, 95454, 95499, 95512, 95533, 95574, 95637, 95639, 95672, 95708, 95728, 95749, 95751, 95756, 95758, 95765, 95800, 95802, 95835, 95871, 95891, 95912, 95914, 95955, 95957, 95964, 95991, 96006, 96008, 96023, 96030, 96032, 96048, 96050, 96080, 96116, 96134, 96136, 96167, 96169, 96184, 96198, 96219, 96247, 96254, 96269, 96304, 96320, 96322, 96358, 96396, 96424, 96448, 96462, 96514, 96550, 96578, 96623, 96625, 96630, 96632, 96646, 96696, 96728, 96754, 96797, 96799, 96835, 96855, 96876, 96878, 96880, 96919, 96921, 96974, 97012, 97040, 97064, 97130, 97166, 97194, 97239, 97275, 97295, 97316, 97329, 97331, 97338, 97376, 97378, 97394, 97421, 97427, 97449, 97464, 97505, 97514, 97536, 97583, 97585, 97655, 97671, 97706, 97708, 97738, 97740, 97758, 97765, 97767, 97813, 97859, 97914, 97919, 97972, 97974, 98008, 98015, 98017, 98028, 98030, 98035, 98037, 98070, 98135, 98137, 98139, 98161, 98180, 98182, 98209, 98211, 98252, 98275, 98277, 98334, 98336, 98367, 98374, 98376, 98383, 98422, 98424, 98444, 98466, 98488, 98508, 98531, 98550, 98552, 98573, 98601, 98614, 98616, 98628, 98630, 98642, 98692, 98725, 98727, 98777, 98809, 98834, 98856, 98876, 98878, 98883, 98919, 98921, 98933, 98957, 99009, 99022, 99024, 99029, 99077, 99079, 99141, 99167, 99197, 99199, 99218, 99278, 99307, 99330, 99336, 99386, 99419, 99456, 99490, 99492, 99505, 99507, 99514, 99516, 99518, 99525, 99593, 99595, 99612, 99643, 99645, 99687, 99715, 99773, 99785, 99787, 99819, 99861, 99863, 99868, 99870, 99895, 99937, 99939, 99941, 99946, 99948, 99975, 99977, 99995, 99997, 100001, 100066, 100068, 100083, 100092, 100111, 100121, 100149, 100157, 100167, 100191, 100229, 100258, 100287, 100312, 100322, 100324, 100329, 100370, 100372, 100391, 100411, 100462, 100464, 100478, 100493, 100551, 100553, 100578, 100592, 100607, 100609, 100614, 100659, 100661, 100680, 100700, 100724, 100775, 100777, 100791, 100806, 100868, 100870, 100923, 100952, 100971, 100985, 101000, 101002, 101007, 101051, 101053, 101072, 101092, 101116, 101167, 101169, 101183, 101198, 101259, 101261, 101314, 101343, 101362, 101376, 101391, 101393, 101398, 101455, 101457, 101541, 101567, 101597, 101635, 101637, 101696, 101756, 101786, 101867, 101869, 101894, 101896, 101925, 101944, 101946, 101948, 101953, 102010, 102012, 102096, 102122, 102152, 102190, 102192, 102251, 102280, 102299, 102301, 102303, 102307, 102309, 102342, 102366, 102384, 102386, 102397, 102411, 102471, 102530, 102589, 102651, 102688, 102709, 102779, 102842, 102904, 102968, 103037, 103057, 103060, 103063, 103083, 103086, 103091, 103112, 103138, 103162, 103187, 103202, 103218, 103237, 103257, 103270, 103287, 103296, 103309, 103325, 103339, 103354, 103376, 103393, 103421, 103438, 103447, 103459, 103469, 103487, 103503, 103525, 103536, 103545, 103553, 103563, 103577, 103583, 103600, 103622, 103644, 103655, 103661, 103670, 103679, 103686, 103694, 103706, 103718, 103733, 103740, 103756, 103767, 103803, 103832, 103894, 103902, 103905, 103918, 103927, 103966, 104024, 104042, 104048, 104051, 104097, 104110, 104123, 104196, 104271, 104274, 104311, 104343, 104346, 104369, 104372, 104381, 104441, 104473, 104476, 104501, 104504, 104526, 104586, 104618, 104621, 104644, 104647, 104652, 104674, 104693, 104699, 104702, 104707, 104712, 104768, 104827, 104885, 104911, 104920, 104926, 104953, 104995, 105051, 105106, 105131, 105145, 105153, 105193, 105234, 105237, 105242, 105256, 105276, 105306, 105357, 105398, 105440, 105452, 105455, 105468, 105515, 105522, 105551, 105567, 105586, 105589, 105595, 105604, 105607, 105613, 105648, 105659, 105723, 105734, 105739, 105755, 105774, 105777, 105783, 105792, 105795, 105798, 105830, 105854, 105859, 105889, 105892, 105898, 105907, 105910, 105915, 105918, 105927, 105949, 105966, 106023, 106029, 106038, 106041, 106056, 106084, 106090, 106099, 106102, 106113, 106127, 106140, 106160, 106188, 106250, 106253, 106258, 106261, 106266, 106272, 106281, 106284, 106297, 106320, 106326, 106335, 106338, 106350, 106374, 106388, 106398, 106427, 106430, 106458, 106467, 106498, 106551, 106587, 106599, 106615, 106635, 106654, 106682, 106711, 106740, 106776, 106834, 106837, 106879, 106906, 106934, 106970, 107021, 107051, 107083, 107157, 107188, 107194, 107203, 107208, 107271, 107287, 107290, 107293, 107336, 107371, 107403, 107440, 107446, 107449, 107465, 107500, 107518, 107521, 107539, 107579, 107630, 107668, 107696, 107743, 107804, 107826, 107829, 107834, 107878, 107922, 107951, 107998, 108001, 108006, 108046, 108068, 108110, 108137, 108165, 108182, 108224, 108262, 108297, 108344, 108349, 108406, 108409, 108412, 108417, 108422, 108480, 108483, 108497, 108503, 108512, 108515, 108531, 108559, 108565, 108574, 108577, 108586, 108601 ] }
{ "red_pajama_v2": { "ccnet_original_length": 108601, "ccnet_original_nlines": 3799, "rps_doc_curly_bracket": 0.00507362000644207, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.18453280627727509, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.04575575143098831, "rps_doc_frac_lines_end_with_ellipsis": 0.005789469927549362, "rps_doc_frac_no_alph_words": 0.4334843158721924, "rps_doc_frac_unique_words": 0.1851262003183365, "rps_doc_mean_word_length": 5.96870756149292, "rps_doc_num_sentences": 743, "rps_doc_symbol_to_word_ratio": 0.036277469247579575, "rps_doc_unigram_entropy": 6.525501728057861, "rps_doc_word_count": 12559, "rps_doc_frac_chars_dupe_10grams": 0.12866690754890442, "rps_doc_frac_chars_dupe_5grams": 0.23783034086227417, "rps_doc_frac_chars_dupe_6grams": 0.19133949279785156, "rps_doc_frac_chars_dupe_7grams": 0.16994169354438782, "rps_doc_frac_chars_dupe_8grams": 0.15279945731163025, "rps_doc_frac_chars_dupe_9grams": 0.14080655574798584, "rps_doc_frac_chars_top_2gram": 0.010885659605264664, "rps_doc_frac_chars_top_3gram": 0.004482329823076725, "rps_doc_frac_chars_top_4gram": 0.002454610075801611, "rps_doc_books_importance": -11332.3369140625, "rps_doc_books_importance_length_correction": -11332.3369140625, "rps_doc_openwebtext_importance": -5594.3857421875, "rps_doc_openwebtext_importance_length_correction": -5594.3857421875, "rps_doc_wikipedia_importance": -4309.1845703125, "rps_doc_wikipedia_importance_length_correction": -4309.1845703125 }, "fasttext": { "dclm": 0.46701931953430176, "english": 0.4658498466014862, "fineweb_edu_approx": 2.3206005096435547, "eai_general_math": 0.9269723892211914, "eai_open_web_math": 0.38457220792770386, "eai_web_code": 0.8602480888366699 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.02", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "4", "label": "Code/Software" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "22", "label": "Truncated" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
2,079,188,625,080,064,300
Chapter 2. Installing VoltDB Documentation VoltDB Home » Documentation » Using VoltDB Chapter 2. Installing VoltDB VoltDB is available in both an open source and an enterprise edition. The open source, or community, edition provides basic database functionality with all the transactional performance benefits of VoltDB. The enterprise edition provides additional features needed to support production environments, such as high availability, durability, and dynamic scaling and schema management. Depending on which version you choose, the VoltDB software comes as either pre-built distributions or as source code. This chapter explains the system requirements for running VoltDB, how to install and upgrade the software, and what resources are provided in the kit. 2.1. Operating System and Software Requirements The following are the requirements for developing and running VoltDB applications. Table 2.1. Operating System and Software Requirements Operating System VoltDB requires a 64-bit Linux-based operating system. Kits are built and qualified on the following platforms: • CentOS version 6.3 or later, including 7.0 • Red Hat (RHEL) version 6.3 or later, including 7.0 • Ubuntu versions 10.042, 12.04, and 14.04 Development builds are also available for Macintosh OS X 10.7 and later1. CPU • Dual core3 x86_64 processor • 64 bit • 1.6 GHz Memory4 Gbytes4 Java Java 7 or 8 — VoltDB supports JDKs from OpenJDK or Oracle/Sun Required Software NTP5 Python 2.5 or later release of 2.x Recommended Software Eclipse 3.x (or other Java IDE) Footnotes: 1. CentOS 6.3, CentOS 7.0, RHEL 6.3, RHEL 7.0, and Ubuntu 10.04, 12.04, and 14.04 are the only officially supported operating systems for VoltDB. However, VoltDB is tested on several other POSIX-compliant and Linux-based 64-bit operating systems, including Macintosh OS X 10.7. 2. Support for Ubuntu 10.04 is deprecated and will be removed in an upcoming release. 3. Dual core processors are a minimum requirement. Four or eight physical cores are recommended for optimal performance. 4. Memory requirements are very specific to the storage needs of the application and the number of nodes in the cluster. However, 4 Gigabytes should be considered a minimum configuration. 5. NTP minimizes time differences between nodes in a database cluster, which is critical for VoltDB. All nodes of the cluster should be configured to synchronize against the same NTP server. Using a single local NTP server is recommended, but not required. >
{ "url": "http://docs.voltdb.com/UsingVoltDB/ChapGetStarted.php", "source_domain": "docs.voltdb.com", "snapshot_id": "crawl=CC-MAIN-2014-49", "warc_metadata": { "Content-Length": "10995", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:MKW7P5MOMTTXEXQVPUZR6SBY24BXQP2D", "WARC-Concurrent-To": "<urn:uuid:27e1a722-9fbb-4ec1-b20c-85e4667f693d>", "WARC-Date": "2014-11-29T05:00:47Z", "WARC-IP-Address": "69.164.223.203", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:WU2REBVA46HMKBBKC74HILE5AGSZIDGV", "WARC-Record-ID": "<urn:uuid:2f3d295d-2b09-4057-91c9-12a3e47539eb>", "WARC-Target-URI": "http://docs.voltdb.com/UsingVoltDB/ChapGetStarted.php", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:75b5d2e3-d387-4613-8bf4-babee9841aee>" }, "warc_info": "robots: classic\r\nhostname: ip-10-235-23-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-49\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for November 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 29, 30, 44, 45, 88, 89, 118, 119, 502, 503, 772, 773, 821, 822, 905, 906, 960, 961, 978, 979, 1091, 1092, 1139, 1140, 1195, 1196, 1241, 1242, 1316, 1320, 1352, 1353, 1364, 1365, 1377, 1378, 1394, 1399, 1400, 1462, 1463, 1481, 1482, 1487, 1488, 1523, 1524, 1545, 1546, 1578, 1579, 1590, 1591, 1871, 1872, 1960, 1961, 2084, 2085, 2275, 2276, 2535, 2536, 2537 ], "line_end_idx": [ 29, 30, 44, 45, 88, 89, 118, 119, 502, 503, 772, 773, 821, 822, 905, 906, 960, 961, 978, 979, 1091, 1092, 1139, 1140, 1195, 1196, 1241, 1242, 1316, 1320, 1352, 1353, 1364, 1365, 1377, 1378, 1394, 1399, 1400, 1462, 1463, 1481, 1482, 1487, 1488, 1523, 1524, 1545, 1546, 1578, 1579, 1590, 1591, 1871, 1872, 1960, 1961, 2084, 2085, 2275, 2276, 2535, 2536, 2537, 2538 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2538, "ccnet_original_nlines": 64, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.2585170269012451, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.028056109324097633, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.3066132366657257, "rps_doc_frac_unique_words": 0.5130890011787415, "rps_doc_mean_word_length": 5.274868965148926, "rps_doc_num_sentences": 50, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.930194854736328, "rps_doc_word_count": 382, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.06749379634857178, "rps_doc_frac_chars_dupe_6grams": 0.06749379634857178, "rps_doc_frac_chars_dupe_7grams": 0.02779155969619751, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.029776670038700104, "rps_doc_frac_chars_top_3gram": 0.017866000533103943, "rps_doc_frac_chars_top_4gram": 0.02382134087383747, "rps_doc_books_importance": -270.24176025390625, "rps_doc_books_importance_length_correction": -270.24176025390625, "rps_doc_openwebtext_importance": -159.72952270507812, "rps_doc_openwebtext_importance_length_correction": -159.72952270507812, "rps_doc_wikipedia_importance": -119.63556671142578, "rps_doc_wikipedia_importance_length_correction": -119.63556671142578 }, "fasttext": { "dclm": 0.02393043041229248, "english": 0.8701589703559875, "fineweb_edu_approx": 2.043771266937256, "eai_general_math": 0.31927967071533203, "eai_open_web_math": 0.13319534063339233, "eai_web_code": 0.45622819662094116 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.44", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.678", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "1", "label": "Factual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
2,407,112,402,467,193,000
Take the 2-minute tour × Server Fault is a question and answer site for professional system and network administrators. It's 100% free, no registration required. I have a Redhat 6.0 system (SELinux enabled), with a NFS volume mounted at /myvolume. The command ls -la /myvolume says it has owner "nobody" and group "nobody". On this system I have Apache running as "apache" user and "apache" group. Apache runs a python script through mod_wsgi. This script creates a temporary directory (using tempfile.mkdtemp), creates some files in it and then moves the whole directory inside /myvolume. After the script has done its thing, the files it created have owner "nodody" and group "nobody" and permission mask is "rwx------" for all of them. I've verified that my own user can't access those files unless I use "sudo", while apache user can access them. Why does this happens? Is something related to SELinux, Unix permissions, NFS volumes or nodoby user? Why trying to "chown" any file in /myvolume gives an "invalid argument" error? share|improve this question migrated from stackoverflow.com Oct 14 '11 at 15:32 This question came from our site for professional and enthusiast programmers. add comment 1 Answer up vote 0 down vote accepted It's related to nfs. http://tldp.org/HOWTO/NFS-HOWTO/server.html states the following : "no_root_squash: By default, any file request made by user root on the client machine is treated as if it is made by user nobody on the server. (Excatly which UID the request is mapped to depends on the UID of user "nobody" on the server, not the client.) If no_root_squash is selected, then root on the client machine will have the same level of access to the files on the system as root on the server. This can have serious security implications, although it may be necessary if you want to perform any administrative work on the client machine that involves the exported directories. You should not specify this option without a good reason. " Activating no_root_squash on the nfs server is not recommended. I quoted this option for documentation purpose only. One solution is to create a user and a group, both on the nfs client and the nfs server with the same uid and gid. Then configure apache to execute your script with this user. share|improve this answer add comment Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
{ "url": "http://serverfault.com/questions/321511/nfs-volume-file-permissions", "source_domain": "serverfault.com", "snapshot_id": "crawl=CC-MAIN-2014-23", "warc_metadata": { "Content-Length": "64758", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:2ALW3J2M4YA4IFVAPWI5WULX6GQGD5VF", "WARC-Concurrent-To": "<urn:uuid:8e0c3e86-1080-4588-81d9-4d2afd8ea219>", "WARC-Date": "2014-07-14T07:29:47Z", "WARC-IP-Address": "198.252.206.16", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:RWG4BMXHKFHLSQBHQUGW657SUQOFNJT3", "WARC-Record-ID": "<urn:uuid:dbd91da4-790f-47d1-8972-04a8a97308d2>", "WARC-Target-URI": "http://serverfault.com/questions/321511/nfs-volume-file-permissions", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d9e13d5c-a5bd-40e8-bf44-2548488b6820>" }, "warc_info": "robots: classic\r\nhostname: ip-10-180-212-248.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 25, 162, 163, 249, 250, 326, 327, 401, 402, 594, 595, 744, 745, 857, 858, 1039, 1040, 1068, 1069, 1121, 1122, 1200, 1201, 1213, 1214, 1223, 1224, 1253, 1254, 1275, 1276, 1343, 1344, 1991, 1992, 2109, 2110, 2286, 2287, 2313, 2325, 2326, 2338, 2339, 2341, 2349, 2350, 2428, 2429 ], "line_end_idx": [ 25, 162, 163, 249, 250, 326, 327, 401, 402, 594, 595, 744, 745, 857, 858, 1039, 1040, 1068, 1069, 1121, 1122, 1200, 1201, 1213, 1214, 1223, 1224, 1253, 1254, 1275, 1276, 1343, 1344, 1991, 1992, 2109, 2110, 2286, 2287, 2313, 2325, 2326, 2338, 2339, 2341, 2349, 2350, 2428, 2429, 2519 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2519, "ccnet_original_nlines": 49, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3690248727798462, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.022944549098610878, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.19694073498249054, "rps_doc_frac_unique_words": 0.49514561891555786, "rps_doc_mean_word_length": 4.779126167297363, "rps_doc_num_sentences": 31, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.915482521057129, "rps_doc_word_count": 412, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.043676991015672684, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.025393599644303322, "rps_doc_frac_chars_top_3gram": 0.01371254026889801, "rps_doc_frac_chars_top_4gram": 0.027425089851021767, "rps_doc_books_importance": -241.64784240722656, "rps_doc_books_importance_length_correction": -241.64784240722656, "rps_doc_openwebtext_importance": -134.92330932617188, "rps_doc_openwebtext_importance_length_correction": -134.92330932617188, "rps_doc_wikipedia_importance": -81.91693115234375, "rps_doc_wikipedia_importance_length_correction": -81.91693115234375 }, "fasttext": { "dclm": 0.09240139275789261, "english": 0.9120751023292542, "fineweb_edu_approx": 1.299754023551941, "eai_general_math": 0.002392950002104044, "eai_open_web_math": 0.07974368333816528, "eai_web_code": 0.0009702399838715792 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.445", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.462", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
-3,582,905,332,791,503,000
Processing archives offline? Hi there, I host on a cloud provider, which gives me some flexibility regarding testing database changes and disruptive Piwik changes. I recently looked into upgrading our instance of Piwik and found that the DB upgrade process takes about 6.5 hours to do, which is acceptable for me in that I can do this over night, but it is quite lengthy and it does fail halfway through requring me to manually delete a table before it will continue. I then looked into whether we could turn off ‘trigger from the browser’ and set up auto archiving as we have somewhere just under 1000 tracked websites; I can’t load All Websites in Piwik 1.1.1 as it hits the PHP script timeout limit, and it is suggested to turn this off and run the auto archiver from cron. This script takes about a week to run the first time, and it does fail too, so I wondering if I can get the processing done and then import the tables into the old DB once I have updated it? Thanks in advance, Rick Edit: DB size is 19GB it does fail halfway through requring me to manually delete a table before it will continue. how does it fail? Piwik 1.1.1 upgrade ASAP to 2.0.3 [quote=matt] how does it fail?[/quote] It says that the piwik_report table already exists. Prior to starting the upgrade of the database this table doens’t actually exist in the database. If I rename the table, or delete it, and rerun the upgrader it completes after about another two hours. *** Update *** Database Upgrade Required Your Piwik database is out-of-date, and must be upgraded before you can continue. Piwik database will be upgraded from version 1.1.1 to the new version 2.0.3. The database upgrade process may take a while, so please be patient. [X] Critical Error during the update process: * /home/user/www/piwik/core/Updates/1.8.3-b1.php: Error trying to execute the query 'CREATE TABLE `piwik_report` ( `idreport` INT(11) NOT NULL AUTO_INCREMENT, `idsite` INTEGER(11) NOT NULL, `login` VARCHAR(100) NOT NULL, `description` VARCHAR(255) NOT NULL, `period` VARCHAR(10) NOT NULL, `type` VARCHAR(10) NOT NULL, `format` VARCHAR(10) NOT NULL, `reports` TEXT NOT NULL, `parameters` TEXT NULL, `ts_created` TIMESTAMP NULL, `ts_last_sent` TIMESTAMP NULL, `deleted` tinyint(4) NOT NULL default 0, PRIMARY KEY (`idreport`) ) DEFAULT CHARSET=utf8'. The error was: SQLSTATE[42S01]: Base table or view already exists: 1050 Table 'piwik_report' already exists The above is the core error message. It should help explain the cause, but if you require further help please: * Check the [ Piwik FAQ ] which explains most common errors during update. * Ask your system administrator - they may be able to help you with the error which is most likely related to your server or MySQL setup. If you are an advanced user and encounter an error in the database upgrade: * identify and correct the source of the problem (e.g., memory_limit or max_execution_time) * execute the remaining queries in the update that failed * manually update the `option` table in your Piwik database, setting the value of version_core to the version of the failed update * re-run the updater (through the browser or command-line) to continue with the remaining updates * report the problem (and solution) so that Piwik can be improved I’m trying, however, I’m also trying to keep the amount of disruption to a minimum. I will be upgrading directly to 2.0.3 or whatever version is in the latest.zip at the time. Edit the file 1.8.3-b1.php and comment out the query from the file, and try again ? I performed the upgrade this weekend just gone. Unfortunately, after getting it to fail at the same point repeatedly, I decided to optimise the DB tables before I ran the upgrade to try to speed things up. Big mistake :frowning: It broke the upgrade at a different point and I ended up running each of the SQL statements manually. Not fun when you’ve got 13m rows in some of the tables and some of the queries take 45 mins :frowning: This will work fine from now on. Just stay up to date every few months :slight_smile:
{ "url": "https://forum.matomo.org/t/processing-archives-offline/11192", "source_domain": "forum.matomo.org", "snapshot_id": "CC-MAIN-2024-30", "warc_metadata": { "Content-Length": "27911", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:HY4ETM6NSGSYDZP3BRREEE2Z5AN5AAZL", "WARC-Concurrent-To": "<urn:uuid:0327ae09-45ef-4134-a7a7-4a358a6a625a>", "WARC-Date": "2024-07-14T19:18:25Z", "WARC-IP-Address": "134.209.255.149", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:3ZCPPG7BTUBZPUEDC7SEB36Z3SP5MJWO", "WARC-Record-ID": "<urn:uuid:e3355b91-4023-4c6d-a2fa-dbefc218fc61>", "WARC-Target-URI": "https://forum.matomo.org/t/processing-archives-offline/11192", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:42bb5b4b-0d23-4472-b92f-0d31b0117b2b>" }, "warc_info": "isPartOf: CC-MAIN-2024-30\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-161\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 29, 30, 40, 41, 166, 167, 471, 472, 972, 973, 992, 993, 998, 999, 1021, 1022, 1115, 1116, 1134, 1135, 1147, 1148, 1170, 1171, 1184, 1210, 1211, 1464, 1465, 1466, 1481, 1482, 1512, 1513, 1599, 1600, 1689, 1690, 1691, 1764, 1765, 1815, 1816, 1874, 1939, 2023, 2094, 2165, 2242, 2313, 2382, 2453, 2518, 2582, 2651, 2722, 2803, 2868, 2925, 3033, 3034, 3149, 3150, 3229, 3230, 3372, 3373, 3453, 3549, 3611, 3746, 3848, 3918, 3919, 3920, 4096, 4097, 4181, 4182, 4388, 4389, 4617, 4618 ], "line_end_idx": [ 29, 30, 40, 41, 166, 167, 471, 472, 972, 973, 992, 993, 998, 999, 1021, 1022, 1115, 1116, 1134, 1135, 1147, 1148, 1170, 1171, 1184, 1210, 1211, 1464, 1465, 1466, 1481, 1482, 1512, 1513, 1599, 1600, 1689, 1690, 1691, 1764, 1765, 1815, 1816, 1874, 1939, 2023, 2094, 2165, 2242, 2313, 2382, 2453, 2518, 2582, 2651, 2722, 2803, 2868, 2925, 3033, 3034, 3149, 3150, 3229, 3230, 3372, 3373, 3453, 3549, 3611, 3746, 3848, 3918, 3919, 3920, 4096, 4097, 4181, 4182, 4388, 4389, 4617, 4618, 4703 ] }
{ "red_pajama_v2": { "ccnet_original_length": 4703, "ccnet_original_nlines": 83, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3582417666912079, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.07362636923789978, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.25164833664894104, "rps_doc_frac_unique_words": 0.45889386534690857, "rps_doc_mean_word_length": 4.717488765716553, "rps_doc_num_sentences": 48, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.179520606994629, "rps_doc_word_count": 669, "rps_doc_frac_chars_dupe_10grams": 0.04816222935914993, "rps_doc_frac_chars_dupe_5grams": 0.04816222935914993, "rps_doc_frac_chars_dupe_6grams": 0.04816222935914993, "rps_doc_frac_chars_dupe_7grams": 0.04816222935914993, "rps_doc_frac_chars_dupe_8grams": 0.04816222935914993, "rps_doc_frac_chars_dupe_9grams": 0.04816222935914993, "rps_doc_frac_chars_top_2gram": 0.019961979240179062, "rps_doc_frac_chars_top_3gram": 0.009505700320005417, "rps_doc_frac_chars_top_4gram": 0.008238280192017555, "rps_doc_books_importance": -438.2400817871094, "rps_doc_books_importance_length_correction": -438.2400817871094, "rps_doc_openwebtext_importance": -277.2380676269531, "rps_doc_openwebtext_importance_length_correction": -277.2380676269531, "rps_doc_wikipedia_importance": -188.00021362304688, "rps_doc_wikipedia_importance_length_correction": -188.00021362304688 }, "fasttext": { "dclm": 0.08510690927505493, "english": 0.8953334093093872, "fineweb_edu_approx": 1.160427451133728, "eai_general_math": 0.5602309107780457, "eai_open_web_math": 0.2828596234321594, "eai_web_code": 0.8059254884719849 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.44", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.776", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-3,200,415,487,453,806,000
