texts
list | meta
dict | scores
list | avg_score
float64 0
0.51
| num_sents
int64 5
5
|
|---|---|---|---|---|
[
"Purification and properties of the bacteriophage T4 gene 61 RNA priming protein.",
"\nThe bacteriophage T4 gene 61 protein is required, together with the gene 41 protein and single-stranded DNA, for the synthesis of the pentaribonucleotides that are used as primers for the start of each new Okazaki DNA fragment during T4 DNA replication. ",
"Using this priming activity as an assay, we have purified the 61 protein to essential homogeneity in milligram amounts. ",
"The priming activity was identified with the product of T4 gene 61 by using two-dimensional polyacrylamide gel electrophoresis to compare all of the T4-induced proteins in wild-type and mutant infections; the purified protein co-migrates with the only detectable protein missing in a 61- mutant infection. ",
"The purified 61 protein is shown to bind to the T4 helix-destabilizing protein (gene 32 protein) and to both single-stranded and double-stranded DNA. ",
"We have failed to detect any ribonucleotide polymerizing activity in either the 61 protein or the 41 protein alone; both the 61 and 41 proteins must be present to observe any synthesis of oligoribonucleotides."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0.025,
0.00784313725490196,
0,
0.0032679738562091504,
0.006666666666666667,
0
] | 0.00713
| 5
|
[
"Academics\n\nThe Academic Sector is made up of five colleges and schools: the College of Arts & Sciences, the Helen DeVos College of Education, the School of Music, the School of Religion, and the School of Nursing.",
"\n\nMiddle Grades, Mathematics and Science, 6-8 Licensure (MGMSC.BST)\n\n* This program requires a minimum 2.75 GPA overall, in English Composition and Mathematics, in the Specialty Area Requirements, and in the Professional Education/Professional Semester Requirements. ",
"In addition, a grade of C or higher is required in all Specialty Area, Enhanced, and Professional Education courses.*",
"\n\nDegree Checklist\n\nFor a checklist of all courses required for this degree program and a suggested four-year sequence of study, please click on the link below."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.023474178403755867,
0.0149812734082397,
0.017094017094017096,
0
] | 0.013887
| 5
|
[
"Q:\n\n.htaccess and params\n\ni digg on the internet about .htaccess and rewrite rules i need to do with my site.",
"\ni saw something i dont understand and want to know what it means\ni am wondering what is the difference between the 2 regular expression that i need to use for my site among all others i need to use):\nRewriteRule ^home$ mainpage.php?id=$1 [QSA]\n\nand\nRewriteRule ^home(/)?$ mainpage.php?id=$1 [L]\n\ni looked at the QSA and L but what the (/) means?",
"\n\nA:\n\nThe expression will be (/)? ",
"not (/). ",
"It means slash or not on the URL. ",
"These two URLs will go to the same place:\nhttp://www.domain.com/home/\nand \nhttp://www.domain.com/home\n\nSo the slash is optional. ",
"This way, if a bot or a search engine puts it, the rule will work.",
"\nYou can rewrite the rules like this:\nRewriteRule ^home/?$ mainpage.php?id=$1 