How to Deliver the Fastest and Most Secure VPN Service Secure network concept. Isometric 3D render. In the last decade, the Virtual Private Network (VPN) grew from a niche product for businesses into a global consumer service. Propelled by ubiquitous WiFi, constant connectivity, P2P, and increasing awareness of data privacy issues among the general public, the VPN is no longer an arcane piece of networking technology, but a tool many regard as essential to their online safety and enjoyment. VPNs are easier to use, less expensive, and more in demand than ever before. The VPN market, illustrated below,  is expected to be worth around $35 billion by 2022, more than doubling in size since 2016. Existing VPN giants such as PureVPN are expanding rapidly to meet demand, but the VPN market is not without its challenges. A global VPN depends on a vast network of servers located in data centers around the world. Leasing and managing reliable servers in secure data centers with low-latency high-volume network connections in thousands of locations is a logistical challenge.  In this article, we’re going to look at what it takes to build a fast and secure VPN service, with a particular focus on server hosting, networks, and data center location. Why VPN Provider Security Is So Important The biggest challenges faced by VPN providers are security and privacy. VPN customers are sensitive to any indication that a VPN provider doesn’t take security seriously. Consequently, the best VPN providers are committed to providing rock-solid security and privacy – their business depends on it. But they are also faced with the constant threat of cybercrime and data theft, DDoS attacks, infiltration by state actors, and the challenges of managing the security of thousands of servers in data centers across the world. And it’s not only malicious users, criminals, and state actors that VPN providers have to guard against. The VPN industry is extremely competitive, and it’s not uncommon for malicious VPN businesses to deliberately DDoS or otherwise attack their competitors. Data leaks and security breaches are hugely damaging. VPN users are security conscious. They use a VPN to protect their network traffic from the scrutiny of malicious third-parties. If the provider’s endpoints aren’t adequately secured and private data is exposed, customers will quickly move to a competitor. Earlier this year, a major VPN provider got into hot water when their hosting provider let them down. The hosting provider noticed that a VPN server under their management had been compromised via a remote management tool. The host installed the tool without the knowledge of the VPN provider. Instead of informing the VPN provider, the host deleted the affected accounts and kept quiet about the breach for over a year. The VPN provider did nothing wrong other than to rely on a server hosting provider that turned out to be unreliable. When you entrust sensitive customer data to a hosting provider, make sure you’re confident that they operate honestly, transparently, and in the best interests of their clients. “PureVPN has servers in 50+ countries, and I can legitimately say that ServerMania stands out. Everything from the support to the network is 5-star. ServerMania has added real value for our clients in over 120 countries worldwide.” CEO PureVPN Key Components of a Secure VPN Server The most important parts of a VPN service that users can trust are: • VPN servers and clients that use the most secure VPN protocols. Today, the best balance between security and performance is provided by the OpenVPN and IKEv2/IPSec protocols. Older protocols such as the Point-to-Point Tunneling Protocol (PPTP) are faster but largely obsolete. They should only be used in applications such as gaming when the customer is aware of the security tradeoff. • A server hosting provider with a proven track record of security expertise, transparency, and honesty. VPN providers put as much trust in their server host as VPN customers put in the provider. A comprehensive support agreement that includes security updates and security monitoring can also reduce the risk of security compromises – it’s challenging for VPN providers to remotely manage hundreds or thousands of servers spread across the globe. • DNS servers owned and managed by the VPN service. Customers who use external DNS servers are at risk of DNS leaks, which may expose details of visited sites to third-parties even when using a VPN. Additionally, because VPN servers are frequently the focus of Distributed Denial of Service attacks, VPN providers should consider hosting providers who also offer DDoS mitigation. Building A Global Network When choosing a hosting provider for your VPN servers, their network is the most important consideration. VPN providers should look for a server hosting provider that can offer: • High-volume data transfer at affordable prices. • A diverse array of IP addresses. • Multiple locations with consistent service. Let’s take a closer look at these factors in turn. Low-cost, high-volume data transfer Data transfer is one of the most significant costs associated with running a VPN service. They often exceed hardware costs. VPN providers are expected to handle large P2P and streaming media transfers flawlessly, and it can be challenging for them to find bandwidth providers with cost-efficient price structures. Server hosting providers offer bandwidth packages tailored to specific markets. A host set up for websites and ecommerce stores is unlikely to offer the best value for money to a VPN provider. Many hosting providers don’t have the infrastructure to cope with consistent high-volume data transfers without degrading performance for their other customers. VPN providers need a hosting provider with plans explicitly designed to suit high-volume data transfer, particularly those that offer unmetered connectivity priced with high-volume customers in mind. Diverse IP addresses VPN providers rely on the availability of a diverse range of IP addresses. Many online services – including video streaming services such as Netflix – block connections from the IPs of known VPN endpoints or even blocks of related IPs suspected of being used for VPNs. Additionally, premium VPN providers may want to offer their customers value-added services such as fixed IP VPNs. But IP addresses are a limited resource. Many server hosting providers cannot offer the large array of IP addresses in diverse blocks that VPN providers require to offer consistent service to their customers. ServerMania can acquire large and diverse blocks of IPs for our VPN provider clients. Route-optimized connectivity Network latency can be introduced if data moves over congested, excessively long, or poorly optimized network routes. Ideally, VPN users benefit from low-latency connections to and from the server and from the server to the internet. The data center that hosts the server has a significant impact. Higher-quality data centers offer connectivity to multiple large-scale and backbone Tier 1 bandwidth providers that can move a lot of data quickly without routing it through numerous smaller providers. Multiple locations Finally, let’s talk about location. VPNs exist, in part, to allow users to obscure their location on the network. VPN providers serve customers in every country in the world, and they all expect low-latency, high-bandwidth connectivity. One way to achieve geographical diversity is to use the services of multiple hosting providers – perhaps hundreds. Another is to use a smaller number of premium providers who offer everything the VPN provider requires, in multiple locations. There are advantages and disadvantages to both approaches, but a single host with diverse locations offers many benefits: the VPN provider can build a trusted relationship, the host may be prepared to offer bespoke pricing and hardware options, the VPN provider can rely on consistent performance and support across all of their locations. Dedicated Servers Provide Better VPN Performance A fast and reliable network connection is essential, but for smooth streaming and uninterrupted data delivery, the performance of the server is just as important. A server with a fully utilized high-bandwidth network connection will consume a significant amount of processor and memory resources. The throughput, encryption, and decryption of gigabytes of data from hundreds of connections each minute demands substantial processing power. If the server hits the limits of its processing power, the result is increased latency for customers and possibly even dropped connections. A modern server-grade CPU with built-in encryption acceleration hardware should be able to handle this type of load without serious issues. However, VPN providers will see better results with dedicated servers than with cloud servers. Cloud servers are inherently unpredictable: the provider may throttle CPU resources, and there is often contention for those resources from multiple virtual machines. See Also: ServerMania vs. AWS and Google Cloud: How Do We Compare? With a dedicated server, all of the resources of its enterprise-grade hardware are put to work, ensuring the fastest possible data throughput and the lowest possible latencies – factors that are particularly important for low-latency P2P and double-encryption VPNs where latencies are already relatively high. One area in which VPN servers are inexpensive is storage. VPN servers do not require a large amount of storage, but it can be challenging to find “off-the-shelf” server configurations with powerful CPUs, adequate memory, and small drives. However, the best server hosting providers will be happy to build a custom server that suits the needs of VPN companies. In Summary The single greatest asset of a VPN service is its global network of servers. To fulfill the performance needs of customers, those networks need to be able to provide low-latency high-volume data transfer at a reasonable cost. The servers must be reliable over time and capable of encrypting, decrypting, and managing thousands of connections with minimal latency. Server Mania partners with VPN providers to help them deploy the infrastructure they need to offer consistent, secure, and geographically diverse connectivity. If you would like to learn more, book a consultation with us today. COMPLETE DIGITAL SERVER SOLUTIONS FOR ALL Bare Metal Dedicated Servers A single tenant, physical server allowing you full access to its resources. Browse servers Professional Hybrid Servers Virtualized server platform hosted on enterprise-grade physical servers. Browse servers Scalable Cloud Servers High-performance and highly-available infrastructure. Browse servers Managed Colocation Our next-generation data center facilities. Browse servers Your email address will not be published. There are no comments yet, why not be the first?
{ "url": "https://blog.servermania.com/deliver-the-fastest-vpn-service/", "source_domain": "blog.servermania.com", "snapshot_id": "crawl=CC-MAIN-2022-40", "warc_metadata": { "Content-Length": "90566", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:UI3434IWVUWVSGF4WJ5XSFNCPKX7LF5G", "WARC-Concurrent-To": "<urn:uuid:4c576f48-bdc9-49d8-8f8b-32166318f79e>", "WARC-Date": "2022-09-26T23:44:41Z", "WARC-IP-Address": "172.66.43.253", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:3NGDQBHOLU2QDILB3QHIUIZDFATGLFDJ", "WARC-Record-ID": "<urn:uuid:92c7bd59-8d4e-4d06-bada-1419158fed5a>", "WARC-Target-URI": "https://blog.servermania.com/deliver-the-fastest-vpn-service/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:81e116b0-2f6a-46ea-aaee-ad12a5c78c29>" }, "warc_info": "isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-142\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 55, 56, 101, 102, 498, 499, 827, 828, 1083, 1084, 1258, 1259, 1301, 1302, 1601, 1602, 1827, 1828, 2087, 2088, 2398, 2399, 2820, 2821, 3116, 3117, 3349, 3350, 3354, 3355, 3363, 3364, 3402, 3403, 3471, 3472, 3862, 4312, 4513, 4514, 4695, 4696, 4722, 4723, 4829, 4830, 4902, 4903, 4955, 4956, 4993, 4994, 5042, 5043, 5094, 5095, 5131, 5132, 5446, 5447, 5801, 5802, 6002, 6003, 6024, 6025, 6408, 6409, 6618, 6619, 6705, 6706, 6735, 6736, 7034, 7035, 7237, 7238, 7257, 7258, 7495, 7496, 7738, 7739, 8079, 8080, 8129, 8130, 8427, 8428, 8711, 8712, 9114, 9115, 9182, 9183, 9493, 9494, 9854, 9855, 9866, 9867, 10231, 10232, 10460, 10461, 10503, 10504, 10533, 10534, 10610, 10611, 10612, 10627, 10628, 10656, 10657, 10730, 10731, 10732, 10747, 10748, 10771, 10772, 10826, 10827, 10842, 10843, 10862, 10863, 10907, 10908, 10923, 10924, 10966, 10967 ], "line_end_idx": [ 55, 56, 101, 102, 498, 499, 827, 828, 1083, 1084, 1258, 1259, 1301, 1302, 1601, 1602, 1827, 1828, 2087, 2088, 2398, 2399, 2820, 2821, 3116, 3117, 3349, 3350, 3354, 3355, 3363, 3364, 3402, 3403, 3471, 3472, 3862, 4312, 4513, 4514, 4695, 4696, 4722, 4723, 4829, 4830, 4902, 4903, 4955, 4956, 4993, 4994, 5042, 5043, 5094, 5095, 5131, 5132, 5446, 5447, 5801, 5802, 6002, 6003, 6024, 6025, 6408, 6409, 6618, 6619, 6705, 6706, 6735, 6736, 7034, 7035, 7237, 7238, 7257, 7258, 7495, 7496, 7738, 7739, 8079, 8080, 8129, 8130, 8427, 8428, 8711, 8712, 9114, 9115, 9182, 9183, 9493, 9494, 9854, 9855, 9866, 9867, 10231, 10232, 10460, 10461, 10503, 10504, 10533, 10534, 10610, 10611, 10612, 10627, 10628, 10656, 10657, 10730, 10731, 10732, 10747, 10748, 10771, 10772, 10826, 10827, 10842, 10843, 10862, 10863, 10907, 10908, 10923, 10924, 10966, 10967, 11015 ] }
{ "red_pajama_v2": { "ccnet_original_length": 11015, "ccnet_original_nlines": 136, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3529411852359772, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.0466531403362751, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.12525354325771332, "rps_doc_frac_unique_words": 0.3679245412349701, "rps_doc_mean_word_length": 5.320754528045654, "rps_doc_num_sentences": 91, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.584399700164795, "rps_doc_word_count": 1696, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.005762409884482622, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.019946809858083725, "rps_doc_frac_chars_top_3gram": 0.009308510459959507, "rps_doc_frac_chars_top_4gram": 0.007313829846680164, "rps_doc_books_importance": -782.0991821289062, "rps_doc_books_importance_length_correction": -782.0991821289062, "rps_doc_openwebtext_importance": -562.8668212890625, "rps_doc_openwebtext_importance_length_correction": -562.8668212890625, "rps_doc_wikipedia_importance": -452.034423828125, "rps_doc_wikipedia_importance_length_correction": -452.034423828125 }, "fasttext": { "dclm": 0.023525420576334, "english": 0.9382383227348328, "fineweb_edu_approx": 1.8677082061767578, "eai_general_math": 0.03256601095199585, "eai_open_web_math": 0.06810271739959717, "eai_web_code": 0.11817044019699097 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.677", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.72", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "2", "label": "Click Here References" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
7,371,985,347,694,028,000
<![CDATA[FIX red and blue silhouettes problems Bannerlord]]>bannerlodbluesilhouettes.JPG If random blue and red silhouettes appear on the bannerlord campaign map, it is because DLSS is turned on, you can solve this problem by turning DLSS off in the settings. Is there a solution to the DLSS problem? There is no explanation from TaleWorlds on this issue. It is not clear when the problem will be resolved, we will update our topic whenever there is an update. ]]> https://lootzz.com/topic/1495/fix-red-and-blue-silhouettes-problems-bannerlordRSS for NodeSat, 02 Mar 2024 16:17:11 GMTThu, 03 Nov 2022 23:13:07 GMT60
{ "url": "https://lootzz.com/topic/1495.rss", "source_domain": "lootzz.com", "snapshot_id": "CC-MAIN-2024-10", "warc_metadata": { "Content-Length": "2079", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:L7PBXACOQ6ZYKBUW22DA2OG5B23LMXMR", "WARC-Concurrent-To": "<urn:uuid:64798911-8b0e-436c-a94c-ea3772fae72b>", "WARC-Date": "2024-03-02T16:17:11Z", "WARC-IP-Address": "194.31.64.152", "WARC-Identified-Payload-Type": "application/rss+xml", "WARC-Payload-Digest": "sha1:XSW6HSL7GXOGTFX7AUMRDIJNYYIZE5AQ", "WARC-Record-ID": "<urn:uuid:c48575a3-a9ca-495d-96de-d8cf0d9e4aa0>", "WARC-Target-URI": "https://lootzz.com/topic/1495.rss", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:978999d2-be6a-4989-b2b5-c21286e80e19>" }, "warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 89, 90, 261, 262, 303, 304, 464, 465, 469 ], "line_end_idx": [ 89, 90, 261, 262, 303, 304, 464, 465, 469, 619 ] }
{ "red_pajama_v2": { "ccnet_original_length": 619, "ccnet_original_nlines": 9, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.31111112236976624, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.051851850003004074, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.29629629850387573, "rps_doc_frac_unique_words": 0.7272727489471436, "rps_doc_mean_word_length": 5.568181991577148, "rps_doc_num_sentences": 7, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.016320705413818, "rps_doc_word_count": 88, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.016326529905200005, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -61.48162841796875, "rps_doc_books_importance_length_correction": -74.11846923828125, "rps_doc_openwebtext_importance": -36.84864807128906, "rps_doc_openwebtext_importance_length_correction": -49.48548889160156, "rps_doc_wikipedia_importance": -31.27076530456543, "rps_doc_wikipedia_importance_length_correction": -43.9076042175293 }, "fasttext": { "dclm": 0.026213770732283592, "english": 0.7890391945838928, "fineweb_edu_approx": 1.1455700397491455, "eai_general_math": 0.7055203318595886, "eai_open_web_math": 0.4856383800506592, "eai_web_code": 0.01150589995086193 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.67", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "1", "label": "Factual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "1", "label": "Leftover HTML" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "1", "label": "No Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "6", "label": "Not Applicable/Indeterminate" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
4,410,325,757,082,078,700
Just how can Sleep-Associated Health problems Affect Practical Reputation Based on Sex? Just how can Sleep-Associated Health problems Affect Practical Reputation Based on Sex? Methods: An excellent retrospective clinical audit away from 744 Australian customers across seven private standard methods between is used. Patients completed an electronic digital survey as an element of its regime visit, which included the fresh new Epworth Sleepiness Scale (ESS), the functional Outcomes of Sleep Questionnaire 10 (FOSQ-10), and other questions regarding the end result of the sleep situation. Brand new ratio of men and you will females with ESS and you may FOSQ-ten scores with the issues away from daytime sleepiness and load from periods because of drowsiness, correspondingly, was basically opposed, as well as said differences between the latest men and women during the memories, amount, difficulties with relationship, impact disheartened, and you can sleep disorders. Results: On presentation, females were more likely to have sleeping disorders associated with daytime sleepiness (median ESS score of 9 for females versus 8 for males, P = .038; proportion ESS > 9 was 49.0% for females versus 36.9% for males, P = .003). Women were also more likely to report an increased burden of symptoms due to sleepiness compared to men, as shown by lower FOSQ-10 scores (P < .001). Secondary outcome measures showed that females were more likely to feel excessively tired and depressed, have difficulties with memory and concentration, and have trouble sleeping at night. Snoring kept partners awake in roughly the same proportion of males and females, and a larger proportion of the partners of males were forced out of the room. Conclusions: Sleep-relevant illnesses both reveal inside and you will impact the lifetime out of men and women in different ways. Sleep medical researchers is to recognize such variations with the all of the amounts of condition avoidance and you can fitness promotion regarding patient education, so you can medical diagnosis and you may government to evolve quality of life of these having sleep-relevant health issues. Citation: Boccabella A great, Malouf J. Just how can sleep-related illnesses apply at practical standing predicated on sex? J Clin Bed Med. 2017;13(5):685–692. Inclusion Trouble sleeping notably apply at an effective person’s health insurance and really-are. Sleep-associated issues and you can sleep disorders can lead to too-much day drowsiness, connect with state of mind and you may concentration, improve likelihood of automobile crashes, and you will protect against your ability to work effectively and you can safely. step 1 –step three Sleep disorders may also lead to a selection of neurological, aerobic, and mental health trouble. step 1 Obstructive snore (OSA), the most common insomnia, is with the blood you can try here pressure, cardiovascular illnesses, and you can stroke. step one –cuatro Yet not, trouble sleeping do not entirely impact the diligent in addition to their fitness. Those who anti snoring often interrupt the partner’s bed, resulting in dating issues and closeness dilemmas. As well as extreme private and social weight, these things sign up to a boost in medical care capital utilization. 5 A big body off facts implies that trouble sleeping, including OSA, manifest in a different way into the males and females. step three,4,six These variations occur most notably regarding the incidence, pathophysiology, cues, attacks, and you will severity of the state. 3,6 Snoring incidence expands for ladies inside later on existence, such just after menopause. eight The reasons having like distinctions are argued, but are related to hormonal impacts, anatomical and you can emotional variations in the top airway, some other breathing auto mechanics, and the entire body pounds shipments. 4,six,8 Temporary Conclusion Most recent Training/Investigation Rationale: Men and women feel bed-associated illnesses in a different way in terms of symptomatology, incidence, and you may pathophysiology. The main function of this research were to see the change in useful status anywhere between genders once they show standard practitioners. Investigation Impact: Our studies have shown that people do have additional practical condition toward speech to standard practitioners. A bigger ratio of females claimed difficulties with anxiety, trouble sleeping, focus, memories, and you will affect dating than the boys. Differences also are noticed in the way in which OSA try handled. The newest ratio of men to girls likely to sleep laboratories could have been reported to be ranging from 8:1 and you can 10:step 1, in spite of the ratio of times are estimated on between 2:1 and you will step 3:step one. 3,seven Traditionally, bed studies have predominantly become conducted when you look at the male communities, step 3 and consequent evaluative, symptomatic, and you may government recommendations had been conceived predicated on including browse. It’s postulated you to lady expose which have nonspecific periods one to disagree from vintage symptomatology. 4,nine Therefore, girls shall be misdiagnosed with other disorders eg depression. cuatro That it sex prejudice can get account fully for a number of the underdiagnosis and mismanagement out of OSA in women. step 3 Other causes is you to people can get introduce reduced seem to once the of the personal stigma of this snoring, whilst defies the typical female label, or you to definitely snoring is far more severe for the guys. cuatro Leave a Comment Your email address will not be published. Required fields are marked *
{ "url": "https://bplazahotel.com/just-how-can-sleep-associated-health-problems-2/", "source_domain": "bplazahotel.com", "snapshot_id": "CC-MAIN-2024-22", "warc_metadata": { "Content-Length": "84382", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:NJFWZNRLP4M5IAH3DDJW7KPY4AN6PAEZ", "WARC-Concurrent-To": "<urn:uuid:e285c16e-8448-470b-9e56-71e1c01ba4ab>", "WARC-Date": "2024-05-23T06:19:37Z", "WARC-IP-Address": "148.251.153.114", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:ZMU7EX7FJC36PXMEWWAPXYRRVHBI7NVW", "WARC-Record-ID": "<urn:uuid:9fc1b17a-8aaa-423e-99ba-c1f54a813581>", "WARC-Target-URI": "https://bplazahotel.com/just-how-can-sleep-associated-health-problems-2/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:2537a9fa-5816-411a-befe-56b7220c764d>" }, "warc_info": "isPartOf: CC-MAIN-2024-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-80\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 88, 89, 177, 178, 187, 188, 977, 978, 987, 988, 1732, 1733, 1746, 1747, 2156, 2157, 2167, 2168, 2318, 2319, 2329, 2330, 3287, 3288, 3890, 3891, 3912, 3913, 4229, 4230, 4505, 4506, 5589, 5590, 5606, 5607 ], "line_end_idx": [ 88, 89, 177, 178, 187, 188, 977, 978, 987, 988, 1732, 1733, 1746, 1747, 2156, 2157, 2167, 2168, 2318, 2319, 2329, 2330, 3287, 3288, 3890, 3891, 3912, 3913, 4229, 4230, 4505, 4506, 5589, 5590, 5606, 5607, 5677 ] }
{ "red_pajama_v2": { "ccnet_original_length": 5677, "ccnet_original_nlines": 36, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 4, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3767705261707306, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.01794145070016384, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.17847025394439697, "rps_doc_frac_unique_words": 0.4925714433193207, "rps_doc_mean_word_length": 5.290285587310791, "rps_doc_num_sentences": 44, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.515832901000977, "rps_doc_word_count": 875, "rps_doc_frac_chars_dupe_10grams": 0.03197234869003296, "rps_doc_frac_chars_dupe_5grams": 0.051847051829099655, "rps_doc_frac_chars_dupe_6grams": 0.03197234869003296, "rps_doc_frac_chars_dupe_7grams": 0.03197234869003296, "rps_doc_frac_chars_dupe_8grams": 0.03197234869003296, "rps_doc_frac_chars_dupe_9grams": 0.03197234869003296, "rps_doc_frac_chars_top_2gram": 0.02333117090165615, "rps_doc_frac_chars_top_3gram": 0.013609849847853184, "rps_doc_frac_chars_top_4gram": 0.010801469907164574, "rps_doc_books_importance": -335.7612609863281, "rps_doc_books_importance_length_correction": -335.7612609863281, "rps_doc_openwebtext_importance": -204.82247924804688, "rps_doc_openwebtext_importance_length_correction": -204.82247924804688, "rps_doc_wikipedia_importance": -143.44046020507812, "rps_doc_wikipedia_importance_length_correction": -143.44046020507812 }, "fasttext": { "dclm": 0.03027540072798729, "english": 0.950825572013855, "fineweb_edu_approx": 2.353950023651123, "eai_general_math": 0.026708070188760757, "eai_open_web_math": 0.23817414045333862, "eai_web_code": 0.0009789499454200268 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.8", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.85", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "10", "label": "Knowledge Article" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
8,222,674,588,333,507,000
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z LARGE-CELL MODEL FOR RADIATION HEAT TRANSFER IN MULTIPHASE SYSTEMS DOI: 10.1615/thermopedia.000118  Large-Cell Model for Radiation Heat Transfer in Multiphase Systems Leonid A. Dombrovsky Following from: Computational models for radiative transfer in disperse systems Leading to: Thermal radiation modeling in melt-coolant interaction The radiation model discussed in this section has been recently developed by Dombrovsky (2007a) for multiphase flows typical of the so-called fuel-coolant interaction (FCI) when a high-temperature core melt (80%UO2+20%ZrO2) falls into a water pool. Various aspects of FCI have been widely investigated during last two decades because of the possibility of severe accidents with regard to light-water nuclear reactors. The complexity of different stages of high-temperature core-melt interaction with water is one of the reasons for the present-day state of the art; however, some important physical processes still have not been considered in detail. The efforts of many researchers have focused on hydrodynamic simulation of melt jet breakup (Dinh et al., 1999; Bürger, 2006; Pohlner et al., 2006) and the specific problems of steam explosions (Fletcher and Anderson, 1990; Theofanous, 1995; Fletcher, 1995; Berthoud, 2000). At the same time, the radiation heat transfer in the multiphase medium containing polydisperse corium particles of temperature of about 2500-3000 K has not been a subject of detailed analysis. The papers by T.-N. Dinh et al. (1999), Fletcher (1999), and Dombrovsky (1999a, 2000a) were probably the first publications where the important role of radiation heat transfer was discussed. It was noted that a part of thermal radiation emitted by particles can be absorbed far from the radiation sources because of the semitransparency of water in the short-wave range. The general problem of radiation heat transfer between corium particles and ambient water can be divided into the following problems of different scales: thermal radiation from a single particle through a steam blanket to ambient water and radiation heat transfer in a large-scale volume containing numerous corium particles, steam bubbles, and water droplets. One can show that solutions to these problems can be incorporated in a general physical and computational model, as was done for similar problems of radiation heat transfer in other disperse systems (Dombrovsky, 1996). The single-particle problem has been analyzed in some detail by Dombrovsky (1999a, 2000a). The main focus was given to the significant contribution of electromagnetic wave effects in the case of very thin steam layers. The effect of semitransparency of nonisothermal oxide particles on the thermal radiation has also been studied by Dombrovsky (1999b, 2000b, 2002). The resulting physical features of particle solidification have been reported recently by Dombrovsky (2007b) and Dombrovsky and Dinh (2008). To the best of our knowledge, the first attempt to calculate radiation heat transfer in water containing corium particles was reported by Yuen (2004). It was assumed that there is no radiation scattering in the medium. The spectral radiative properties of the melt particles of various temperatures and sizes were ignored in this paper, and all the particles were considered as the sources of black-body radiation. The calculations by Yuen (2004) were based on the formal zonal method, which seems to be a poor choice for the problem considered. A more sophisticated model for radiation heat-transfer calculation in water containing numerous polydisperse corium particles of different temperatures and polydisperse steam bubbles has been suggested by Dombrovsky (2007a). This model, called the large-cell radiation model (LCRM), is sufficiently simple to be easily implemented into computational fluid dynamics (CFD) codes for multiphase flow calculations (Dombrovsky et al., 2009). The computational results for realistic conditions are considered in the article Thermal radiation modeling in melt-coolant interaction. In the present article, we focus on the radiation model. Two-Band Model with Conventional Semitransparency and Opacity Regions To suggest an adequate model of radiation heat transfer in water containing hot corium particles and steam bubbles, one should take into account specific optical properties of water in the visible and near-infrared spectral ranges. It is well known that water is semitransparent in a short-wave range, and there is a strong absorption band at the wavelength λ = 3 μm (Hale and Querry, 1973). To estimate the role of nonlocal radiation effects, one can introduce the characteristic penetration depth of the collimated radiation in water: lλ = 1/αw. The spectral dependence of lλ in the most interesting intermediate range of 0.8 < λ < 1.4 μm is illustrated in Fig. 1. One can see that lλ decreases from about 0.5 m at the visible range boundary λ = 0.8 μm to lλ = 1 mm at the wavelength λ = 1.38 μm. Figure 1. The characteristic propagation depth of collimated near-infrared radiation in water. It is reasonable to separately consider the following conventional spectral regions: • The short-wave semitransparency range λ < λ* = 1.2 μm, where lλ > 10 mm. There is a considerable radiation heat transfer between corium particles in this spectral range because the distance between neighboring millimeter-sized particles is usually less than 10 mm. One can use the traditional radiation transfer theory to calculate the volume distribution of radiation power. Both absorption and scattering of radiation by particles should be taken into account. • The opacity range λ > λ*, where lλ < 10 mm. In this range one can neglect the radiation heat transfer between the particles. The radiative transfer problem degenerates because of strong absorption at distances comparable to both particle sizes and distances between the particles. One can assume that radiation emitted by the particle in this spectral range is totally absorbed in ambient water. Of course, the above two-band radiation model should be treated as a simple approach, and the effect of a conventional value of the boundary wavelength λ* may be a subject of further analysis. In a multiphase flow typical of the FCI problem, numerous steam bubbles and core melt particles have a considerable effect on the radiative properties of the medium in the range of water semitransparency. Nevertheless, the above division of the spectrum into two bands according to the absorption spectrum of water remains acceptable (Dombrovsky, 2007a). P1 Approximation and Large-Cell Radiation Model for Semitransparency Range The RTE for emitting, absorbing, refracting, and scattering medium containing N components of different temperatures can be written as follows (Dombrovsky, 1996; Siegel and Howell, 2002; Modest, 2003): (1) where nλ is the index of refraction of the host medium, and αλ,i is the absorption coefficient of the composite medium component with temperature Ti, (2) By writing the last term on the right-hand side of RTE (1), we have assumed that every component of the medium is characterized by a definite temperature. This is not the case for large corium particles with considerable temperature difference in the particle. Nevertheless, the problem formulation should not be revised for opaque particles. It is sufficient to treat the value of Ti as a surface temperature of the particles of ith fraction. An essentially more complex problem should be considered for semitransparent particles when thermal radiation comes from the particle volume. It is a realistic situation for particles of aluminum oxide or other light oxides used as simulant substances in experimental studies of the core melt-coolant interaction. The problem of thermal radiation from semitransparent nonisothermal particles is considered in the articles Thermal radiation from nonisothermal spherical particles and Thermal radiation from nonisothermal particles in combined heat transfer problems. The solution obtained can be combined with the large-scale problem under consideration. It is very difficult to use the complete description of the radiation heat transfer based on RTE (1) in the range of water semitransparency. Therefore, the simplified radiation models should be considered for engineering calculations. The integration of the RTE over all values of the solid angle yields the following equation of spectral energy balance: (3) where pλ is the spectral radiation power emitted in a unit volume of the medium. Note that Eq. (3) is a generalized form of Eq. (7) from the article The radiative transfer equation for the case of a multitemperature medium. The spectral balance equation (3) is considered as a starting point for simplified models for radiation heat transfer in multiphase disperse systems. In the case of somewhat cool particles, the main part of thermal radiation is emitted in the range of water opacity. Thus it is reasonable to ignore the specific feature of the process in the short-wave range and assume water to be totally opaque over the whole spectrum. This approach can be called the opaque medium model (OMM). According to the OMM, thermal radiation emitted by single hot particles is absorbed in water at very small distances from the particle. In this case, the total power absorbed by water in a unit volume is equal to the power emitted by particles in this volume: (4) where λ1 and λ2 are the boundaries of the spectral range of considerable thermal radiation. Obviously, this model overestimates the heat absorbed in water and cannot be employed to distinguish the radiation power absorbed at the steam/water interface near the particle and the power absorbed in the volume. The latter may be important for detailed analysis of heat transfer from corium particles to ambient water in calculations of water heating and evaporation. Simple estimates showed that contribution of short-wave radiation increases rapidly with the particle temperature, and one cannot ignore the spectral range of water semitransparency when corium particle temperature is greater than 2500 K. In other words, one can expect the OMM error to be considerable in this case. The large-cell radiation model (LCRM) is based on the assumption of negligible radiation heat transfer between the computational cells. Note that the present-day computer codes for multiphase flows use computational cells of about 5-10 cm or greater and all parameters of the multiphase flow are assumed to be constant in every cell. In the range of water semitransparency, the local radiative balance in a single cell yields the following relation for radiation energy density instead of Eq. (3): (5) As a result, the expressions for the integral radiation power absorbed in water can be written as (6) where αλ,w is the spectral absorption coefficient of water containing steam bubbles. The components Pw(1) and Pw(2) of the absorbed power correspond to the ranges of water semitransparency and opacity. One can assume that Pw(1) causes the volume heating of water, whereas Pw(2) causes the surface heating and evaporation of water near the hot particles. Obviously, the predicted contribution of the semitransparency range to the total absorbed power appears to be less than the corresponding value estimated by use of OMM. Note that LCRM does not include any characteristics of radiation scattering in the medium. The radiation balance equation (3) can also be employed without ignoring the radiation flux divergence. To realize such a possibility, one should find a relation between the spectral radiation flux and radiation energy density. In P1 approximation, the known representation of the radiation flux is assumed to make the problem statement complete: (7) and the spectral radiation energy density can be determined by solving the following boundary-value problem: (8a) (8b) where n is the unit vector of external normal to the boundary surface of the computational region. The boundary condition (8b) corresponds to the case of zero external radiation and no reflection from the boundary surface. The angular dependence of radiation intensity in the region of intensive FCI is expected to be smooth. Therefore, P1 can be used instead of the RTE to analyze the quality of LCRM. Note that boundary-value problem (8) is formulated for the complete computational region (not for single cells). After solving this problem for several wavelengths in the range of λ1 < λ < λ*, one can find the radiation power absorbed in water: (9) The total radiative heat loss from corium particles is (10) where αλ,c is the absorption coefficient of polydisperse corium particles. It is important that Pc(1)Pw(1) due to heat transfer by radiation in semitransparent medium: (11) The P1 approximation takes into account the radiative transfer between all the computational cells. It is an important advantage of this model, especially in the case of semitransparent cells. A long-time experience in the use of P1 for solving various engineering problems has shown that the predicted field of radiation energy density is usually very close to the exact RTE solution. One can see that P1 also gives the radiation flux at the boundary of the computational region. In contrast to the radiation energy density, the radiation flux error may be significant (see the article, An estimate of P1 approximation error for optically inhomogeneous media). Therefore, a more sophisticated approach should be employed to determine the radiation coming from the FCI region. The complete solution to the two-dimensional radiation heat-transfer problem in a multiphase flow typical of fuel-coolant interaction is too complicated even when the P1 approximation is employed. The main computational difficulty is related to the wide range of optical thickness of the medium at different wavelengths. One should consider not only the visible radiation when optical thickness of the medium is determined by numerous particles, but also a part of the near-infrared range characterized by the large absorption coefficient of water. As a result, the numerical solution of the boundary-value problem (8), generally speaking, cannot be obtained by using the same computational mesh at all wavelengths. There is no such difficulty in LCRM, which is simply an algebraic model and can be easily implemented into any multiphase CFD code. In the Lagrangian calculations of the transient temperature of corium particles, the value of integral (over the spectrum) radiation heat flux from the unit surface of a single particle is used. In OMM, this value is determined as follows: (12) In LCRM and P1, we have the following expressions for the radiation flux: (13) The complete formulation of the problem must include the relations for radiative characteristics of particles and steam bubbles. These relations have been derived in the papers of Dombrovsky et al. (2007a, 2009) (see also Radiative properties of gas bubbles in semi-transparent medium, Thermal radiation from spherical particle to absorbing medium through narrow concentric gap, and Thermal radiation modeling in melt-coolant interaction). In Lagrangian modeling of motion and cooling of an isothermal particle of radius ai, the following energy equation is usually employed: (14) For simplicity, it is assumed here that the particle is totally opaque and optically gray (εc = const). Generally speaking, ψi ≠ 1 and the values of ψi can be determined from the large-cell model. To clarify the physical sense of coefficient ψ, consider the case of monodisperse corium particles when (15) where α is the absorption coefficient of corium particles, and ζ0(T) is the part of blackbody radiation at temperature T in the range of water semitransparency: (16) Obviously, the coefficient ψ varies in the range between 1 - ζ0 and 1, where the lower limit corresponds to the high volume fraction of corium. Comparison of Diffusion and Large-Cell Models for Typical Problem Parameters Following the paper by Dombrovsky (2007a), consider a one-dimensional axisymmetric problem of radiation heat transfer in water containing polydisperse steam bubbles and steam-mantled corium particles. In our sample problem we use the following similar profiles of the volume fractions of corium and steam: (17) The following fixed values of parameters are considered: R = 0.5 m, fv0 = 0.5%. The function φ(r) and its “cell” approximation are shown in Fig. 2. The ordinates of the cell approximation for the number of cells N = 10 are calculated as follows: (18) Figure 2. Dimensionless profile of volume fraction of steam and corium considered in the model problem: 1 - smooth profile and 2 - stepwise approximation. The average radius of bubbles is assumed to equal 3 mm. The corium particles are treated as opaque ones. The emissivity of bulk corium was assumed to be independent of wavelength and temperature and equal to εc = 0.85. Because of the complexity of the general problem, two variants of the sample problem are considered below: one for monodisperse corium particles and one model for polydisperse corium characterized by different temperatures of small and large particles. Monodisperse Particles Consider the case of monodisperse corium particles of radius a2 = 2.5mm and temperature T = 3000K. The results of calculations based on P1 approximation are presented in Figs. 3 and 4. One can see in Fig. 3 that there is a considerable difference between the radiation power emitted by corium particles in the semitransparency range and the power absorbed in water. It is explained by considerable radiation flux from the region in this spectral range (see Fig. 4). The difference between the calculations for a smooth profile of the particle volume fraction and a stepwise profile typical of cell approximation of the flow parameters is insignificant, especially for radiation power absorbed in water and spectral radiation flux at the boundary region. One can see in Fig. 4 that thermal radiation from the multiphase medium can be observed only in the visible range, and the corresponding radiative heat loss is negligible in the medium heat balance. Figure 3. Radiative heat loss from corium particles (a) and radiation power absorbed in water (b): 1 - in the range of water semitransparency, 2 - in the range of water capacity; I - smooth profile, II - stepwise approximation. Figure 4. Spectral radiative flux at the boundary of the computational region: calculations for smooth profile (I) and stepwise approximation (II) of the medium parameters. It follows from Eq. (3) that the large-cell model gives the only profile of radiation power. This profile is intermediate between the profiles obtained for corium and water in P1 approximation. One can see in Fig. 5 that the relative error of the large-cell model in total radiation power is not large (about 5-10%) because of the decisive contribution of the opacity range. It is important that this error can be estimated by comparison of the large-cell solution with the upper limit of radiative heat loss from corium particles: (19) Figure 5. Total radiative heat loss from corium particles (a) and radiation power absorbed in water (b): 1 - P1 approximation, 2 - large-cell model, 3 - maximum estimate (19). The latter statement is illustrated by curve Pwmax(r) plotted in Fig. 5. Polydisperse Particles For simplicity, the following two-mode size distribution of particles is considered: (20) with a1 = 0.5 mm, a2 = 3 mm, T(a1) = T1 = 2000 K, T(a2) = T2 = 3000 K. Obviously, the integral characteristics of size-distribution (20) are (21) Note that ξ is the relative number of small particles, whereas the more representative volume fraction of these particles is given by ν = ξa13/a30. The effect of polydisperse corium particles can be analyzed on the basis of the large-cell model. The local character of this model allows us to consider a single cell of the medium. One can write the following expressions for radiative cooling rate coefficients: (22) Note that calculations showed the predominant role of visible radiation in direct heat transfer between the particles of different temperatures. For this reason, it is sufficient to use the “red” boundary of the visible spectral range λred = 0.8 μm instead of λ* in approximate calculations of the function ζ(T ). The results of calculations presented in Fig. 6 showed that thermal radiation from relatively hot large particles of corium in the visible spectral range can lead to significant decrease in the radiative cooling rate of small particles. This effect should be taken into account in calculations of the fuel-coolant interaction. A more representative analysis of the LCRM error in realistic FCI problems can be found in the paper by Dombrovsky et al. (2009) and in the article Thermal radiation modeling in melt-coolant interaction. Figure 6. The coefficients of radiative cooling rate for corium particles of two fractions as functions of relative volume fraction of small particles: 1 - ψ1, for small particles; 2 - ψ2, for large particles. REFERENCES Berthoud, G., Vapor explosions, Annu. Rev. Fluid Mech., vol. 32, pp. 573-611, 2000. Bürger, M., Particulate debris formation by breakup of melt jets, Nucl. Eng. Des., vol. 236, no. 19-21, pp. 1991-1997, 2006. Dinh, T. N., Bui, V. A., Nourgaliev, R. R., Green, J. A., and Sehgal, B. R., Experimental and analytical studies of melt jet-coolant interaction: A synthesis, Nucl. Eng. Des., vol. 189, no. 1-3, pp. 299-327, 1999. Dinh, T. N., Dinh, A. T., Nourgaliev, R. R., and Sehgal, B. R., Investigation of film boiling thermal hydraulics under FCI conditions: Results of analyses and numerical study, Nucl. Eng. Des., vol. 189, no. 1-3, pp. 251-272, 1999. Dombrovsky, L. A., Radiation Heat Transfer in Disperse Systems, New York: Begell House, 1996. Dombrovsky, L. A., Radiation heat transfer from a spherical particle via vapor shell to the surrounding liquid, High Temp., vol. 37, no. 6, pp. 912-919, 1999a. Dombrovsky, L. A., Thermal radiation of a spherical particle of semitransparent material, High Temp., vol. 37, no. 2, pp. 260-269, 1999b. Dombrovsky, L. A., Radiation heat transfer from a hot particle to ambient water through the vapor layer, Int. J. Heat Mass Transfer, vol. 43, no. 13, pp. 2405-2414, 2000a. Dombrovsky, L. A., Thermal radiation from nonisothermal spherical particles of a semitransparent material, Int. J. Heat Mass Transfer, vol. 43, no. 9, pp. 1661-1672, 2000b. Dombrovsky, L. A., A modified differential approximation for thermal radiation of semitransparent nonisothermal particles: Application to optical diagnostics of plasma spraying, J. Quant. Spectrosc. Radiat. Transf., vol. 73, no. 2-5, pp. 433-441, 2002. Dombrovsky, L. A., Large-cell model of radiation heat transfer in multiphase flows typical for fuel-coolant interaction, Int. J. Heat Mass Transfer, vol. 50, no. 17-18, pp. 3401-3410, 2007a. Dombrovsky, L. A., Thermal radiation of nonisothermal particles in combined heat transfer problems, Proc. of the 5th Int’l. Symp. on Radiative Transfer, Bodrum, Turkey, June 17-22, 2007 (dedication lecture), 2007b. Dombrovsky, L. A. and Dinh, T. N., The effect of thermal radiation on the solidification dynamics of metal oxide melt droplets, Nucl. Eng. Des., vol. 238, no. 6, pp. 1421-1429, 2008. Dombrovsky, L. A., Davydov, M. V., and Kudinov, P., Thermal radiation modeling in numerical simulation of melt-coolant interaction, Proc. of the 5th Int’l. Symp. on Radiative Transfer, vol. 1, no. 1, pp. 1-35, 2009. Fletcher, D. F. and Anderson, R.P., A review of pressure-induced propagation models of the vapour explosion process, Prog. Nucl. Energy, vol. 23, no. 2, pp. 137-179, 1990. Fletcher, D. F., Steam explosion triggering: A review of theoretical and experimental investigations, Nucl. Eng. Des., vol. 155, no. 1-2, pp. 27-36, 1995. Fletcher, D. F., Radiation absorption during premixing, Nucl. Eng. Des., vol. 189, no. 1-3, pp. 435-440, 1999. Hale, G.M. and Querry, M. P., Optical constants of water in the 200nm to 200μm wavelength region, Appl. Opt., vol. 12, no. 3, pp. 555-563, 1973. Modest, M. F., Radiative Heat Transfer, 2nd ed., New York: Academic Press, 2003. Pohlner, G., Vujic, Z., Bürger, M., and Lohnert, G., Simulation of melt jet breakup and debris bed formation in water pools with IKEJET/IKEMIX, Nucl. Eng. Des., vol. 236, no. 19-21, pp. 2026-2048, 2006. Siegel, R. and Howell, J. R., Thermal Radiation Heat Transfer, 4th ed., New York: Taylor & Francis, 2002. Theofanous, T. G., The study of steam explosions in nuclear systems, Nucl. Eng. Des., vol. 155, no. 1-2, pp. 1-26, 1995. Yuen, W. W., Development of a multiple absorption coefficient zonal method for application to radiative heat transfer in multi-dimensional inhomogeneous non-gray media, Proc. of the 2004 ASME Heat Transfer/Fluids Engineering Summer Conf., July 11-15, 2004, Charlotte, NC, USA, Paper HT-FED2004-56285. Number of views: 20994 Article added: 7 September 2010 Article last modified: 25 April 2011 © Copyright 2010-2018 Back to top
{ "url": "http://thermopedia.com/content/118/", "source_domain": "thermopedia.com", "snapshot_id": "crawl=CC-MAIN-2018-34", "warc_metadata": { "Content-Length": "41695", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:2WMWY2OT67ZGSG7WPWKCE6VA7RYB4POG", "WARC-Concurrent-To": "<urn:uuid:ada3bdd3-1ee5-4529-b157-d23af3d7420c>", "WARC-Date": "2018-08-14T23:06:59Z", "WARC-IP-Address": "169.45.5.27", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:5XNCAPS4OCUN43RFLH5IQF6A7JZ4UGWX", "WARC-Record-ID": "<urn:uuid:81910ed4-ba14-4934-b36a-7572dd219164>", "WARC-Target-URI": "http://thermopedia.com/content/118/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:1d0b6d00-4654-4dd1-866c-95cfd2b14ba3>" }, "warc_info": "isPartOf: CC-MAIN-2018-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-146-222-91.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 52, 53, 120, 121, 153, 155, 156, 223, 224, 245, 246, 326, 327, 394, 395, 1885, 1886, 4150, 4151, 4221, 4222, 5021, 5022, 5117, 5118, 5203, 5204, 5671, 6071, 6072, 6265, 6266, 6621, 6622, 6697, 6698, 6900, 6901, 6905, 6906, 7056, 7057, 7061, 7062, 8160, 8161, 8516, 8517, 8521, 8522, 8896, 8897, 9488, 9489, 9493, 9494, 10274, 10275, 10773, 10774, 10778, 10779, 10877, 10878, 10882, 10883, 11497, 11498, 11845, 11846, 11850, 11851, 11960, 11961, 11966, 11967, 11972, 11973, 12621, 12622, 12626, 12627, 12682, 12683, 12688, 12689, 12857, 12858, 12863, 12864, 13641, 13642, 14490, 14491, 14731, 14732, 14737, 14738, 14812, 14813, 14818, 14819, 15259, 15260, 15396, 15397, 15402, 15403, 15704, 15705, 15710, 15711, 15872, 15873, 15878, 15879, 16023, 16024, 16101, 16102, 16408, 16409, 16414, 16415, 16661, 16662, 16667, 16668, 16823, 16824, 17296, 17297, 17320, 17321, 18274, 18275, 18503, 18504, 18677, 18678, 19210, 19211, 19216, 19217, 19393, 19394, 19467, 19468, 19491, 19492, 19577, 19578, 19583, 19584, 19725, 19726, 19731, 19732, 20144, 20145, 20150, 20151, 20996, 20997, 21207, 21208, 21219, 21220, 21304, 21305, 21430, 21431, 21645, 21646, 21877, 21878, 21972, 21973, 22133, 22134, 22272, 22273, 22445, 22446, 22619, 22620, 22873, 22874, 23065, 23066, 23281, 23282, 23465, 23466, 23682, 23683, 23855, 23856, 24011, 24012, 24123, 24124, 24269, 24270, 24351, 24352, 24555, 24556, 24662, 24663, 24784, 24785, 25086, 25087 ], "line_end_idx": [ 52, 53, 120, 121, 153, 155, 156, 223, 224, 245, 246, 326, 327, 394, 395, 1885, 1886, 4150, 4151, 4221, 4222, 5021, 5022, 5117, 5118, 5203, 5204, 5671, 6071, 6072, 6265, 6266, 6621, 6622, 6697, 6698, 6900, 6901, 6905, 6906, 7056, 7057, 7061, 7062, 8160, 8161, 8516, 8517, 8521, 8522, 8896, 8897, 9488, 9489, 9493, 9494, 10274, 10275, 10773, 10774, 10778, 10779, 10877, 10878, 10882, 10883, 11497, 11498, 11845, 11846, 11850, 11851, 11960, 11961, 11966, 11967, 11972, 11973, 12621, 12622, 12626, 12627, 12682, 12683, 12688, 12689, 12857, 12858, 12863, 12864, 13641, 13642, 14490, 14491, 14731, 14732, 14737, 14738, 14812, 14813, 14818, 14819, 15259, 15260, 15396, 15397, 15402, 15403, 15704, 15705, 15710, 15711, 15872, 15873, 15878, 15879, 16023, 16024, 16101, 16102, 16408, 16409, 16414, 16415, 16661, 16662, 16667, 16668, 16823, 16824, 17296, 17297, 17320, 17321, 18274, 18275, 18503, 18504, 18677, 18678, 19210, 19211, 19216, 19217, 19393, 19394, 19467, 19468, 19491, 19492, 19577, 19578, 19583, 19584, 19725, 19726, 19731, 19732, 20144, 20145, 20150, 20151, 20996, 20997, 21207, 21208, 21219, 21220, 21304, 21305, 21430, 21431, 21645, 21646, 21877, 21878, 21972, 21973, 22133, 22134, 22272, 22273, 22445, 22446, 22619, 22620, 22873, 22874, 23065, 23066, 23281, 23282, 23465, 23466, 23682, 23683, 23855, 23856, 24011, 24012, 24123, 24124, 24269, 24270, 24351, 24352, 24555, 24556, 24662, 24663, 24784, 24785, 25086, 25087, 25212 ] }
{ "red_pajama_v2": { "ccnet_original_length": 25212, "ccnet_original_nlines": 214, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.28962621092796326, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03777733072638512, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.24685189127922058, "rps_doc_frac_unique_words": 0.22375832498073578, "rps_doc_mean_word_length": 5.151049613952637, "rps_doc_num_sentences": 366, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.611208438873291, "rps_doc_word_count": 3906, "rps_doc_frac_chars_dupe_10grams": 0.00705765001475811, "rps_doc_frac_chars_dupe_5grams": 0.13489066064357758, "rps_doc_frac_chars_dupe_6grams": 0.10144135355949402, "rps_doc_frac_chars_dupe_7grams": 0.06277336180210114, "rps_doc_frac_chars_dupe_8grams": 0.04105367884039879, "rps_doc_frac_chars_dupe_9grams": 0.022664019837975502, "rps_doc_frac_chars_top_2gram": 0.014413519762456417, "rps_doc_frac_chars_top_3gram": 0.0208747498691082, "rps_doc_frac_chars_top_4gram": 0.01257454976439476, "rps_doc_books_importance": -2294.199462890625, "rps_doc_books_importance_length_correction": -2294.199462890625, "rps_doc_openwebtext_importance": -1294.8785400390625, "rps_doc_openwebtext_importance_length_correction": -1294.8785400390625, "rps_doc_wikipedia_importance": -805.0783081054688, "rps_doc_wikipedia_importance_length_correction": -805.0783081054688 }, "fasttext": { "dclm": 0.04576379060745239, "english": 0.8914515972137451, "fineweb_edu_approx": 3.1224281787872314, "eai_general_math": 0.998988151550293, "eai_open_web_math": 0.6867977976799011, "eai_web_code": 0.2547112703323364 } }
{ "free_decimal_correspondence": { "primary": { "code": "621.482", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } }, "secondary": { "code": "621.48", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Mechanical engineering and Machinery" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-1,136,438,609,651,001,200
Serverside Configuration   «Prev  Next» Lesson 7Using the Oracle Net Assistant, part 2 ObjectiveUse the Oracle Net Assistant to choose naming methods. Net Assistant Choosing Naming Methods Network - Profile, Service Names, Listeners, Oracle Names Servers To use the Oracle Net Assistant to choose naming methods, you must first select Profile from the menu hierarchy on the left side of the Assistant interface. The first tab under Profile is the Naming tab, where you can choose the naming methods. By default, Oracle Net will attempt to resolve a service name to a network address using the following three naming methods in the order in which they appear: 1. Local naming (specified in the Oracle Oracle Net Assistant as TNSNAMES) 2. Centralized naming using Oracle Names (specified in the Oracle Oracle Net Assistant as ONAMES) 3. Host naming (specified in the Oracle Oracle Net Assistant as HOSTNAME) In the next lesson, you will have the opportunity to simulate the procedure for defining trace levels for the listener.
{ "url": "https://www.relationaldbdesign.com/network-topology/module5/netAssistant-choose-naming-methods.php", "source_domain": "www.relationaldbdesign.com", "snapshot_id": "crawl=CC-MAIN-2022-27", "warc_metadata": { "Content-Length": "30352", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:RBBAUZGWAYTBTK7HXGHCVW6SETHY74AF", "WARC-Concurrent-To": "<urn:uuid:b891baeb-abd1-4df2-b90d-460a2cad3879>", "WARC-Date": "2022-06-30T13:18:32Z", "WARC-IP-Address": "104.21.75.113", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:CSV5QF4AJYY4TM7ZOFLNPD47KR3AS65D", "WARC-Record-ID": "<urn:uuid:63dd5fe1-ee57-414a-9831-676afb8c1963>", "WARC-Target-URI": "https://www.relationaldbdesign.com/network-topology/module5/netAssistant-choose-naming-methods.php", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:87ccc3ab-218c-4be7-a6a3-b91dffcd741a>" }, "warc_info": "isPartOf: CC-MAIN-2022-27\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June/July 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-153\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 1, 41, 42, 89, 153, 154, 192, 193, 259, 663, 740, 840, 916 ], "line_end_idx": [ 1, 41, 42, 89, 153, 154, 192, 193, 259, 663, 740, 840, 916, 1035 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1035, "ccnet_original_nlines": 13, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3333333432674408, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.015873020514845848, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.15343914926052094, "rps_doc_frac_unique_words": 0.47560974955558777, "rps_doc_mean_word_length": 5.091463565826416, "rps_doc_num_sentences": 7, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 3.8920741081237793, "rps_doc_word_count": 164, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.25868263840675354, "rps_doc_frac_chars_dupe_6grams": 0.25868263840675354, "rps_doc_frac_chars_dupe_7grams": 0.25868263840675354, "rps_doc_frac_chars_dupe_8grams": 0.25868263840675354, "rps_doc_frac_chars_dupe_9grams": 0.11017964035272598, "rps_doc_frac_chars_top_2gram": 0.07544910162687302, "rps_doc_frac_chars_top_3gram": 0.12934131920337677, "rps_doc_frac_chars_top_4gram": 0.07544910162687302, "rps_doc_books_importance": -94.36639404296875, "rps_doc_books_importance_length_correction": -94.36639404296875, "rps_doc_openwebtext_importance": -45.44548416137695, "rps_doc_openwebtext_importance_length_correction": -32.14017105102539, "rps_doc_wikipedia_importance": -30.9089298248291, "rps_doc_wikipedia_importance_length_correction": -30.9089298248291 }, "fasttext": { "dclm": 0.048007071018218994, "english": 0.8350834846496582, "fineweb_edu_approx": 1.143144965171814, "eai_general_math": 0.05932128056883812, "eai_open_web_math": 0.27322083711624146, "eai_web_code": 0.016918059438467026 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.44", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
2,342,777,975,573,666,300
How to Fix If Smartphone Overheating While Using Video Chat Apps? From the past several months, there has appeared a significant spike in the use of video-chatting apps. And the reasons are pretty obvious, and people stuck at home trying to connect with their families, companies attempting to catch-up with employees through online meetings and a plethora of other uses. Overlooking the overnight success of big titans like Google Meets, Zoom, and Microsoft Teams. They inevitably demand a lot of resources to run efficiently and cause overheating of the smartphone while using video chat apps and services. However, Google Meets, Zoom, and Microsoft Teams are the most used platforms for video-chatting. Their technology is not advanced to avoid this overheating. All we can do to fix smartphone overheating while using video chat apps is make sacrifices here and there and take care of some things. Let’s see how we can get around it. How to Fix If Smartphone Overheating While Using Video Chat Apps How to Fix If Smartphone Overheating While Using Video Chat Apps? The following are some methods I have accumulated to fix this issue. Method 1: Close rarely used programs in the background You may be savoring your video meeting. While apps running in the background are eating your RAM, stealing the smartphone’s battery power, and generating a huge amount of heat. If you tap the home button after getting done with an app, It isn’t closed. It will run in the background. Now there are several ways to close a running program properly. Simply tap the return button twice to close the program. Advertisements You can also exit the app from the menu or get into recently used apps mode (long press home button) and swipe left to close all the running apps. You might know how to exit from apps. But sometimes we forget, and some apps are running in the background. It is recommended to make sure no app is running in the background before opening a video-chat app. Method 2: Turn on airplane mode Mainly, smartphones nowadays support WiFi calling. That makes it so easy to disable all other activities while using WiFi—or in a video chat. Switching to airplane mode will turn off all unnecessary programs running in the system. The WiFi will also turn off, and you have to turn it on manually. Not only will this reduce the overall temperature of the phone, but it will also decrease power usage. You will still be connected to the internet, and receive your phone calls and texts. I do realize this may not be an ideal solution, but you can now attend your video meeting without worrying about your phone may explode. Method 3: Remove malware from your phone Nowadays, advertisers play ugly games to get data from potential users. Malware is their ultimate tool to get the desired data. Malware can get into your phone, from hundreds of sources. For example, clicking pop ads, visiting a website with an unknown link, and more. Malware enters your phone and starts using all the resources to get data and generate an enormous unwanted heat. To make sure that your phone is not infected by a malware, immediately run a security scan. If your phone does not support the anti-virus program. Then Install an anti-malware tool and run the scan. Remember not to click on strange links or pop advertisements while surfing on the web. Method 4: Update the firmware and apps to the latest version Mostly outdated apps generate the most heat in the smartphone. Because they run inefficiently and utilize a lot more resources than they should. Once in awhile, developers taking care of this problem release new updates of the apps if your update setting is not on auto-update. Make sure installed apps are updated to the latest version. Furthermore, updating the firmware can also appear helpful. That simply means you have to update your phone. Go to settings>About phone>My device>Check for updates. Update your phone and restart it. Method 5: Charge your smartphone properly. Sometimes overheating issues are caused by the battery. If the back of your phone is hot, then it is obvious the battery is causing the overheating. Turn off your phone, take out the battery, and feel how hot it is. The normal phone battery temperature is 30-40 centigrade. If it’s more, you should be worried about your phone’s battery age. You can check the temperature of the battery, in settings>battery>power. There appear to be two reasons why the phone battery is heating. One suggests that the battery is old. The second reason can be that you are charging your phone with an unfit charging cable. If the battery is still heating, though, you properly charge it. You should consider replacing the battery or purchasing a new phone. Method 6: Buy a dedicated Smartphone cooler Pad There are many smartphone fans available that can cool down your smartphone to a certain level. It is a great tool or piece of equipment you should have if you do video conferencing pretty often. Just plug and play. Advertisement Note: Most people use this for mobile gaming, but it can be used for video conferencing as well. My Smartphone Still Overheating While Using Video Chat Apps Once you’ve tried the above methods, try the following to avoid further overheats: • Remove phone’s case • Move it from direct sunlight • Direct a fan at your smartphone • Reduce the brightness of your phone • Use battery save mode • Remove junk files from the phone Conclusion If the issue is being caused by the video-chat apps using most of the resources of the phone, the methods mentioned above will surely work. If your phone is overheating due to system fault, or battery’s age. Then you must go to a nearby phone repair shop and get it fixed. Leave a Reply Your email address will not be published. Required fields are marked * This site uses Akismet to reduce spam. Learn how your comment data is processed.
{ "url": "https://www.getdroidtips.com/how-to-fix-if-smartphone-overheating-while-using-video-chat-apps/", "source_domain": "www.getdroidtips.com", "snapshot_id": "CC-MAIN-2023-06", "warc_metadata": { "Content-Length": "186050", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:G5Q2K55JTF3ZFC4VVLDPEPH26NBS2KG7", "WARC-Concurrent-To": "<urn:uuid:6e74eb2e-fa7a-4344-a571-9aebc2a10db4>", "WARC-Date": "2023-01-28T07:54:48Z", "WARC-IP-Address": "104.26.4.73", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:PJ3OODQT7ND6QIUOAER3FMJURVCY2SOT", "WARC-Record-ID": "<urn:uuid:fdcf9702-b7f0-4231-af56-5f88de867acc>", "WARC-Target-URI": "https://www.getdroidtips.com/how-to-fix-if-smartphone-overheating-while-using-video-chat-apps/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:65bde521-85bc-444c-9a03-925ee964eaa4>" }, "warc_info": "isPartOf: CC-MAIN-2023-06\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January/February 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-163\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 66, 67, 610, 611, 940, 941, 1006, 1007, 1073, 1074, 1143, 1144, 1199, 1200, 1605, 1606, 1621, 1622, 1977, 1978, 2010, 2011, 2411, 2412, 2634, 2635, 2676, 2677, 2946, 2947, 3346, 3347, 3408, 3409, 3687, 3688, 3947, 3948, 3991, 3992, 4407, 4408, 4733, 4734, 4782, 4783, 4999, 5000, 5014, 5015, 5112, 5113, 5173, 5174, 5257, 5258, 5282, 5315, 5351, 5391, 5417, 5454, 5455, 5466, 5467, 5740, 5741, 5755, 5756, 5827, 5828 ], "line_end_idx": [ 66, 67, 610, 611, 940, 941, 1006, 1007, 1073, 1074, 1143, 1144, 1199, 1200, 1605, 1606, 1621, 1622, 1977, 1978, 2010, 2011, 2411, 2412, 2634, 2635, 2676, 2677, 2946, 2947, 3346, 3347, 3408, 3409, 3687, 3688, 3947, 3948, 3991, 3992, 4407, 4408, 4733, 4734, 4782, 4783, 4999, 5000, 5014, 5015, 5112, 5113, 5173, 5174, 5257, 5258, 5282, 5315, 5351, 5391, 5417, 5454, 5455, 5466, 5467, 5740, 5741, 5755, 5756, 5827, 5828, 5908 ] }
{ "red_pajama_v2": { "ccnet_original_length": 5908, "ccnet_original_nlines": 71, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.4008583724498749, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.0025751099456101656, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1296137273311615, "rps_doc_frac_unique_words": 0.38805970549583435, "rps_doc_mean_word_length": 4.706467628479004, "rps_doc_num_sentences": 67, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.311339378356934, "rps_doc_word_count": 1005, "rps_doc_frac_chars_dupe_10grams": 0.03424946963787079, "rps_doc_frac_chars_dupe_5grams": 0.06913319230079651, "rps_doc_frac_chars_dupe_6grams": 0.06427060812711716, "rps_doc_frac_chars_dupe_7grams": 0.04355179890990257, "rps_doc_frac_chars_dupe_8grams": 0.03424946963787079, "rps_doc_frac_chars_dupe_9grams": 0.03424946963787079, "rps_doc_frac_chars_top_2gram": 0.02663847990334034, "rps_doc_frac_chars_top_3gram": 0.019027480855584145, "rps_doc_frac_chars_top_4gram": 0.024101480841636658, "rps_doc_books_importance": -521.1182861328125, "rps_doc_books_importance_length_correction": -521.1182861328125, "rps_doc_openwebtext_importance": -298.7488098144531, "rps_doc_openwebtext_importance_length_correction": -298.7488098144531, "rps_doc_wikipedia_importance": -203.32798767089844, "rps_doc_wikipedia_importance_length_correction": -203.32798767089844 }, "fasttext": { "dclm": 0.12147604674100876, "english": 0.924837052822113, "fineweb_edu_approx": 1.9870586395263672, "eai_general_math": 0.003983680158853531, "eai_open_web_math": 0.07904977351427078, "eai_web_code": 0.0024858100805431604 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.68", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
1,468,278,616,624,927,200
I’m trying to access my api that is running with nginx and pm2 on Insomnia (Postman like…). Accessing from browser it seems to be ok, just got some “Token not provided”, what I think is natural. Let me know if I need to pass more info please. This is my nginx config file: server { listen 80 default_server; server_name localhost; location / { proxy_pass http://localhost:3333; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_set_header Host $proxy_host; proxy_cache_bypass $http_upgrade; } } Cheers! edited by MattIPv4 These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others. × 1 answer Hi @montone, Everything provided seems fine. Having said that, the best solution in such cases where you experience a server error is to check your error_log. Check your Nginx’s error_log to see what exactly is causing these issues. Once you have it, it should be easier to solve the problem you are experiencing since you’ll know what to fix. Regards, KFSys Submit an Answer
{ "url": "https://www.digitalocean.com/community/questions/why-i-m-getting-500-internal-server-error-with-insomnia", "source_domain": "www.digitalocean.com", "snapshot_id": "crawl=CC-MAIN-2021-04", "warc_metadata": { "Content-Length": "86375", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:4AOQ3V3T73PSV5JRXURQCCAST6YLK5OS", "WARC-Concurrent-To": "<urn:uuid:f218dcaf-adf3-41e5-a560-88f3ab0a8663>", "WARC-Date": "2021-01-23T23:39:09Z", "WARC-IP-Address": "104.16.181.15", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:ABTY4KH62QSPSVZ4RDXZ6YRXDRQUH4EP", "WARC-Record-ID": "<urn:uuid:8135c8b2-575b-4141-a81c-9eb4ddb7a3e8>", "WARC-Target-URI": "https://www.digitalocean.com/community/questions/why-i-m-getting-500-internal-server-error-with-insomnia", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:445aade7-af0d-4421-b99a-fc969d8eba39>" }, "warc_info": "isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-52.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 195, 196, 244, 245, 275, 276, 285, 319, 350, 351, 372, 422, 462, 518, 573, 624, 674, 684, 685, 686, 688, 689, 697, 698, 717, 718, 905, 906, 908, 917, 918, 931, 932, 1078, 1079, 1264, 1265, 1274, 1280, 1281 ], "line_end_idx": [ 195, 196, 244, 245, 275, 276, 285, 319, 350, 351, 372, 422, 462, 518, 573, 624, 674, 684, 685, 686, 688, 689, 697, 698, 717, 718, 905, 906, 908, 917, 918, 931, 932, 1078, 1079, 1264, 1265, 1274, 1280, 1281, 1297 ] }
{ "red_pajama_v2": { "ccnet_original_length": 1297, "ccnet_original_nlines": 40, "rps_doc_curly_bracket": 0.0030840400140732527, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3776823878288269, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.012875540181994438, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.22317597270011902, "rps_doc_frac_unique_words": 0.7292817831039429, "rps_doc_mean_word_length": 5, "rps_doc_num_sentences": 13, "rps_doc_symbol_to_word_ratio": 0.00429185014218092, "rps_doc_unigram_entropy": 4.734132766723633, "rps_doc_word_count": 181, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.011049720458686352, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -84.10678100585938, "rps_doc_books_importance_length_correction": -84.10678100585938, "rps_doc_openwebtext_importance": -41.394596099853516, "rps_doc_openwebtext_importance_length_correction": -41.394596099853516, "rps_doc_wikipedia_importance": -31.090688705444336, "rps_doc_wikipedia_importance_length_correction": -31.090686798095703 }, "fasttext": { "dclm": 0.04779922962188721, "english": 0.9033297300338745, "fineweb_edu_approx": 1.3306071758270264, "eai_general_math": 0.2186741828918457, "eai_open_web_math": 0.08605139702558517, "eai_web_code": 0.07953547686338425 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.678", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
4,541,073,489,130,852,000
Focused Ultrasound Focused Ultrasound Overview Focused ultrasound is the union of two different innovative technologies: Focused ultrasound– which gives the energy to treat tissue deep in the body precisely and noninvasively. Magnetic resonance or ultrasound imaging— which is used to recognize and target the tissue to be treated, guide and control the treatment in real-time, and confirm the effectiveness…
{ "url": "https://samarpanphysioclinic.com/tag/focused-ultrasound-essential-tremor/", "source_domain": "samarpanphysioclinic.com", "snapshot_id": "CC-MAIN-2024-10", "warc_metadata": { "Content-Length": "124471", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:IEGXKPRY2RUEFIIA4HKXFQFNTRD33QQA", "WARC-Concurrent-To": "<urn:uuid:211516ed-8697-4dfe-9c9b-e03751143a37>", "WARC-Date": "2024-02-24T22:03:40Z", "WARC-IP-Address": "172.67.212.8", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:7NBD3XXDQIPTWHJWQSEKBVZ3XLWYVAZU", "WARC-Record-ID": "<urn:uuid:8eb53549-f48c-4e95-b0fb-88d8a2dfea6e>", "WARC-Target-URI": "https://samarpanphysioclinic.com/tag/focused-ultrasound-essential-tremor/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:f226d17e-9ef1-4467-a183-a3401107106d>" }, "warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-169\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 19, 20, 39, 40 ], "line_end_idx": [ 19, 20, 39, 40, 410 ] }
{ "red_pajama_v2": { "ccnet_original_length": 410, "ccnet_original_nlines": 4, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.38235294818878174, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0, "rps_doc_frac_lines_end_with_ellipsis": 0.20000000298023224, "rps_doc_frac_no_alph_words": 0.11764705926179886, "rps_doc_frac_unique_words": 0.6610169410705566, "rps_doc_mean_word_length": 5.847457408905029, "rps_doc_num_sentences": 2, "rps_doc_symbol_to_word_ratio": 0.014705879613757133, "rps_doc_unigram_entropy": 3.4635188579559326, "rps_doc_word_count": 59, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.14782609045505524, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -24.567594528198242, "rps_doc_books_importance_length_correction": -24.567602157592773, "rps_doc_openwebtext_importance": -17.23773765563965, "rps_doc_openwebtext_importance_length_correction": -17.23774528503418, "rps_doc_wikipedia_importance": -6.301920413970947, "rps_doc_wikipedia_importance_length_correction": -6.30192756652832 }, "fasttext": { "dclm": 0.17188745737075806, "english": 0.9207347631454468, "fineweb_edu_approx": 2.667973041534424, "eai_general_math": 0.09472470730543137, "eai_open_web_math": 0.2260735034942627, "eai_web_code": 0.0030273799784481525 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.075", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "616.0754", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "1", "label": "Truncated Snippets" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "1", "label": "No Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
703,365,958,450,839,000
Active/Active clusters in SQL Server Multi-instance, or Active/Active SQL Server cluster design is an involved process. To optimize high availability and performance, you must consider a number of components in ensuring both instances can run on a single node. Hilary Cotter walks you through these considerations including options for multi-instance clusters, choosing adequate hardware and what to do before and after cluster installation.   Multi-instance, Active/Active SQL Server cluster design is an involved process. To optimize high availability... and performance, you must consider a number of components in ensuring both instances can run on a single node. I'll walk you through these considerations including options for multi-instance clusters, choosing adequate hardware and what to do before and after cluster installation. More on Microsoft SQL Server installation Get advice for planning a Microsoft SQL Server installation  Check out this tip for a no-risk SQL Server upgrade for SSRS Learn about SQL Server Upgrade Advisor and Upgrade Assistant Clustering is a high availability technology in which one or more servers (called nodes) connect to shared resources to appear to clients as if they are a single server called a virtual server. If one node fails or is taken offline as part of a planned or unplanned event, the service resources will be provided by another node in the cluster without users knowing. It is important to realize that clients connected to the virtual server running on the first node will be disconnected and when they reconnect to the virtual server again, the services they access will be provided by the failover node. So there is some potential for data loss should they be doing work in the middle of a failover. The applications using a cluster must have some logic to minimize data loss during the failover period. This failover appears as a services stop and restart to existing clients. TABLE OF CONTENTS    Distinct cluster configurations    Pre-installation    Cluster installation    Post-installation    Minimize fail overtime    Performance considerations   Distinct cluster configurations SQL Server clusters can be configured in four distinct configurations: • Single instance – formerly called Active/Passive – presents to client applications as a single virtual server where the one node is online and the other node is in a standby state. The node online (called the primary) has all the resources, while the standby node (called the secondary) is offline and does not have ownership of any of the resources.   • Multi-instance – formerly called Active/Active – presents to the client as multiple virtual servers where multiple nodes can be online simultaneously, and resources are shared in distinct units called resource groups. At any one time one node can have no resource groups, one resource group or all resource groups. In this example we are talking about a two node cluster, but clustering is not limited to two nodes. Depending on your version, you can have two node, four node, or eight node clusters. SQL Server 2000 Enterprise Edition supports up to four nodes in a cluster, SQL Server 2005 Standard Edition supports up to two nodes in a failover cluster, and SQL Server 2005 Enterprise Edition supports as many nodes as the OS version will support: Currently this is up to eight nodes in a failover cluster using Windows Server 2003 Enterprise Edition. Note that clustering has special SQL licensing exceptions for certain cluster configurations. Regardless of the SQL configuration, you will need OS licenses for every node in your cluster. With single instance clusters you only need licensing as if it was a stand alone SQL Server.   • N+1 – multiple instance clusters, where multiple nodes all share the same failover node. This is considered more cost effective than multiple single instance clusters as it requires fewer physical machines. However, storage and licensing costs tend to be more expensive than individual machine costs, so this configuration is not a popular choice for very highly available scenarios.   • N+M – multiple instance clusters where multiple nodes all share the same failover nodes. This is commonly deployed as six to two, or five to three combinations on eight node clusters. It is used when some performance degradation is acceptable during severe failover events but the system must remain online. Refer to this article for more on  clustering best practices. Installation considerations can be grouped in three categories: Pre-installation, Installation, and Post-installation.   Pre-installation Verify the cluster is configured properly. Once you have built your Windows cluster, ensure the following: Check cluster disk resource group. You will need to add resource groups for each SQL virtual server. For example, your default instance might need to own disks D and E, while your named instance might need to own disks F and G. Create these disk resource groups in advance to make sure they can move around and will come online for all nodes. Choose and record the network name and IP address you will use for your virtual server. Follow these steps to Configure MSDTC.   Cluster installation If you are installing a SQL 2000 multi-instance cluster, make sure to use the SQL 2000a CD. There is an issue with the RTM version that you may encounter. Ensure you install off a local CD on a cluster node, or copy the files off the CD locally to the node on the cluster and install there. If you are installing off a network share, ensure all nodes have permission to read and list files and directories on the share without specifying network credentials. It is preferable to always attempt the installation from media locally on the node. There have been cases when installing of installation media on a network has failed. In SQL Server 2000, you must create a named pipes alias to any named instance before you install it. For example, you want to install a named instance called SQLInstance; you would create an alias to SQLInstance\SQLInstance using the SQL client network utility and then start the installation. For SQL 2000, the virtual server name and the instance name are the same. Consult this article for more on the Installation of a named instance. The client alias limitation has been removed in SQL 2005. Also removed in SQL 2005 is the 16 node limit for instances running per server (clustered or standalone). You can now run up to 50 instances, should your server have the hardware to support it. Start the installation from the node that owns the disk resource you want the SQL instance to use. The SQL installer will prompt you for the network name and the IP address, then it will create the actual virtual server. Test failing over the virtual server to each allowed node. Move any additional disk resources into this SQL instance's resource group – for example a disk resource group for the data files and another for the log files. Make the SQL service dependent on any new disk resources or it will be unable to place SQL data or log files on these resources.   Post-installation Make sure that max server memory is capped for each instance, and the total of all the max server memory is less than total physical RAM. For example, on SQL Server Instance A, you may set max server memory at 1 Gig; on SQL Server Instance B, you may set it at 1 Gig, where the total is 2 Gigs; which is less than your physical RAM. Force the TCP port – When you fail over the SQL Virtual Server to another node and then fail back to the original node, SQL Virtual Server sometimes fails to bind to the port on which it is listening. Check out this Microsoft article on Binding to the TCP/IP port for more information. Test connection to your SQL Server virtual instances through Query Analyzer by entering TCP:ServerName in the SQL Server dialog box from your desktop. If this fails, then make sure you can connect locally from the virtual server itself. Verify performance counters are on all nodes. Consult this Mircrosoft page on PRB: SQL Performance Monitor Counters Missing for assistance.   Minimize failover time When you are using any high availability technology, you want to minimize failover times. There are two factors that impact the failover times: • Length of outstanding transactions During the failover process, the database files and transactions logs are transferred to the second node. When the SQL Server starts, it recovers the databases and rollback/forward uncommitted/committed transactions in the transaction log. If your application using the cluster has long-running transactions, this can delay the recovery times, meaning the cluster will take longer to fail over and come back online. • Network latency Network latency is best improved by optimizing your network connections. Clustering has two separate networks – one is private for communication between nodes, and the second is a public network, which is how the clients connect to the virtual server. Clustering requires a 150 ms or better ping response time between nodes in a cluster. Should the ping time exceed this, the standby node may decide the primary node has failed and begin the failover process. To prevent this, ensure the private network is isolated from the public network. On your private network, consider isolating traffic by implementing a VLAN (virtual LAN), a separate subnet or use a crossover cable for two-node clusters. Make sure you follow the below guidelines for your private network: • Use TCP/IP as the only protocol bound to the NIC. • No default gateway is configured. • No DNS servers are configured unless the cluster nodes are DNS servers, in which case 127.0.0.1 should be configured. • No DNS registration or DNS suffix is configured. • No WINS servers are configured. • Static IP addresses are used for all nodes. • NetBIOS over TCP/IP is disabled. • No NIC teaming is used, where two network interface cards are aggregated together to act as a single NIC card. (Note that NIC teaming can be used on any public NICs).   Performance considerations Single instance clustering is used to provide high availability and high performance. Multiple instance clustering is used to also provide high availability, but is used when high performance is not as critical as high availability. During a failure event, a single node in your multi-instance cluster may be supporting all instances in the cluster. You must test to ensure that the performance delivered by all instances running on a single node will meet the SLAs of your clients. To do this, your multi-instance clusters need to be considerably more beefy than their single instance counterparts. Some cluster engineers suggest each node in a cluster should have twice the processors and twice the RAM as its single instance counterpart. The cluster hardware must be modular and able to accept hot pluggable components to service the increased load, as a single node supports more and more instances. SQL Server 2005 Enterprise Edition utilizes Hot Swappable Memory should the hardware support it. You should limit the default worker threads for each instance of SQL Server. By default, on a 32 bit server (clustered or unclustered) with four or less processors, you should set the max worker threads to 256 threads. On an eight-way, set the default worker threads to 288 threads. On a 64-bit server with four or less processors set the max worker threads to 512 threads, and on a 64 bit eight-way, set the default worker threads to 576 threads. Use sp_configure 'max worker threads' to adjust the worker threads. By default it will be 0. On a multi-instance cluster, you may find there are not enough system resources to run all instances on a single node with these settings. You may have to adjust the number of threads to a lower amount. You can also set the affinity mask so each instance only uses its own subset of the available processors. Summary Creating SQL Server multi-instance clusters is complex. You have to ensure that you have adequate hardware for both instances to run on a single node with acceptable performance degradation on both instances. The installation procedure is more complex as you are installing two virtual instances of SQL Server that must coexist. Installed correctly, multi-instance clusters can provide high performance and high availability and can be cheaper than two single instance clusters. Linchi Shea and Geoff Hiten contributed to this article.   ABOUT THE AUTHOR Hilary Cotter has been involved in IT for more than 20 years as a Web and database consultant. Microsoft first awarded Cotter the Microsoft SQL Server MVP award in 2001. Cotter received his bachelor of applied science degree in mechanical engineering from the University of Toronto and studied economics at the University of Calgary and computer science at UC Berkley. He is the author of a book on SQL Server transactional replication and is currently working on books on merge replication and Microsoft search technologies. Copyright 2006 TechTarget This was first published in November 2006 Dig Deeper on Microsoft SQL Server Installation 1 comment Oldest  Forgot Password? No problem! Submit your e-mail address below. We'll send you an email containing your password. Your password has been sent to: -ADS BY GOOGLE SearchBusinessAnalytics SearchDataCenter SearchDataManagement SearchAWS SearchOracle SearchContentManagement SearchWindowsServer Close
{ "url": "http://searchsqlserver.techtarget.com/tip/Active-Active-clusters-in-SQL-Server", "source_domain": "searchsqlserver.techtarget.com", "snapshot_id": "crawl=CC-MAIN-2016-07", "warc_metadata": { "Content-Length": "112987", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:7MJAEZPX26UCXFOE2GFJCKH3F7WTNW5C", "WARC-Concurrent-To": "<urn:uuid:9c3442f8-d924-4453-ad1f-7b89a6555557>", "WARC-Date": "2016-02-06T11:22:49Z", "WARC-IP-Address": "206.19.49.154", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:ROSMZQ2HXKKINZOPVAJDBVD3D4PQ4VS6", "WARC-Record-ID": "<urn:uuid:e7204fca-85e0-4a18-9f21-96472ea467ca>", "WARC-Target-URI": "http://searchsqlserver.techtarget.com/tip/Active-Active-clusters-in-SQL-Server", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c846a55b-ad8b-4875-a522-452418f3d258>" }, "warc_info": "robots: classic\r\nhostname: ip-10-236-182-209.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-07\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for February 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 37, 38, 443, 444, 559, 560, 842, 843, 885, 886, 947, 948, 1009, 1010, 1071, 1072, 1948, 1949, 1967, 2002, 2022, 2046, 2067, 2093, 2123, 2124, 2126, 2158, 2159, 2230, 2231, 2586, 2587, 2593, 2594, 3735, 3736, 3742, 3743, 4131, 4132, 4138, 4139, 4513, 4514, 4633, 4635, 4652, 4653, 4760, 4761, 5104, 5105, 5232, 5234, 5255, 5256, 5411, 5412, 5885, 5886, 6325, 6326, 6578, 6579, 7149, 7151, 7169, 7170, 7503, 7504, 8027, 8028, 8168, 8170, 8193, 8194, 8338, 8339, 8378, 8379, 8795, 8796, 8816, 8817, 9582, 9583, 9637, 9675, 9797, 9850, 9886, 9934, 9971, 10142, 10143, 10145, 10172, 10173, 10914, 10915, 12025, 12026, 12034, 12513, 12514, 12571, 12573, 12574, 12591, 13117, 13143, 13144, 13186, 13187, 13235, 13236, 13246, 13247, 13255, 13256, 13273, 13274, 13370, 13371, 13403, 13404, 13419, 13420, 13444, 13445, 13462, 13463, 13484, 13485, 13495, 13496, 13509, 13510, 13534, 13535, 13555, 13556 ], "line_end_idx": [ 37, 38, 443, 444, 559, 560, 842, 843, 885, 886, 947, 948, 1009, 1010, 1071, 1072, 1948, 1949, 1967, 2002, 2022, 2046, 2067, 2093, 2123, 2124, 2126, 2158, 2159, 2230, 2231, 2586, 2587, 2593, 2594, 3735, 3736, 3742, 3743, 4131, 4132, 4138, 4139, 4513, 4514, 4633, 4635, 4652, 4653, 4760, 4761, 5104, 5105, 5232, 5234, 5255, 5256, 5411, 5412, 5885, 5886, 6325, 6326, 6578, 6579, 7149, 7151, 7169, 7170, 7503, 7504, 8027, 8028, 8168, 8170, 8193, 8194, 8338, 8339, 8378, 8379, 8795, 8796, 8816, 8817, 9582, 9583, 9637, 9675, 9797, 9850, 9886, 9934, 9971, 10142, 10143, 10145, 10172, 10173, 10914, 10915, 12025, 12026, 12034, 12513, 12514, 12571, 12573, 12574, 12591, 13117, 13143, 13144, 13186, 13187, 13235, 13236, 13246, 13247, 13255, 13256, 13273, 13274, 13370, 13371, 13403, 13404, 13419, 13420, 13444, 13445, 13462, 13463, 13484, 13485, 13495, 13496, 13509, 13510, 13534, 13535, 13555, 13556, 13561 ] }
{ "red_pajama_v2": { "ccnet_original_length": 13561, "ccnet_original_nlines": 143, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.38991934061050415, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03951612859964371, "rps_doc_frac_lines_end_with_ellipsis": 0.006944439839571714, "rps_doc_frac_no_alph_words": 0.12298387289047241, "rps_doc_frac_unique_words": 0.2742230296134949, "rps_doc_mean_word_length": 5.017824649810791, "rps_doc_num_sentences": 117, "rps_doc_symbol_to_word_ratio": 0.0004032299912068993, "rps_doc_unigram_entropy": 5.519454479217529, "rps_doc_word_count": 2188, "rps_doc_frac_chars_dupe_10grams": 0.0677657276391983, "rps_doc_frac_chars_dupe_5grams": 0.11521997302770615, "rps_doc_frac_chars_dupe_6grams": 0.08361417055130005, "rps_doc_frac_chars_dupe_7grams": 0.07432370632886887, "rps_doc_frac_chars_dupe_8grams": 0.0677657276391983, "rps_doc_frac_chars_dupe_9grams": 0.0677657276391983, "rps_doc_frac_chars_top_2gram": 0.02049366943538189, "rps_doc_frac_chars_top_3gram": 0.007013389840722084, "rps_doc_frac_chars_top_4gram": 0.005920390132814646, "rps_doc_books_importance": -1045.702880859375, "rps_doc_books_importance_length_correction": -1045.702880859375, "rps_doc_openwebtext_importance": -634.3587036132812, "rps_doc_openwebtext_importance_length_correction": -634.3587036132812, "rps_doc_wikipedia_importance": -470.5584716796875, "rps_doc_wikipedia_importance_length_correction": -470.5584716796875 }, "fasttext": { "dclm": 0.024107810109853745, "english": 0.9064139723777771, "fineweb_edu_approx": 2.395059585571289, "eai_general_math": 0.36817222833633423, "eai_open_web_math": 0.15425676107406616, "eai_web_code": 0.539393961429596 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.445", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.758", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "8", "label": "Documentation" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-3,738,646,873,774,360,000
fortraveladvicelovers.com Coral reefs: where are they found, how are they formed and which are the most beautiful Who I am Martí Micolau @martímicolau EXTERNAL REFERENCES: SOURCES CONSULTED: wikipedia.org, lonelyplanet.com Article rating: Content warning Coral reefs are underwater forests rich in living species. Consider that at least 25% of all marine species in the world live in the waters of coral reefs. Also known by the English name Reef, the majority of coral reefs in the world are actually made up of many smaller fractions, connected in a single ecosystem. Here's everything you need to know about barrier Reef: how it is formed, where it is in the world, and which are the biggest and most beautiful! Index 1. How the coral reef is formed 2. The most beautiful coral reefs in the world 3. Coral bleaching and death 4. Curiosities about the coral reef 5. User questions and comments How the coral reef is formed The spectacular coral reefs they are "built" by the Antozoi, small octopus-shaped organisms that need clear, illuminated and oxygenated waters in order to live. These tiny polyps they gather in colonies called Coralli, and live in symbiosis with unicellular algae called zooxanthellae. Through the photosynthesis process of these algae, the small organisms constitute a sort of skeleton of calcium carbonate which assumes a protective and support function. Over time, these skeletons merge with each other creating coral structures hard as rock. The structures are called "barriers" when they are separated from the coast by a shallow lagoon. When they are found near the coast, they are called "coral reefs". The most beautiful coral reefs in the world As already specified, corals need certain conditions to live, including good lighting, sea temperatures between 20 ° and 30 ° C and high salinity. These conditions unite the areas of the central Pacific and the Australian east coast, not surprisingly, almost all of the existing reefs are concentrated in these areas. On the contrary, the western coasts of the continents are not suitable for developing barriers due to cold currents. But where are the most beautiful and largest barriers in the world located? Let's find out in the following ranking. 1 - Great Barrier Reef, Australia La Great Barrier Reef of Australia it is located off the coast of Queensland and is known to be the largest coral reef in the world. It is made up of some 3.000 barrier systems. Just think that it is so big that it is visible from space. Since 1981 it has been part of the UNESCO World Heritage Site. 2 - Coral reef in the Red Sea, Egypt The Red Sea coral reef is found off the coasts of Egypt, Israel and Saudi Arabia. Ten percent of the 1.200 species found in this coral reef are unique to this area. This place includes the Blue Hole of Dahab, one of the most popular and dangerous dive sites in the world. 3 - Reef of New Caledonia, New Caledonia The New Caledonian Barrier Reef, in the South Pacific, is the third longest barrier in the world. More than 1.000 different species - many of which have not yet been classified - live within this coral reef. New Caledonia encloses a 1.500 km circular lagoon and reaches an average depth of 25 meters. In 2008, UNESCO included it among the World Heritage Sites, giving it the name of "Lagoons of New Caledonia". 4 - Mesoamerican Reef, Yucatán, Belize, Guatemala and the islands of the Honduras Bay The Mesoamerican Reef, located in the Caribbean basin is the largest coral reef in the Atlantic Ocean. The coral reef extends almost 1.126 km, from the Yucatan Peninsula to the Bay of Islands, in Honduras. Over 500 species of fish and 65 types of coral live within this large reef system. It has been a UNESCO World Heritage Site since 1996. 5 - Coral reef of the Maldives Islands, Indian Ocean The Maldives are the largest coral reef system in the entire Indian Ocean. The islands that make up the atoll are formed by volcanic eruptions and contain more than 1.300 coral reefs. 6 - Apo Coral Reef, Philippines The Apo Reef is the largest barrier in the Philippines. This barrier is 800km long and covers 67,877 acres off the coast of Mindoro Island and is surrounded by a mangrove forest. Due to previous problems, in 2007, the Philippine government enacted a ban on reef fishing to help restore and preserve its pristine nature. 7 - Belize barrier reef, Caribbean Sea The Belize Barrier Reef is a part of the Mesoamerican Reef system. The reef stretches from Ambergris Caye in the north to Cayes Sapodilla in the south. This coral reef is protected by the UNESCO program, which deals with the world heritage of humanity. 8 - Saya de Malha, Indian Ocean Saya de Malha Banks in the Indian Ocean is the largest submerged reef in the world. This ridge connects the Seychelles and Mauritius islands to the Mascarene Plateau. Together with its coral reef, the marine habitat facilitates the life of particular species such as turtle and blue whales. 9 - Andros Reef, Bahamas The coral reef of Andros, in the Bahamas, stretches for approximately 167 km in length. The island is located along the edge of a ocean trench known as the "language of the sea". This means that the barrier extends downwards, this particularity allows it to reach one depth of almost 2 km. 10 - Florida Keys, United States The Florida Keys Reef system is thethe only coral reef system in North America. This system extends 160km along the southeastern coast of Florida, from Key Biscayne to the Dry Tortugas. The reef is protected as if it were an underwater state park. Images and videos /9 Coral bleaching and death In recent years, the symbiotic relationship between coral polyps and algae has been altered by rising water temperatures, which in turn are caused by global warming. For reasons not yet fully known, this is leading to the discoloration of corals as well as their progressive death. According to a study conducted by the James Cook University of Australia, over 90% of the Great Barrier Reef has been affected by the bleaching phenomenon. Other causes of coral death are insane fishing, tourism, ecological imbalances and pollution. Curiosities about the coral reef • What is the largest coral reef in the world? It is the great Australian coral reef, which extends for about 2.300 km • Is there a coral reef in Sardinia? There are no coral reefs in the Italian territory. The closest is the Red Sea Reef along the coast of Egypt. Among the main places where you can admire it there is Marsa Alam. • How long does it take for a coral reef to form? It takes thousands of years and several millions of colonies to form relevant coral structures Audio Video Coral reefs: where are they found, how are they formed and which are the most beautiful Add a comment from Coral reefs: where are they found, how are they formed and which are the most beautiful Comment sent successfully! We will review it in the next few hours.
{ "url": "https://www.fortraveladvicelovers.com/en/coral-reefs-where-are-they-found-how-are-they-formed-and-which-are-the-most-beautiful", "source_domain": "www.fortraveladvicelovers.com", "snapshot_id": "crawl=CC-MAIN-2022-05", "warc_metadata": { "Content-Length": "91640", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:IFP3DHEGT7FUH56IO6LNS7YXO32IATNX", "WARC-Concurrent-To": "<urn:uuid:f67c832f-eec0-46fc-832f-c3c0caf4cc52>", "WARC-Date": "2022-01-27T10:42:50Z", "WARC-IP-Address": "176.31.197.132", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:BSLVK4G4JBQDKODSLXJETV6SNJJAGV6J", "WARC-Record-ID": "<urn:uuid:9a8951a1-52cc-4b3c-9658-b349ba6aeef2>", "WARC-Target-URI": "https://www.fortraveladvicelovers.com/en/coral-reefs-where-are-they-found-how-are-they-formed-and-which-are-the-most-beautiful", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:6b8d16f0-a760-4ce7-9d98-e52dc34b42e2>" }, "warc_info": "isPartOf: CC-MAIN-2022-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-200\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 26, 27, 115, 116, 125, 139, 153, 174, 175, 194, 195, 227, 228, 244, 245, 261, 262, 577, 578, 723, 724, 725, 726, 732, 733, 767, 816, 847, 885, 918, 919, 948, 949, 1235, 1236, 1660, 1661, 1705, 1706, 2141, 2142, 2259, 2260, 2261, 2262, 2296, 2297, 2535, 2598, 2599, 2636, 2637, 2909, 2910, 2951, 2952, 3363, 3364, 3450, 3451, 3793, 3794, 3795, 3796, 3849, 3850, 3925, 4034, 4035, 4067, 4068, 4388, 4389, 4428, 4429, 4581, 4682, 4683, 4684, 4716, 4717, 5008, 5009, 5010, 5035, 5036, 5326, 5327, 5360, 5361, 5609, 5610, 5628, 5629, 5632, 5633, 5659, 5660, 6098, 6099, 6193, 6194, 6227, 6228, 6277, 6353, 6392, 6572, 6719, 6819, 6926 ], "line_end_idx": [ 26, 27, 115, 116, 125, 139, 153, 174, 175, 194, 195, 227, 228, 244, 245, 261, 262, 577, 578, 723, 724, 725, 726, 732, 733, 767, 816, 847, 885, 918, 919, 948, 949, 1235, 1236, 1660, 1661, 1705, 1706, 2141, 2142, 2259, 2260, 2261, 2262, 2296, 2297, 2535, 2598, 2599, 2636, 2637, 2909, 2910, 2951, 2952, 3363, 3364, 3450, 3451, 3793, 3794, 3795, 3796, 3849, 3850, 3925, 4034, 4035, 4067, 4068, 4388, 4389, 4428, 4429, 4581, 4682, 4683, 4684, 4716, 4717, 5008, 5009, 5010, 5035, 5036, 5326, 5327, 5360, 5361, 5609, 5610, 5628, 5629, 5632, 5633, 5659, 5660, 6098, 6099, 6193, 6194, 6227, 6228, 6277, 6353, 6392, 6572, 6719, 6819, 6926, 6993 ] }
{ "red_pajama_v2": { "ccnet_original_length": 6993, "ccnet_original_nlines": 111, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3641025722026825, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.007326010148972273, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.156776562333107, "rps_doc_frac_unique_words": 0.3799494504928589, "rps_doc_mean_word_length": 4.6807074546813965, "rps_doc_num_sentences": 74, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.186747074127197, "rps_doc_word_count": 1187, "rps_doc_frac_chars_dupe_10grams": 0.0377969816327095, "rps_doc_frac_chars_dupe_5grams": 0.08963283151388168, "rps_doc_frac_chars_dupe_6grams": 0.07595392316579819, "rps_doc_frac_chars_dupe_7grams": 0.06767459213733673, "rps_doc_frac_chars_dupe_8grams": 0.06263498961925507, "rps_doc_frac_chars_dupe_9grams": 0.04967603087425232, "rps_doc_frac_chars_top_2gram": 0.022498199716210365, "rps_doc_frac_chars_top_3gram": 0.01979842036962509, "rps_doc_frac_chars_top_4gram": 0.010079190135002136, "rps_doc_books_importance": -673.7980346679688, "rps_doc_books_importance_length_correction": -673.7980346679688, "rps_doc_openwebtext_importance": -405.2274169921875, "rps_doc_openwebtext_importance_length_correction": -405.2274169921875, "rps_doc_wikipedia_importance": -325.293212890625, "rps_doc_wikipedia_importance_length_correction": -325.293212890625 }, "fasttext": { "dclm": 0.3992796540260315, "english": 0.9374936819076538, "fineweb_edu_approx": 3.140758991241455, "eai_general_math": 0.02187746949493885, "eai_open_web_math": 0.18028759956359863, "eai_web_code": 0.0006386599852703512 } }
{ "free_decimal_correspondence": { "primary": { "code": "577.78", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Life (Biology)" } }, "secondary": { "code": "577.782", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Life (Biology)" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "12", "label": "Listicle" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-3,504,097,242,447,598,000
home about introduction 1. human 2. computer 3. interaction 4. paradigms 5. design basics 6. software process 7. design rules 8. implementation 9. evaluation 10. universal design 11. user support 12. cognitive models 13. socio-organizational 14. comm and collab 15. task models 16. dialogue 17. system models 18. rich interaction 19. groupware 20. ubicomp, VR, vis 21. hypertext and WWW references resources exercises online editions community search CHAPTER 21 hypertext, multimedia and the world-wide web  outline   links   resources   exercises  EXERCISE 21.1 Experiment with HyperCard or another hypertext system if you have access to one. As you work through the system, draw a map of the links and connections. Is it clear where you are and where you can get to at any point? If not, how could this be improved? answer This is an experimental exercise which requires access to a hypertext system. It can be used as the basis for a practical class, in which students analyze the effectiveness of the system. Drawing the map has two purposes: one is to reinforce the overall structure of the hypertext; the other is to test the navigational support that is available. Whether it is sufficient will depend on the system under scrutiny, but possible improvements would be to provide an explicit map, escape buttons, explicit paths to core material. The system may of course incorporate such features.   EXERCISE 21.2 Do the same for this book's website and tell us what you think! answer open-ended investigation   EXERCISE 21.3 What factors are likely to delay the widespread use of video in interfaces? What applications could benefit most from its use? answer Some of the factors are the costs in terms of hardware and software for compression and decompression; the slow speed due to the high bandwidth; the overall cost of equipment (for example, camera, video, CD); the lack of design tools to exploit video; the lack of specialist skills amongst designers. Many applications have been suggested as candidates for the integration of video. Educational systems, games and help systems are liable to benefit since information can be passed more clearly and memorably and new dimensions added. Other areas such as virtual reality can use video together with graphics in the creation of their artificial worlds. CSCW systems can use video to provide a face-to-face communication link between distributed workers (see Chapters 14 and 19). However, although these appear to be areas where video has a promising future, its use needs to be carefully considered and its consequences investigated. It may be that it will not fulfil its initial promise.   EXERCISE 21.4 Using a graphics package such as Adobe Photoshop or Macromedia Fireworks, save different types of image (photographs, line drawings, text) in different formats (GIF, JPEG, PNG). Compare the file sizes of the different formats, experimenting with different compression ratios (where applicable), numbers of colours, etc. answer open-ended investigation
{ "url": "http://www.hcibook.com/e3/plain/chaps/ch21/exercises", "source_domain": "www.hcibook.com", "snapshot_id": "crawl=CC-MAIN-2018-30", "warc_metadata": { "Content-Length": "11922", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:BM6HQ5254FMWUNMXHH56DMUAZJCWK5GQ", "WARC-Concurrent-To": "<urn:uuid:35110480-7454-4290-8172-b784dbca743a>", "WARC-Date": "2018-07-23T11:50:54Z", "WARC-IP-Address": "77.73.2.194", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:M2BD6YVNDNIJYU2TX2RHZB3X7WZRNP5P", "WARC-Record-ID": "<urn:uuid:5afaf273-e216-42cc-9b20-2ab472b7d9c2>", "WARC-Target-URI": "http://www.hcibook.com/e3/plain/chaps/ch21/exercises", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:15de8317-be03-40c9-a2b2-5676b230c6b3>" }, "warc_info": "robots: classic\r\nhostname: ip-10-179-103-175.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 5, 11, 12, 25, 34, 46, 61, 74, 91, 111, 127, 145, 159, 180, 197, 218, 243, 263, 279, 292, 310, 331, 345, 366, 388, 399, 400, 410, 420, 427, 436, 446, 453, 454, 465, 510, 511, 521, 522, 530, 531, 543, 544, 556, 557, 571, 572, 827, 828, 835, 836, 1024, 1025, 1415, 1416, 1418, 1419, 1433, 1434, 1498, 1499, 1506, 1507, 1532, 1533, 1535, 1536, 1550, 1551, 1678, 1679, 1686, 1687, 2674, 2675, 2677, 2678, 2692, 2693, 3013, 3014, 3021, 3022 ], "line_end_idx": [ 5, 11, 12, 25, 34, 46, 61, 74, 91, 111, 127, 145, 159, 180, 197, 218, 243, 263, 279, 292, 310, 331, 345, 366, 388, 399, 400, 410, 420, 427, 436, 446, 453, 454, 465, 510, 511, 521, 522, 530, 531, 543, 544, 556, 557, 571, 572, 827, 828, 835, 836, 1024, 1025, 1415, 1416, 1418, 1419, 1433, 1434, 1498, 1499, 1506, 1507, 1532, 1533, 1535, 1536, 1550, 1551, 1678, 1679, 1686, 1687, 2674, 2675, 2677, 2678, 2692, 2693, 3013, 3014, 3021, 3022, 3046 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3046, "ccnet_original_nlines": 83, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.365217387676239, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.02086956985294819, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.208695650100708, "rps_doc_frac_unique_words": 0.5882353186607361, "rps_doc_mean_word_length": 5.1218485832214355, "rps_doc_num_sentences": 47, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.248063087463379, "rps_doc_word_count": 476, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.010254310443997383, "rps_doc_frac_chars_top_3gram": 0.022969650104641914, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -268.3410949707031, "rps_doc_books_importance_length_correction": -268.3410949707031, "rps_doc_openwebtext_importance": -132.028564453125, "rps_doc_openwebtext_importance_length_correction": -132.028564453125, "rps_doc_wikipedia_importance": -52.871089935302734, "rps_doc_wikipedia_importance_length_correction": -52.871089935302734 }, "fasttext": { "dclm": 0.6003538370132446, "english": 0.9119834303855896, "fineweb_edu_approx": 2.934443712234497, "eai_general_math": 0.8059961795806885, "eai_open_web_math": 0.27980154752731323, "eai_web_code": 0.33287715911865234 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.67", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "4", "label": "Analyze" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "23", "label": "Tutorial" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-7,832,016,723,430,286,000
Resolving type parameter in module functor Hi [Yawar, sorry] et. al :wink: Back into module types and functors trying to build essentially a composable reducer system. rescript-lang/try example module type Partial = { type partial let reduce: (partial, 'action) => option<partial> } module Float = { type partial = float let reduce = (partial: partial, action: 'action): option<partial> => { switch action { | #Set(a) => ... } module Array = (E: Partial) => { type structure<'e> = array<'e> type partial = structure<E.partial> let reduce = (p: partial, action: [#Index(int, 'action)]): option<partial> => { switch action { | #Index(index, action) => <find element, send action to element, recompose array> } and this fails with Signature mismatch: ... Values do not match: let reduce: (partial, [> #Clear | #Set(partial)]) => option<partial> is not included in let reduce: (partial, 'action) => option<partial> File "playground.res", line 3, characters 3-52: Expected declaration File "playground.res", line 8, characters 7-13: Actual declaration Any thoughts? Saying poly variant not in type parameter doesnt compute for me. It seems like the type parameter is being resolved at the source module maybe and not at the calling-module? Thanks again Alex Someone can probably explain the nuances better than me, but one solution is to explicitly declare the action type: module type Partial = { type partial ++ type action -- let reduce: (partial, 'action) => option<partial> ++ let reduce: (partial, action) => option<partial> } module Float = { type partial = float ++ type action = [#Set(partial) | #Clear] let reduce = (partial: partial, action: action): option<partial> => { switch action { | #Set(a) => ... } This should compile now. Thanks John That solves the product case but then the poly variants [would not be] summable? sum type action composition I’m not sure if that’s feasible (anyone, feel free to correct me), but I’d also question if that’s a desirable design in the first place. How would the implementation of Either.reduce work? This makes more sense to me: type action = [#Left(L.partial) | #Right(R.partial) | #LAaction(L.action) | #RAction(R.action)] Otherwise, if L.action and R.action share any of the same constructors, then it’s ambiguous how the reduce function should behave (even if it compiles). poly variants do sum nicely. and failed compile on conflicting constructors sounds good: poly variant sum conflicts My immediate application is a Sum where both sides are products with some equivalent fields. So id rather not have to be aware at the client level which value the sum is taking when i send a new action. I could see both overlapping and non overlapping sums being useful, and available with either different Functors or some supplied policy module @yawaramin do you know anything about this? Other examples I’ve seen in ocaml seem to deal with concrete type name interference, but these are poly variants and type parameters mostly? [just realized i got your name wrong above, excuse me] Thanks Alex
{ "url": "https://forum.rescript-lang.org/t/resolving-type-parameter-in-module-functor/2601", "source_domain": "forum.rescript-lang.org", "snapshot_id": "CC-MAIN-2023-14", "warc_metadata": { "Content-Length": "29932", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:CZAUBR45QNVQHDYPL7KE6JIGLIDNX5EU", "WARC-Concurrent-To": "<urn:uuid:1c6f0367-a108-4253-bfba-fff2c81592ba>", "WARC-Date": "2023-03-29T19:39:06Z", "WARC-IP-Address": "64.227.27.123", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:JEAIFUFUS54MTGWQU4TZRKMVECEXYPME", "WARC-Record-ID": "<urn:uuid:0d22bc30-0a7c-4bb6-b50a-db8c3d851c9a>", "WARC-Target-URI": "https://forum.rescript-lang.org/t/resolving-type-parameter-in-module-functor/2601", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:22bcb197-d7a9-44e3-8bbc-c5a10a7bfa64>" }, "warc_info": "isPartOf: CC-MAIN-2023-14\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-94\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 43, 44, 76, 169, 170, 196, 197, 221, 236, 288, 290, 291, 308, 331, 405, 425, 448, 450, 451, 484, 517, 555, 556, 638, 658, 747, 749, 750, 770, 771, 791, 797, 820, 893, 914, 968, 1039, 1108, 1109, 1188, 1297, 1298, 1311, 1316, 1317, 1433, 1434, 1458, 1473, 1489, 1543, 1596, 1598, 1599, 1616, 1639, 1682, 1755, 1775, 1798, 1800, 1801, 1826, 1827, 1839, 1920, 1921, 1949, 1950, 2140, 2141, 2170, 2171, 2267, 2268, 2421, 2422, 2511, 2512, 2539, 2540, 2743, 2744, 2888, 2889, 2933, 2934, 3075, 3076, 3131, 3138 ], "line_end_idx": [ 43, 44, 76, 169, 170, 196, 197, 221, 236, 288, 290, 291, 308, 331, 405, 425, 448, 450, 451, 484, 517, 555, 556, 638, 658, 747, 749, 750, 770, 771, 791, 797, 820, 893, 914, 968, 1039, 1108, 1109, 1188, 1297, 1298, 1311, 1316, 1317, 1433, 1434, 1458, 1473, 1489, 1543, 1596, 1598, 1599, 1616, 1639, 1682, 1755, 1775, 1798, 1800, 1801, 1826, 1827, 1839, 1920, 1921, 1949, 1950, 2140, 2141, 2170, 2171, 2267, 2268, 2421, 2422, 2511, 2512, 2539, 2540, 2743, 2744, 2888, 2889, 2933, 2934, 3075, 3076, 3131, 3138, 3142 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3142, "ccnet_original_nlines": 91, "rps_doc_curly_bracket": 0.00509230000898242, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.24820660054683685, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.0172166395932436, "rps_doc_frac_lines_end_with_ellipsis": 0.032608699053525925, "rps_doc_frac_no_alph_words": 0.33715924620628357, "rps_doc_frac_unique_words": 0.5352112650871277, "rps_doc_mean_word_length": 5.38732385635376, "rps_doc_num_sentences": 29, "rps_doc_symbol_to_word_ratio": 0.02152080088853836, "rps_doc_unigram_entropy": 4.9802961349487305, "rps_doc_word_count": 426, "rps_doc_frac_chars_dupe_10grams": 0.10980392247438431, "rps_doc_frac_chars_dupe_5grams": 0.16470588743686676, "rps_doc_frac_chars_dupe_6grams": 0.10980392247438431, "rps_doc_frac_chars_dupe_7grams": 0.10980392247438431, "rps_doc_frac_chars_dupe_8grams": 0.10980392247438431, "rps_doc_frac_chars_dupe_9grams": 0.10980392247438431, "rps_doc_frac_chars_top_2gram": 0.0313725508749485, "rps_doc_frac_chars_top_3gram": 0.048801738768815994, "rps_doc_frac_chars_top_4gram": 0.03834423050284386, "rps_doc_books_importance": -302.2425231933594, "rps_doc_books_importance_length_correction": -302.2425231933594, "rps_doc_openwebtext_importance": -166.0752716064453, "rps_doc_openwebtext_importance_length_correction": -166.0752716064453, "rps_doc_wikipedia_importance": -148.51979064941406, "rps_doc_wikipedia_importance_length_correction": -148.51979064941406 }, "fasttext": { "dclm": 0.04703342914581299, "english": 0.8309491276741028, "fineweb_edu_approx": 2.194093704223633, "eai_general_math": 0.9446455240249634, "eai_open_web_math": 0.5075955986976624, "eai_web_code": 0.730819582939148 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.1332", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.133", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "4", "label": "Analyze" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "4", "label": "Highly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "4", "label": "Graduate/Expert Level" } } }
71f077df794da2774531b20248bb19b0
1,751,052,188,113,765,000
SUBSCRIBE BY RSS rss feed | EMAIL Natural Solutions Radio header image causes Avoid hypothyroidism by avoiding the causes By Edwards: (NaturalNews) There are many pathways available for the regulation of the production and conversion of thyroid hormones. Consequently, there are a lot of opportunities for things to go wrong. A healthy thyroid relies on many factors, including, but not limited to, a healthy endocrine system, stable hormone levels, healthy and balanced gut flora, a healthy liver, properly functioning adrenals, healthy kidneys, and clean, healthy blood. Candida
{ "url": "http://naturalsolutionsradio.com/category/topics/causes", "source_domain": "naturalsolutionsradio.com", "snapshot_id": "crawl=CC-MAIN-2018-13", "warc_metadata": { "Content-Length": "33151", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:5AKN5NSRYITLIE4XRGEWTUKW7XPNUWEH", "WARC-Concurrent-To": "<urn:uuid:84ab7779-9de1-45ae-bd38-cbd75d723b1d>", "WARC-Date": "2018-03-20T23:17:13Z", "WARC-IP-Address": "62.151.179.232", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:FL3VTGMS7ZLBP2TQR3WBXG6DXEYTBVZE", "WARC-Record-ID": "<urn:uuid:ca2185b9-b2d0-4f7a-9554-156599623377>", "WARC-Target-URI": "http://naturalsolutionsradio.com/category/topics/causes", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:c6eb277b-5966-479e-a706-5ae70aa2d2c8>" }, "warc_info": "robots: classic\r\nhostname: ip-10-236-64-221.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-13\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for March 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 34, 71, 72, 79, 80, 124, 125, 576, 577 ], "line_end_idx": [ 34, 71, 72, 79, 80, 124, 125, 576, 577, 584 ] }
{ "red_pajama_v2": { "ccnet_original_length": 584, "ccnet_original_nlines": 9, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.2788461446762085, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.048076920211315155, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.17307691276073456, "rps_doc_frac_unique_words": 0.7209302186965942, "rps_doc_mean_word_length": 5.534883499145508, "rps_doc_num_sentences": 4, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 3.982609748840332, "rps_doc_word_count": 86, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.05042016878724098, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -50.70183181762695, "rps_doc_books_importance_length_correction": -64.94664001464844, "rps_doc_openwebtext_importance": -30.28302001953125, "rps_doc_openwebtext_importance_length_correction": -44.527828216552734, "rps_doc_wikipedia_importance": -11.693892478942871, "rps_doc_wikipedia_importance_length_correction": -25.938701629638672 }, "fasttext": { "dclm": 0.16367298364639282, "english": 0.8991170525550842, "fineweb_edu_approx": 2.2617058753967285, "eai_general_math": 0.00032473000464960933, "eai_open_web_math": 0.040047649294137955, "eai_web_code": 0.0000443499993707519 } }
{ "free_decimal_correspondence": { "primary": { "code": "616.4", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } }, "secondary": { "code": "615.54", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Materia medica, Drugs, and Pharmacy" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "16", "label": "Personal Blog" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "1", "label": "No Reasoning" } }, "technical_correctness": { "primary": { "code": "6", "label": "Not Applicable/Indeterminate" }, "secondary": { "code": "2", "label": "Partially Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
7,361,726,709,028,109,000
Mesothelioma.com Resources for Patients and their Families Harbison-Walker Refractories The Harbison-Walker Refractories Company was founded in the late 1800's in Pennsylvania. It produced a variety of industrial materials that needed to be able to function during extreme temperatures. This led to the use of asbestos as a key component in their product line, because it has the ability to endure a great amount of heat or cold. Asbestos was a key ingredient in the items the company produced for many years, but it was eventually found to be poisonous to humans. Any person who gets near asbestos becomes subject to inhaling microscopic bits of the material, which will become lodged within their respiratory system. It can then lead to serious illnesses, make breathing difficult and result in an often deadly asbestos cancer, also known as mesothelioma. Signs of these health issues may not be noticeable for years (due to a long mesothelioma latency period), so it was a long time before the first victims of asbestos poisoning were linked to Harbison-Walker. Asbestos exposure is the primary cause of mesothelioma but smoking and mesothelioma are also related because people who smoke and are exposed to asbestos are more likely to develop the disease. Those diagnosed with the cancer often receive a poor prognosis from their doctor and because there is no cure, the mesothelioma survival rate statistics are often low. Fortunately, treatment for mesothelioma has improved and there are numerous mesothelioma cancer clinics that offer leading edge care for patients. This includes chemotherapy treatment with Alimta®, Onconase and Navelbine as well as surgical approaches involving extrapleural pneumonectomy and mesothelioma pneumonectomy. Visit our mesothelioma resources section or view our mesothelioma treatment guide for more information. By 1967, Harbison-Walker had been bought out by Dresser Industries, a Texas based company. Dresser was a subsidiary of Halliburton Energy Services, the company which received national recognition because it was formerly run by Vice President Dick Cheney. As a result of this purchase, Dresser was named as a co-defendant in the asbestos related personal injury claims that were being brought against Harbison-Walker. Company executives felt this meant that Haliburton should play a part in the litigation of all the ongoing lawsuits. Haliburton became involved in the proceedings, and determined that there were as many as 165,000 unfinished claims, although only about 52,000 were thought to be valid and worthy of a settlement fee. In response, the company spent $4.17 billion to pay off the plaintiffs of the remaining cases. By December of 2004, this amount had been officially approved and disbursed. The CEO of Haliburton declared that "The asbestos chapter in Halliburton's history is closed." Although Haliburton's involvement with asbestos issues may be over, the results of exposure may still affect people who worked with or around the products produced by Harbison-Walker. It would be prudent to check in with your healthcare provider should you have concerns. Mesothelioma Cancer Alliance Blog FEATURED CONTENT: RECENT POSTS: National Poison Prevention Week: Household Toxins to Avoid National Poison Prevention Week: The Dangers of Asbestos Joe Biden Gives a Cancer Moonshot Update at SXSW Conference
{ "url": "https://www.mesothelioma.com/asbestos-exposure/companies/harbison-walker-refractories.htm", "source_domain": "www.mesothelioma.com", "snapshot_id": "crawl=CC-MAIN-2017-13", "warc_metadata": { "Content-Length": "57805", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:QZ3CKUVHBTSJX6D6H3VIFBXXMEMY6DY5", "WARC-Concurrent-To": "<urn:uuid:868f42b1-32fd-492f-8886-8fe85667b302>", "WARC-Date": "2017-03-26T01:37:26Z", "WARC-IP-Address": "174.143.98.178", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:YBHXHDP6UC5KY7O7XPSDW56AEQLM76MJ", "WARC-Record-ID": "<urn:uuid:2102755e-5b75-481d-a2d9-4c4d266346fc>", "WARC-Target-URI": "https://www.mesothelioma.com/asbestos-exposure/companies/harbison-walker-refractories.htm", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:16bd73cf-de47-4056-8845-15824428e75d>" }, "warc_info": "robots: classic\r\nhostname: ip-10-233-31-227.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-13\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for March 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 59, 60, 89, 90, 567, 568, 1068, 1069, 1856, 1857, 2391, 2392, 2859, 2860, 3132, 3133, 3167, 3168, 3186, 3187, 3188, 3202, 3203, 3262, 3263, 3320, 3321 ], "line_end_idx": [ 59, 60, 89, 90, 567, 568, 1068, 1069, 1856, 1857, 2391, 2392, 2859, 2860, 3132, 3133, 3167, 3168, 3186, 3187, 3188, 3202, 3203, 3262, 3263, 3320, 3321, 3380 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3380, "ccnet_original_nlines": 27, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.4016949236392975, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.010169490240514278, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.11864407360553741, "rps_doc_frac_unique_words": 0.553398072719574, "rps_doc_mean_word_length": 5.415534019470215, "rps_doc_num_sentences": 25, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.19325065612793, "rps_doc_word_count": 515, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.00896378979086876, "rps_doc_frac_chars_top_3gram": 0.017210470512509346, "rps_doc_frac_chars_top_4gram": 0.020078880712389946, "rps_doc_books_importance": -277.83953857421875, "rps_doc_books_importance_length_correction": -277.83953857421875, "rps_doc_openwebtext_importance": -170.81822204589844, "rps_doc_openwebtext_importance_length_correction": -170.81822204589844, "rps_doc_wikipedia_importance": -115.623291015625, "rps_doc_wikipedia_importance_length_correction": -115.623291015625 }, "fasttext": { "dclm": 0.11362963914871216, "english": 0.9739497900009155, "fineweb_edu_approx": 2.6825878620147705, "eai_general_math": 0.029516279697418213, "eai_open_web_math": 0.13737356662750244, "eai_web_code": 0.00386565993539989 } }
{ "free_decimal_correspondence": { "primary": { "code": "614.5", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Public health" } }, "secondary": { "code": "628.5", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "Sanitary engineering, Sanitation, and Water-supply" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "1", "label": "News/Editorial" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "13", "label": "News (Org.)" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "2", "label": "High School Level" }, "secondary": { "code": "1", "label": "General Audience" } } }
71f077df794da2774531b20248bb19b0
3,681,372,592,083,022,000
Tom's Auto & Towing 11607 East Riggs Road, Chandler, AZ 85249 480.895.6936 Exhaust View Topic We've all heard a car or truck in our Chandler neighborhoods that needs a new muffler. But there's more to the exhaust system than just the muffler. The exhaust system has three main functions: • To safely get hot exhaust gas from the engine out the tailpipe • Treats the exhaust to remove harmful pollutants • Muffle the engine noise Exhaust gas is poisonous. You don't want it getting into the passenger compartment. For example, carbon monoxide can be deadly. That's why you should never run your engine in a closed garage. If you have a leak in the exhaust system, exhaust could get into the passenger cabin and make you sick or even kill you. If you smell exhaust in the vehicle, roll down your windows and get it inspected. You may smell or see exhaust coming from the engine compartment or under the vehicle if you have a leak. Sometimes the sound from an exhaust leak is loud and obvious. Sometimes it's a ticking sound when you start the engine that goes away as you drive. That could be a small crack or a bad fitting that leaks when it's cold but seals up when the metal heats and expands. Now, let's address the environmental issues for our Chandler community. Exhaust gas contains a number of pollutants and particulates. The catalytic converter scrubs some of those harmful substances. And diesel vehicles have systems to deal with soot. Catalytic converters eventually wear out and need to be replaced. They're expensive so you want to help them last as long as possible by keeping the fuel system clean and replacing your air filter. These components need to be tested for function with an emissions test from time to time. And that leaves the muffler. The beauty of getting a new muffler is that you can suit your taste: Some want whisper quiet and others like a little rumble. And some like a roar when they drive down our Chandler streets. Carbon monoxide is the leading cause of accidental poisoning deaths. It's a dangerous and potentially lethal toxin. Excessive exposure to auto exhaust can cause brain damage and even death. If you see, smell or hear exhaust anywhere but the tailpipe, get an auto inspection right away. At Tom's Auto & Towing in Chandler we install quality NAPA replacement parts. Give us a call at 480.895.6936 and let us help keep you safely and economically on the road.
{ "url": "http://tomsautotowing.napavision.com/topic/exhaust/", "source_domain": "tomsautotowing.napavision.com", "snapshot_id": "crawl=CC-MAIN-2017-34", "warc_metadata": { "Content-Length": "43975", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:ZFIH3UTIYIXPF2Q3UNMKBCL52KJDD445", "WARC-Concurrent-To": "<urn:uuid:996874cd-b9c5-4caf-8276-f881cea2d9ae>", "WARC-Date": "2017-08-23T15:30:02Z", "WARC-IP-Address": "54.152.121.132", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:YOKD62DL7CVOWIYCEWU3UHAMNH2KVULZ", "WARC-Record-ID": "<urn:uuid:04e494c2-04f9-4545-a855-e5fcd242583b>", "WARC-Target-URI": "http://tomsautotowing.napavision.com/topic/exhaust/", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:e6d352f2-6ff2-437a-b583-d355efb8bed6>" }, "warc_info": "robots: classic\r\nhostname: ip-10-166-54-12.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 20, 75, 76, 84, 85, 86, 97, 98, 247, 248, 293, 294, 361, 413, 441, 442, 755, 756, 1209, 1210, 1461, 1462, 1750, 1751, 1970, 1971 ], "line_end_idx": [ 20, 75, 76, 84, 85, 86, 97, 98, 247, 248, 293, 294, 361, 413, 441, 442, 755, 756, 1209, 1210, 1461, 1462, 1750, 1751, 1970, 1971, 2427 ] }
{ "red_pajama_v2": { "ccnet_original_length": 2427, "ccnet_original_nlines": 26, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.436734676361084, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.004081630147993565, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.13469387590885162, "rps_doc_frac_unique_words": 0.5190476179122925, "rps_doc_mean_word_length": 4.602380752563477, "rps_doc_num_sentences": 32, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.971656799316406, "rps_doc_word_count": 420, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.014485259540379047, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.02069322019815445, "rps_doc_frac_chars_top_3gram": 0.024831870570778847, "rps_doc_frac_chars_top_4gram": 0.010346610099077225, "rps_doc_books_importance": -213.99977111816406, "rps_doc_books_importance_length_correction": -213.99977111816406, "rps_doc_openwebtext_importance": -155.07090759277344, "rps_doc_openwebtext_importance_length_correction": -155.07090759277344, "rps_doc_wikipedia_importance": -118.2282485961914, "rps_doc_wikipedia_importance_length_correction": -118.2282485961914 }, "fasttext": { "dclm": 0.33712953329086304, "english": 0.9098241925239563, "fineweb_edu_approx": 2.0159032344818115, "eai_general_math": 0.010949850082397461, "eai_open_web_math": 0.19955426454544067, "eai_web_code": 0.003134730039164424 } }
{ "free_decimal_correspondence": { "primary": { "code": "629.227", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "" } }, "secondary": { "code": "629.22", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Engineering", "level_3": "" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "6", "label": "Promotional/Advertisement" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "3", "label": "Irrelevant Content" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
3,569,556,752,764,893,700
Secondary Structure The term secondary structure refers to the interaction of the hydrogen bond donor and acceptor residues of the repeating peptide unit. The two most important secondary structures of proteins, the alpha helix and the beta sheet, were predicted by the American chemist Linus Pauling in the early 1950s. Pauling and his associates recognized that folding of peptide chains, among other criteria, should preserve the bond angles and planar configuration of the peptide bond, as well as keep atoms from coming together so closely that they repelled each other through van der Waal's interactions. Finally, Pauling predicted that hydrogen bonds must be able to stabilize the folding of the peptide backbone. Two secondary structures, the alpha helix and the beta pleated sheet, fulfill these criteria well (see Figure ). Pauling was correct in his prediction. Most defined secondary structures found in proteins are one or the other type.                                                   Figure 1 Alpha helix. The alpha helix involves regularly spaced H‐bonds between residues along a chain. The amide hydrogen and the carbonyl oxygen of a peptide bond are H‐bond donors and acceptors respectively:  The alpha helix is right‐handed when the chain is followed from the amino to the carboxyl direction. (The helical nomenclature is easily visualized by pointing the thumb of the right hand upwards—this is the amino to carboxyl direction of the helix. The helix then turns in the same direction as the fingers of the right hand curve.) As the helix turns, the carbonyl oxygens of the peptide bond point upwards toward the downward‐facing amide protons, making the hydrogen bond. The R groups of the amino acids point outwards from the helix. Helices are characterized by the number of residues per turn. In the alpha helix, there is not an integral number of amino acid residues per turn of the helix. There are 3.6 residues per turn in the alpha helix; in other words, the helix will repeat itself every 36 residues, with ten turns of the helix in that interval. Beta sheet. The beta sheet involves H‐bonding between backbone residues in adjacent chains. In the beta sheet, a single chain forms H‐bonds with its neighboring chains, with the donor (amide) and acceptor (carbonyl) atoms pointing sideways rather than along the chain, as in the alpha helix. Beta sheets can be either parallel, where the chains point in the same direction when represented in the amino‐ to carboxyl‐ terminus, or antiparallel, where the amino‐ to carboxyl‐ directions of the adjacent chains point in the same direction. (See Figure 2 .)                                                Figure 2  Different amino acids favor the formation of alpha helices, beta pleated sheets, or loops. The primary sequences and secondary structures are known for over 1,000 different proteins. Correlation of these sequences and structures revealed that some amino acids are found more often in alpha helices, beta sheets, or neither. Helix formers include alanine, cysteine, leucine, methionine, glutamic acid, glutamine, histidine, and lysine. Beta formers include valine, isoleucine, phenylalanine, tyrosine, tryptophan, and threonine. Serine, glycine, aspartic acid, asparagine, and proline are found most often in turns. No relationship is apparent between the chemical nature of the amino acid side chain and the existence of amino acid in one structure or another. For example, Glu and Asp are closely related chemically (and can often be interchanged without affecting a protein's activity), yet the former is likely to be found in helices and the latter in turns. Rationalizing the fact that Gly and Pro are found in turns is somewhat easier. Glycine has only a single hydrogen atom for its side chain. Because of this, a glycine peptide bond is more flexible than those of the other amino acids. This flexibility allows glycine to form turns between secondary structural elements. Conversely, proline, because it contains a secondary amino group, forms rigid peptide bonds that cannot be accommodated in either alpha or beta helices. Fibrous and globular proteins The large‐scale characteristics of proteins are consistent with their secondary structures. Proteins can be either fibrous (derived from fibers) or globular (meaning, like a globe). Fibrous proteins are usually important in forming biological structures. For example, collagen forms part of the matrix upon which cells are arranged in animal tissues. The fibrous protein keratin forms structures such as hair and fingernails. The structures of keratin illustrate the importance of secondary structure in giving proteins their overall properties. Alpha keratin is found in sheep wool. The springy nature of wool is based on its composition of alpha helices that are coiled around and cross‐linked to each other through cystine residues. Chemical reduction of the cystine in keratin to form cysteines breaks the cross‐links. Subsequent oxidation of the cysteines allows new cross‐links to form. This simple chemical reaction sequence is used in beauty shops and home permanent products to restructure the curl of human hair—the reducing agent accounts for the characteristic odor of these products. Beta keratin is found in bird feathers and human fingernails. The more brittle, flat structure of these body parts is determined by beta keratin being composed of beta sheets almost exclusively. Globular proteins, such as most enzymes, usually consist of a combination of the two secondary structures—with important exceptions. For example, hemoglobin is almost entirely alpha‐helical, and antibodies are composed almost entirely of beta structures. The secondary structures of proteins are often depicted in ribbon diagrams, where the helices and beta sheets of a protein are shown by corkscrews and arrows respectively, as shown in Figure 3 .                                          Figure 3 Top × REMOVED
{ "url": "https://www.cliffsnotes.com/study-guides/biology/biochemistry-i/protein-structure/secondary-structure", "source_domain": "www.cliffsnotes.com", "snapshot_id": "CC-MAIN-2024-10", "warc_metadata": { "Content-Length": "121929", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:DYN26BCTZ5I7PLX44CSLHHEDGP7V3MOI", "WARC-Concurrent-To": "<urn:uuid:8b860c5e-4c43-4252-a69e-dd39318c4a89>", "WARC-Date": "2024-02-20T21:37:43Z", "WARC-IP-Address": "3.162.103.102", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:RRKFLX3VDGDB6BGRPKK3SJUHD4DTM3DT", "WARC-Record-ID": "<urn:uuid:08cc351d-f6dd-42ba-990d-2e67d6ad0b3e>", "WARC-Target-URI": "https://www.cliffsnotes.com/study-guides/biology/biochemistry-i/protein-structure/secondary-structure", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:53151156-7aeb-4d15-8cb6-2598a8361f99>" }, "warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-144\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 20, 21, 954, 955, 956, 957, 1016, 1017, 1220, 1221, 1761, 1762, 2084, 2085, 2639, 2640, 2641, 2642, 2699, 2700, 3315, 3316, 4134, 4135, 4165, 4166, 4712, 4713, 5459, 5460, 5910, 5911, 5912, 5913, 5963, 5964, 5968, 5970 ], "line_end_idx": [ 20, 21, 954, 955, 956, 957, 1016, 1017, 1220, 1221, 1761, 1762, 2084, 2085, 2639, 2640, 2641, 2642, 2699, 2700, 3315, 3316, 4134, 4135, 4165, 4166, 4712, 4713, 5459, 5460, 5910, 5911, 5912, 5913, 5963, 5964, 5968, 5970, 5977 ] }
{ "red_pajama_v2": { "ccnet_original_length": 5977, "ccnet_original_nlines": 38, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.3670412003993988, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.005617979913949966, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.1413857638835907, "rps_doc_frac_unique_words": 0.39230769872665405, "rps_doc_mean_word_length": 5.24945068359375, "rps_doc_num_sentences": 53, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.141130447387695, "rps_doc_word_count": 910, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.03433116897940636, "rps_doc_frac_chars_dupe_6grams": 0.03433116897940636, "rps_doc_frac_chars_dupe_7grams": 0.012560180388391018, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.018840279430150986, "rps_doc_frac_chars_top_3gram": 0.01904960907995701, "rps_doc_frac_chars_top_4gram": 0.01130416989326477, "rps_doc_books_importance": -455.81817626953125, "rps_doc_books_importance_length_correction": -455.81817626953125, "rps_doc_openwebtext_importance": -277.2039489746094, "rps_doc_openwebtext_importance_length_correction": -277.2039489746094, "rps_doc_wikipedia_importance": -184.04132080078125, "rps_doc_wikipedia_importance_length_correction": -184.04132080078125 }, "fasttext": { "dclm": 0.15716564655303955, "english": 0.9147693514823914, "fineweb_edu_approx": 3.3562076091766357, "eai_general_math": 0.7275463938713074, "eai_open_web_math": 0.7277984619140625, "eai_web_code": 0.9970090389251709 } }
{ "free_decimal_correspondence": { "primary": { "code": "572.62", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Anthropology" } }, "secondary": { "code": "572.6", "labels": { "level_1": "Science and Natural history", "level_2": "Biology and Anthropology", "level_3": "Anthropology" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "4", "label": "Missing Images or Figures" }, "secondary": { "code": "0", "label": "No missing content" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "3", "label": "Intermediate Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-8,362,225,926,176,023,000
Reply Newbie Posts: 1 Registered: ‎10-06-2011 Database Error: Reformat I have tried everything I can think ofSmiley Surprised. I have read 317 messages, most of which are not applicable, and have tried resetting my Fuze+ and reformatting from my PC after I received a database error then a very quick shut down.   I have: 1. Turned off my Fuze and held the << down while plugging into my PC. 2. Tried reformatting only to get a message that Windows was not able to complete the format. 3. Deleted all of the files off the Fuze and tried reformatting; again, to no avail and the deleted files reappear, even after I empty the recycle bin. 4. I have tried every combination of formatting FAT32, FAT, NTFS, etc. and all come back with unable to complete. Please help.
{ "url": "https://forums.sandisk.com/t5/Sansa-Fuze/Database-Error-Reformat/td-p/248004", "source_domain": "forums.sandisk.com", "snapshot_id": "crawl=CC-MAIN-2019-43", "warc_metadata": { "Content-Length": "82652", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:AUIP7EBQ7LA7KURBIQENTGVYNXKKLFAG", "WARC-Concurrent-To": "<urn:uuid:eaa4dde5-f9ee-4072-a30f-c60996a51ef2>", "WARC-Date": "2019-10-23T23:19:19Z", "WARC-IP-Address": "208.74.204.90", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:7J6ZKTQGNBBI5LJ7PO7XB7TXW4FZO2FD", "WARC-Record-ID": "<urn:uuid:94399c02-6305-4804-be8a-ba8471ebaf69>", "WARC-Target-URI": "https://forums.sandisk.com/t5/Sansa-Fuze/Database-Error-Reformat/td-p/248004", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:829ff0e0-3e0b-429f-8b78-a32389db4444>" }, "warc_info": "isPartOf: CC-MAIN-2019-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-28.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 6, 13, 22, 46, 47, 72, 73, 314, 315, 317, 318, 326, 327, 399, 495, 649, 765, 766 ], "line_end_idx": [ 6, 13, 22, 46, 47, 72, 73, 314, 315, 317, 318, 326, 327, 399, 495, 649, 765, 766, 778 ] }
{ "red_pajama_v2": { "ccnet_original_length": 778, "ccnet_original_nlines": 18, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.41566264629364014, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.07228916138410568, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.22891566157341003, "rps_doc_frac_unique_words": 0.6296296119689941, "rps_doc_mean_word_length": 4.429629802703857, "rps_doc_num_sentences": 12, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 4.2228593826293945, "rps_doc_word_count": 135, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.03344482183456421, "rps_doc_frac_chars_top_3gram": 0.03344482183456421, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -60.585853576660156, "rps_doc_books_importance_length_correction": -60.585853576660156, "rps_doc_openwebtext_importance": -33.3351936340332, "rps_doc_openwebtext_importance_length_correction": -33.33518600463867, "rps_doc_wikipedia_importance": -27.634103775024414, "rps_doc_wikipedia_importance_length_correction": -27.634103775024414 }, "fasttext": { "dclm": 0.6698801517486572, "english": 0.9474035501480103, "fineweb_edu_approx": 0.6462052464485168, "eai_general_math": 0.13717007637023926, "eai_open_web_math": 0.5049481987953186, "eai_web_code": 0.02811611071228981 } }
{ "free_decimal_correspondence": { "primary": { "code": "004.6", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } }, "secondary": { "code": "005.456", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "1", "label": "Factual" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "21", "label": "Customer Support" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "1", "label": "No Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "2", "label": "Partially Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
-8,591,879,482,534,297,000
Small Molecule Discovery for GC-A Activators Project: Research project Project Details Description ? DESCRIPTION (provided by applicant): The applicants, with others, have advanced the concept of the heart as an endocrine organ in which atrial natriuretic peptide (ANP) and B-type natriuretic peptide (BNP) of myocardial origin functions as a cardiorenal, blood pressure, and volume-regulating hormone. Upon release, ANP and BNP bind to particulate guanylyl receptor A (GC-A) and activate cGMP, its second messenger. GC-A is highly expressed in the heart, kidney, adrenals, vasculature, and adipocytes. Importantly, while optimally regulating intravascular volume and blood pressure homeostasis, GC-A activation directly mediates organ protection with anti-apoptotic, anti-fibrotic, anti- hypertrophic, vascular endothelial regeneratin, lipolytic, and aldosterone suppressing properties rendering this hormonal system an unprecedented therapeutic opportunity especially in the highly clinically relevant area of cardiovascular and metabolic disease. The natriuretic peptide GC-A receptor possesses pleotropic beneficial properties in multiple organs and cell types, which may protect against cardiovascular and metabolic disease. To date, there are no small molecule, non-peptide, drugs in existence to activate the GC-A receptor and bring improved therapeutics to these devastating diseases. This application seeks to provide discovery of such a novel therapeutic small molecule. This grant application is in response to PAR-14-284 (High Throughput Screening (HTS) to Discover Chemical Probes; previously PAR-12-058-Solicitation of Assays for HTS to Discovery Chemical Probes), proposes a collaborative effort between Mayo Clinic (Rochester, Minnesota) and Sanford-Burnham Medical Research Institute (Orlando, Florida) to discover small molecular agonists targeting the GC-A receptor by high throughput screening (HTS) of the NIH library of compounds from the Molecular Libraries Probe Production Center Network. The Mayo Clinic investigators are internationally recognized for their extensive research on the biology, therapeutics and diagnostics of the natriuretic peptide system, while the Sanford-Burnham Medical Research Institute has a proven record of discovery of small molecules by HTS. The proposed studies are highly feasible because the HTS assays are in place. Further, the proposed studies are highly novel due to the state-of-the-art HTS equipment of the Sanford-Burnham team and the history of drug discovery built on the biological and clinical expertise of the Mayo team. Studies to validate the hits identified and optimized by the Sanford-Burnham investigators will be done in human cell lines at Mayo Clinic. Thus this proposal has the high impact of novel drug discovery for a small molecule GC-A agonist, which currently does not exist, with the potential of markedly reducing the immense burden of human cardiovascular and metabolic disease. StatusFinished Effective start/end date7/1/156/30/18 Funding • National Institutes of Health: $422,064.00 • National Institutes of Health: $533,169.00 ASJC • Medicine(all) Fingerprint Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
{ "url": "https://mayoclinic.pure.elsevier.com/en/projects/small-molecule-discovery-for-gc-a-activators", "source_domain": "mayoclinic.pure.elsevier.com", "snapshot_id": "crawl=CC-MAIN-2020-29", "warc_metadata": { "Content-Length": "27778", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:FBPODFJOZZQUGOLFC6HPANN7NBKBBPXV", "WARC-Concurrent-To": "<urn:uuid:f675cc4d-c233-4c96-8320-315e54c0d878>", "WARC-Date": "2020-07-09T12:34:57Z", "WARC-IP-Address": "54.85.162.78", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:SDI7AIPKEG7DLF5NJA5VLA4H2TOGXYTI", "WARC-Record-ID": "<urn:uuid:226fd042-b3a7-481d-8e7d-d50144135d1a>", "WARC-Target-URI": "https://mayoclinic.pure.elsevier.com/en/projects/small-molecule-discovery-for-gc-a-activators", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:6ead54d0-fb4a-4eda-a444-4ce6e32bfbf8>" }, "warc_info": "isPartOf: CC-MAIN-2020-29\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-15.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 45, 46, 72, 73, 89, 90, 102, 103, 2971, 2986, 3024, 3025, 3033, 3034, 3081, 3128, 3129, 3134, 3135, 3153, 3154 ], "line_end_idx": [ 45, 46, 72, 73, 89, 90, 102, 103, 2971, 2986, 3024, 3025, 3033, 3034, 3081, 3128, 3129, 3134, 3135, 3153, 3154, 3328 ] }
{ "red_pajama_v2": { "ccnet_original_length": 3328, "ccnet_original_nlines": 21, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.25503355264663696, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.05536913126707077, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.20805369317531586, "rps_doc_frac_unique_words": 0.5342163443565369, "rps_doc_mean_word_length": 6.072847843170166, "rps_doc_num_sentences": 19, "rps_doc_symbol_to_word_ratio": 0, "rps_doc_unigram_entropy": 5.057734489440918, "rps_doc_word_count": 453, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.0392584502696991, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.009087599813938141, "rps_doc_frac_chars_top_3gram": 0.028353329747915268, "rps_doc_frac_chars_top_4gram": 0.03598691150546074, "rps_doc_books_importance": -344.0290832519531, "rps_doc_books_importance_length_correction": -344.0290832519531, "rps_doc_openwebtext_importance": -161.43443298339844, "rps_doc_openwebtext_importance_length_correction": -161.43443298339844, "rps_doc_wikipedia_importance": -153.61746215820312, "rps_doc_wikipedia_importance_length_correction": -153.61746215820312 }, "fasttext": { "dclm": 0.01997178979218006, "english": 0.8758426308631897, "fineweb_edu_approx": 1.8140407800674438, "eai_general_math": 0.04832326993346214, "eai_open_web_math": 0.31128764152526855, "eai_web_code": 0.0019955600146204233 } }
{ "free_decimal_correspondence": { "primary": { "code": "615.1", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Materia medica, Drugs, and Pharmacy" } }, "secondary": { "code": "616.1", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Pathology and Diseases" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "2", "label": "Academic/Research" }, "secondary": { "code": "-1", "label": "Abstain" } }, "extraction_artifacts": { "primary": { "code": "0", "label": "No Artifacts" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "3", "label": "Academic Writing" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "4", "label": "Advanced Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "4", "label": "Graduate/Expert Level" }, "secondary": { "code": "3", "label": "Undergraduate Level" } } }
71f077df794da2774531b20248bb19b0
-2,930,031,745,164,486,700
Though it feels like the end to many, the MESA technique is often a new beginning Though it feels like the end to many, the MESA technique is often a new beginning   MESA is a technique where a urologist obtains sperm from part of the male reproductive tract, such as the epididymis. These collected sperm are used in ICSI. this procedure is used when there are no sperms present in the ejaculation. Please visit: https://kicchennai.com/ contact us: 9677061668/9908392452 mail us: [email protected] #endometriumthickness #pgd #ART #blastocysttransfer #infertility #infertilitytreatment #kicbchennai #maleinfertility #surrogacyindia #surrogacylawsindia #ivfinindia #eggdonorsurrogacy #surrogacychennai
{ "url": "https://kicchennai.com/though-it-feels-like-the-end-to-many-the-mesa-technique-is-often-a-new-beginning/", "source_domain": "kicchennai.com", "snapshot_id": "CC-MAIN-2024-38", "warc_metadata": { "Content-Length": "99109", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:LKRDV3E33HIRHFFK7IHZPJ7XSHZM7EHN", "WARC-Concurrent-To": "<urn:uuid:a3cebf67-de19-4237-9612-42051302b086>", "WARC-Date": "2024-09-12T19:21:57Z", "WARC-IP-Address": "85.187.128.57", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:4KS4EBIM5FIZQOY3AMONA24DUYJR7XCA", "WARC-Record-ID": "<urn:uuid:49394de5-719b-42b2-a224-cfe48387698c>", "WARC-Target-URI": "https://kicchennai.com/though-it-feels-like-the-end-to-many-the-mesa-technique-is-often-a-new-beginning/", "WARC-Truncated": null, "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:270158bf-6f83-42fc-b0f2-f0ef04c7f374>" }, "warc_info": "isPartOf: CC-MAIN-2024-38\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-65\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/" }
{ "line_start_idx": [ 0, 82, 83, 166, 167, 402, 403, 417, 418, 442, 443, 477, 478, 507, 508 ], "line_end_idx": [ 82, 83, 166, 167, 402, 403, 417, 418, 442, 443, 477, 478, 507, 508, 709 ] }
{ "red_pajama_v2": { "ccnet_original_length": 709, "ccnet_original_nlines": 14, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 1, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.36220473051071167, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.03937007859349251, "rps_doc_frac_lines_end_with_ellipsis": 0, "rps_doc_frac_no_alph_words": 0.23622046411037445, "rps_doc_frac_unique_words": 0.6702127456665039, "rps_doc_mean_word_length": 6.138298034667969, "rps_doc_num_sentences": 6, "rps_doc_symbol_to_word_ratio": 0.10236220061779022, "rps_doc_unigram_entropy": 3.989062786102295, "rps_doc_word_count": 94, "rps_doc_frac_chars_dupe_10grams": 0.2253032922744751, "rps_doc_frac_chars_dupe_5grams": 0.2253032922744751, "rps_doc_frac_chars_dupe_6grams": 0.2253032922744751, "rps_doc_frac_chars_dupe_7grams": 0.2253032922744751, "rps_doc_frac_chars_dupe_8grams": 0.2253032922744751, "rps_doc_frac_chars_dupe_9grams": 0.2253032922744751, "rps_doc_frac_chars_top_2gram": 0.027729639783501625, "rps_doc_frac_chars_top_3gram": 0.0450606606900692, "rps_doc_frac_chars_top_4gram": 0.058925479650497437, "rps_doc_books_importance": -63.9732551574707, "rps_doc_books_importance_length_correction": -64.51423645019531, "rps_doc_openwebtext_importance": -44.06167221069336, "rps_doc_openwebtext_importance_length_correction": -44.60265350341797, "rps_doc_wikipedia_importance": -20.77707290649414, "rps_doc_wikipedia_importance_length_correction": -21.31805419921875 }, "fasttext": { "dclm": 0.05833351984620094, "english": 0.8039125800132751, "fineweb_edu_approx": 3.14410138130188, "eai_general_math": 0.018784400075674057, "eai_open_web_math": 0.4527847170829773, "eai_web_code": 0.022698460146784782 } }
{ "free_decimal_correspondence": { "primary": { "code": "618.122", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Women — Health and hygiene, Children — Health and hygiene, Gynecology, and Pediatrics" } }, "secondary": { "code": "618.12", "labels": { "level_1": "Industrial arts, Technology, and Engineering", "level_2": "Medicine", "level_3": "Women — Health and hygiene, Children — Health and hygiene, Gynecology, and Pediatrics" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "1", "label": "Factual" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "6", "label": "Promotional/Advertisement" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "missing_content": { "primary": { "code": "1", "label": "Truncated Snippets" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "10", "label": "Knowledge Article" }, "secondary": { "code": "17", "label": "Product Page" } }, "reasoning_depth": { "primary": { "code": "1", "label": "No Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "3", "label": "Mostly Correct" }, "secondary": { "code": "2", "label": "Partially Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
5,279,032,764,886,150,000
0 Flares 0 Flares × Peekaboo Randomizer is a plugin that allows you to randomly display pieces of content at your WordPress driven website. It’s suitable for banner rotation, lucky visitor rewards, special offers… or just for making a webpage more exciting and fun. Upon installing the plugin, you will be in the possesion of 3 shortcodes with which you can choose which block of content you want to be randomly displayed to visitors, and with what incidence. Installation …is simple. As with pretty much any other WP plugin, you should: • 1. unzip the package • 2. upload the entire peekaboo_randomizer folder to your plugins directory • 3. activate the plugin in WordPress dashboard (Plugins page) A new icon in the WordPress’ TinyMCE text editor toolbar is created: SHORTCODES [pbr_single] attribute: chance The most basic usage. This shortcode is used when you have a block of content that should appear on the page randomly, unrelated to what happens with the rest of the content. Examples: [pbr_single chance=”25%”]This sentence will appear on the page in 25% of the cases, or once in 4 loadings, in average.[/pbr_single] [pbr_single chance=”3/8”]This sentence will appear on the page three times in eight calls.[/pbr_single] [pbr_single chance=”0.01%”]The incidence of 0.01% means the content will appear on the page once in 10000 times.[/pbr_single] [pbr_single chance=”1/10000”]Same as the above.[/pbr_single] As shown in the previous examples, the attribute chance can be expressed both as percentage or as fraction. Percentage value can have up to 6 decimals; which also means the lowest frequency of appearance is 0.000001%, or 1/1000000. A WORD ABOUT NESTING Wordpress doesn’t support nesting of a shortcode inside itself. [shortcode]Whatever [shortcode] this shortcode is supposed to do [/shortcode]- it will not do properly.[/shortcode] But, understanding that you may have a need to randomly display some content inside a larger randomly displayed block, Peekaboo Randomizer allows you to do so. Just add a number suffix to the shortcode name: [pbr_single chance=”1/3”]The larger block appears once in three loadings [pbr_single2 chance=”50%”], while this inner block appears in 50% of those cases.[/pbr_single2] Which means the inner block will be present on the page in 1/6 cases in total.[/pbr_single] You can nest these shortcodes up to 10 levels deep; from [pbr_single2] to [pbr_single10]. Just be careful to properly close each shortcode. [pbr_wrapper] no attributes [pbr] attributes: set and chance You can have several alternative blocks of content, while only one of them gets to be displayed on the page. For these cases you can create Peekaboo Randomizer sets. In order for a [pbr] shortcode block to “know” if another block from the same set is randomly chosen this time, not him, we need to feed all blocks to PB Randomizer, which will then do the wiring between them. For that purpose use [pbr_wrapper] shortcode, to nest all [pbr] shortcodes inside. The easiest, but also the most reliable way to do so is to start writing the content of a page by placing [pbr_wrapper] first, before everything else in the WP text editor, and [/pbr_wrapper] last. The entire page content can be safely nested inside the wrapper. Example: [pbr_wrapper] Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. [pbr set=”owls” chance=”25%”]<img src="snowy.jpg" />[/pbr] [pbr set=”owls” chance=”50%”]<img src="”scops.jpg"" />[/pbr] [pbr set=”owls” chance=”1/10”]<img src="barn_owl.jpg" />[/pbr] [pbr set=”owls” chance=”15%”]<img src="strix.jpg" />[/pbr] Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. [/pbr_wrapper] There are four alternating blocks that belong to a set named “owls” in this example. Each block contains an image of an owl. Snowy owl will appear 25% of the time, scops owl 50%, strix owl – 15%, while the image of barn owl will load once in ten cases. Only one image loads each time. IMPORTANT: The sum of all chances in one set has to be exactly 100% (i.e. 1/1) in order for the randomizer set to work properly. You can have as many sets inside one pbr_wrapper as you wish. Mind you, instances of a set do not have to reside next to each other. Another example: [pbr_wrapper] Bulldog [pbr set=”cats” chance=”50%”]Maine Coon[/pbr] [pbr set=”dogs” chance=”40%”]German Shepherd[/pbr] Ragdoll Siberian Husky Poodle [pbr set=”dogs” chance=”25%”]Labrador Retriever[/pbr] Border Collie [pbr set=”cats” chance=”50%”]Russian Blue[/pbr] Scottish Fold [pbr set=”dogs” chance=”35%”]Dalmatian[/pbr] [/pbr_wrapper] A WORD ABOUT NESTING Nesting of [pbr] shortcodes is also possible, but in a bit different way than [pbr_single] is, and only one level down. If an item/instance/block of a set is nested inside an item/instance/block of another set, it is necessary to use [pbr2] shortcode for defining the inner block and all other blocks which belong to the set (regardless whether those blocks are also nested or not). Also, there have to be two wrappers. A standard [pbr_wrapper], and [pbr_wrapper2]. As is the case with a single wrapper – the best and cleanest way is to open them both at the beginning, and close them at the very end of the content. Take a careful look at this example: [pbr_wrapper][pbr_wrapper2] [pbr set=”living creatures” chance=”5/13”] [pbr2 set=”animals” chance=”20%”]Koala[/pbr2] [pbr2 set=”animals” chance=”20%”]Wolf[/pbr2] [pbr2 set=”animals” chance=”20%”]Fox[/pbr2] [pbr2 set=”insects” chance=”50%”]Wasp[/pbr2] [pbr2 set=”insects” chance=”50%”]Mosquito[/pbr2] [/pbr] [pbr2 set=”animals” chance=”40%”]Penguin[/pbr2] [pbr set=”people” chance=”28%”]Harry[/pbr] [pbr set=”living creatures” chance=”8/13”] [pbr2 set=”trees” chance=”61%”]Cypress[/pbr2] [pbr2 set=”trees” chance=”39%”]Chestnut[/pbr2] [/pbr] [pbr set=”people” chance=”36%”]Jane[/pbr] [pbr set=”people” chance=”36%”]John[/pbr] [/pbr_wrapper2][/pbr_wrapper] Note that the “penguin” block of “animals” set is also wrapped in [pbr2], even it is not inside “living creatures” set. Since there’s at least one block of “animals” set nested inside “living creatures” then all other items from the “animals” have to have the sub-shortcode [pbr2]. No item of the set “people” is nested, so it’s just a regular [pbr] set. SOME FINAL WORDS As mentioned at the beginning, there’s a convenient click-through dialog available in the WordPress’ text editor, which should make inserting shortcodes a breeze. Bear in mind that the laws of probability sometimes may seem counter-intuitive and illogic. If you have set some content to appear on a page with a frequence of, say, 50%, don’t be alarmed if sometimes the content appears 5 times in a row… or if 7 times in a row it doesn’t… It may happen more often than you’d maybe expect. So, if you suspect that something is wrong with the mechanism of randomizing inside the plugin, please test it thoroughly by reloading the page multiple (really multiple) times and taking notes of the (dis)appearance pattern. Probability is all about the Law of Large Numbers Finally, let me inform you about the existance of Peekaboo Timer plugin, that you may find useful for combining with Randomizer. Peekaboo Timer hides or shows any content in accordance with various time-related criteria. For example, you can make some blocks of content appear randomly on a page during working hours, while other blocks shall appear (randomly or not) on weekends and off-hours, etc… Take a closer look: https://codecanyon.net/item/peekaboo-timer/7197988 0 Flares Twitter 0 Facebook 0 Google+ 0 Pin It Share 0 LinkedIn 0 Email -- 0 Flares × Leave a Reply Your email address will not be published. Required fields are marked *
{ "url": "http://wpfacil.com/peekaboo-randomizer-add-ons/", "source_domain": "wpfacil.com", "snapshot_id": "crawl=CC-MAIN-2017-22", "warc_metadata": { "Content-Length": "56386", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:2DJJUPQOTNZEWQ4Z7QECUQVMPT5L2C3K", "WARC-Concurrent-To": "<urn:uuid:25126eca-8146-4fc5-9096-89bd40d888b1>", "WARC-Date": "2017-05-24T11:56:40Z", "WARC-IP-Address": "69.175.92.114", "WARC-Identified-Payload-Type": "text/html", "WARC-Payload-Digest": "sha1:HORO2IKNJBYVM344XTCXDKQ57MIWUM6J", "WARC-Record-ID": "<urn:uuid:b52d8e86-0970-4ea3-840f-e63269425771>", "WARC-Target-URI": "http://wpfacil.com/peekaboo-randomizer-add-ons/", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:d5b402d4-bfa5-42ee-9e88-d481eaa56965>" }, "warc_info": "robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 20, 21, 267, 359, 450, 461, 462, 475, 540, 541, 566, 644, 709, 710, 779, 780, 791, 792, 805, 806, 824, 825, 1000, 1001, 1011, 1012, 1144, 1248, 1374, 1435, 1436, 1668, 1669, 1690, 1754, 1755, 1871, 1872, 2080, 2081, 2342, 2343, 2483, 2484, 2498, 2499, 2513, 2514, 2520, 2521, 2548, 2549, 2715, 2925, 3008, 3271, 3272, 3281, 3282, 3296, 3528, 3587, 3648, 3711, 3770, 3984, 3999, 4000, 4285, 4286, 4415, 4416, 4478, 4549, 4550, 4567, 4568, 4582, 4590, 4636, 4687, 4695, 4710, 4717, 4771, 4785, 4833, 4847, 4892, 4907, 4908, 4929, 5049, 5050, 5313, 5314, 5548, 5549, 5586, 5587, 5615, 5658, 5706, 5753, 5799, 5846, 5897, 5904, 5952, 5995, 6038, 6086, 6135, 6142, 6184, 6226, 6256, 6257, 6539, 6612, 6613, 6630, 6631, 6794, 6795, 7120, 7396, 7397, 7526, 7797, 7868, 7869, 7955, 7956, 7970, 7971 ], "line_end_idx": [ 20, 21, 267, 359, 450, 461, 462, 475, 540, 541, 566, 644, 709, 710, 779, 780, 791, 792, 805, 806, 824, 825, 1000, 1001, 1011, 1012, 1144, 1248, 1374, 1435, 1436, 1668, 1669, 1690, 1754, 1755, 1871, 1872, 2080, 2081, 2342, 2343, 2483, 2484, 2498, 2499, 2513, 2514, 2520, 2521, 2548, 2549, 2715, 2925, 3008, 3271, 3272, 3281, 3282, 3296, 3528, 3587, 3648, 3711, 3770, 3984, 3999, 4000, 4285, 4286, 4415, 4416, 4478, 4549, 4550, 4567, 4568, 4582, 4590, 4636, 4687, 4695, 4710, 4717, 4771, 4785, 4833, 4847, 4892, 4907, 4908, 4929, 5049, 5050, 5313, 5314, 5548, 5549, 5586, 5587, 5615, 5658, 5706, 5753, 5799, 5846, 5897, 5904, 5952, 5995, 6038, 6086, 6135, 6142, 6184, 6226, 6256, 6257, 6539, 6612, 6613, 6630, 6631, 6794, 6795, 7120, 7396, 7397, 7526, 7797, 7868, 7869, 7955, 7956, 7970, 7971, 8041 ] }
{ "red_pajama_v2": { "ccnet_original_length": 8041, "ccnet_original_nlines": 136, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0.0001339799928246066, "rps_doc_stop_word_fraction": 0.303740918636322, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.010050250217318535, "rps_doc_frac_lines_end_with_ellipsis": 0.007299270015209913, "rps_doc_frac_no_alph_words": 0.2886655628681183, "rps_doc_frac_unique_words": 0.42336371541023254, "rps_doc_mean_word_length": 5.184755802154541, "rps_doc_num_sentences": 65, "rps_doc_symbol_to_word_ratio": 0.0027917400002479553, "rps_doc_unigram_entropy": 5.58195686340332, "rps_doc_word_count": 1207, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0.011665070429444313, "rps_doc_frac_chars_dupe_6grams": 0.008628950454294682, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0.007829979993402958, "rps_doc_frac_chars_top_3gram": 0.008628950454294682, "rps_doc_frac_chars_top_4gram": 0.009587730281054974, "rps_doc_books_importance": -854.01416015625, "rps_doc_books_importance_length_correction": -854.01416015625, "rps_doc_openwebtext_importance": -523.035400390625, "rps_doc_openwebtext_importance_length_correction": -523.035400390625, "rps_doc_wikipedia_importance": -348.4693603515625, "rps_doc_wikipedia_importance_length_correction": -348.4693603515625 }, "fasttext": { "dclm": 0.045450448989868164, "english": 0.7926018834114075, "fineweb_edu_approx": 1.840523362159729, "eai_general_math": 0.20840275287628174, "eai_open_web_math": 0.43816643953323364, "eai_web_code": 0.09151917695999146 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.452", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "005.1", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } } }, "bloom_cognitive_process": { "primary": { "code": "3", "label": "Apply" }, "secondary": { "code": "2", "label": "Understand" } }, "bloom_knowledge_domain": { "primary": { "code": "3", "label": "Procedural" }, "secondary": { "code": "2", "label": "Conceptual" } }, "document_type_v1": { "primary": { "code": "3", "label": "Reference/Encyclopedic/Educational" }, "secondary": { "code": "4", "label": "Code/Software" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "0", "label": "No Artifacts" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "4", "label": "Missing Images or Figures" } }, "document_type_v2": { "primary": { "code": "23", "label": "Tutorial" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "2", "label": "Basic Reasoning" }, "secondary": { "code": "3", "label": "Intermediate Reasoning" } }, "technical_correctness": { "primary": { "code": "4", "label": "Highly Correct" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "1", "label": "General Audience" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0
6,983,450,838,297,946,000
Beefy Boxes and Bandwidth Generously Provided by pair Networks go ahead... be a heretic   PerlMonks   swiftone's scratchpad by swiftone (Curate) on Jun 03, 2004 at 18:16 UTC ( #360344=scratchpad: print w/ replies, xml ) Need Help?? perl -MB::Size -e"print B::Size->VERSION" Prototype mismatch: sub B::OP::size vs () at /usr/lib/perl5/site_perl/ +5.8.3/i386-linux-thread-multi/B/Size.pm line 24. Log In? Username: Password: What's my password? Create A New User Chatterbox? and the web crawler heard nothing... How do I use this? | Other CB clients Other Users? Others lurking in the Monastery: (3) As of 2016-04-30 18:20 GMT Sections? Information? Find Nodes? Leftovers? Voting Booth? :nehw tseb si esrever ni gnitirW Results (441 votes). Check out past polls.
{ "url": "http://www.perlmonks.org/index.pl/jacques?viewmode=public;node_id=360344", "source_domain": "www.perlmonks.org", "snapshot_id": "crawl=CC-MAIN-2016-18", "warc_metadata": { "Content-Length": "16636", "Content-Type": "application/http; msgtype=response", "WARC-Block-Digest": "sha1:JXTOGYPOBEJIIN4JLSRI3PNSFFFFOOL2", "WARC-Concurrent-To": "<urn:uuid:46fa68cc-47e2-4843-8f02-ee5d563b725c>", "WARC-Date": "2016-04-30T18:23:21Z", "WARC-IP-Address": "66.39.54.27", "WARC-Identified-Payload-Type": null, "WARC-Payload-Digest": "sha1:OAKDZS7742NF7YUOZXXJB5CPPRLADF4Y", "WARC-Record-ID": "<urn:uuid:4ea324dd-759e-4fd5-9393-22227a99983e>", "WARC-Target-URI": "http://www.perlmonks.org/index.pl/jacques?viewmode=public;node_id=360344", "WARC-Truncated": "length", "WARC-Type": "response", "WARC-Warcinfo-ID": "<urn:uuid:a123b5a0-b5f3-4f4d-a620-a176c30e29ce>" }, "warc_info": "robots: classic\r\nhostname: ip-10-239-7-51.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-18\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf" }
{ "line_start_idx": [ 0, 63, 88, 90, 102, 103, 125, 126, 147, 234, 235, 398, 406, 416, 426, 427, 447, 465, 477, 514, 515, 553, 566, 603, 630, 640, 653, 665, 676, 694, 731, 732, 733, 734, 735, 736, 737, 738 ], "line_end_idx": [ 63, 88, 90, 102, 103, 125, 126, 147, 234, 235, 398, 406, 416, 426, 427, 447, 465, 477, 514, 515, 553, 566, 603, 630, 640, 653, 665, 676, 694, 731, 732, 733, 734, 735, 736, 737, 738, 784 ] }
{ "red_pajama_v2": { "ccnet_original_length": 784, "ccnet_original_nlines": 37, "rps_doc_curly_bracket": 0, "rps_doc_ldnoobw_words": 0, "rps_doc_lorem_ipsum": 0, "rps_doc_stop_word_fraction": 0.13131313025951385, "rps_doc_ut1_blacklist": 0, "rps_doc_frac_all_caps_words": 0.055555559694767, "rps_doc_frac_lines_end_with_ellipsis": 0.02631578966975212, "rps_doc_frac_no_alph_words": 0.4141414165496826, "rps_doc_frac_unique_words": 0.9252336621284485, "rps_doc_mean_word_length": 5.299065589904785, "rps_doc_num_sentences": 19, "rps_doc_symbol_to_word_ratio": 0.015151520259678364, "rps_doc_unigram_entropy": 4.569180488586426, "rps_doc_word_count": 107, "rps_doc_frac_chars_dupe_10grams": 0, "rps_doc_frac_chars_dupe_5grams": 0, "rps_doc_frac_chars_dupe_6grams": 0, "rps_doc_frac_chars_dupe_7grams": 0, "rps_doc_frac_chars_dupe_8grams": 0, "rps_doc_frac_chars_dupe_9grams": 0, "rps_doc_frac_chars_top_2gram": 0, "rps_doc_frac_chars_top_3gram": 0, "rps_doc_frac_chars_top_4gram": 0, "rps_doc_books_importance": -76.2828369140625, "rps_doc_books_importance_length_correction": -76.2828369140625, "rps_doc_openwebtext_importance": -54.363162994384766, "rps_doc_openwebtext_importance_length_correction": -54.36313247680664, "rps_doc_wikipedia_importance": -51.86387252807617, "rps_doc_wikipedia_importance_length_correction": -51.86387252807617 }, "fasttext": { "dclm": 0.034417930990457535, "english": 0.7268624305725098, "fineweb_edu_approx": 0.9670754671096802, "eai_general_math": -0.000008940000043367036, "eai_open_web_math": 0.30072885751724243, "eai_web_code": -0.000010009999641624745 } }
{ "free_decimal_correspondence": { "primary": { "code": "005.133", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computer programming" } }, "secondary": { "code": "004.01", "labels": { "level_1": "General works, books and libraries, information sciences", "level_2": "", "level_3": "Computers and Computer science" } } }, "bloom_cognitive_process": { "primary": { "code": "2", "label": "Understand" }, "secondary": { "code": "3", "label": "Apply" } }, "bloom_knowledge_domain": { "primary": { "code": "2", "label": "Conceptual" }, "secondary": { "code": "3", "label": "Procedural" } }, "document_type_v1": { "primary": { "code": "5", "label": "Social/Forum" }, "secondary": { "code": "3", "label": "Reference/Encyclopedic/Educational" } }, "extraction_artifacts": { "primary": { "code": "3", "label": "Irrelevant Content" }, "secondary": { "code": "1", "label": "Leftover HTML" } }, "missing_content": { "primary": { "code": "0", "label": "No missing content" }, "secondary": { "code": "-1", "label": "Abstain" } }, "document_type_v2": { "primary": { "code": "18", "label": "Q&A Forum" }, "secondary": { "code": "8", "label": "Documentation" } }, "reasoning_depth": { "primary": { "code": "1", "label": "No Reasoning" }, "secondary": { "code": "2", "label": "Basic Reasoning" } }, "technical_correctness": { "primary": { "code": "6", "label": "Not Applicable/Indeterminate" }, "secondary": { "code": "3", "label": "Mostly Correct" } }, "education_level": { "primary": { "code": "3", "label": "Undergraduate Level" }, "secondary": { "code": "2", "label": "High School Level" } } }
71f077df794da2774531b20248bb19b0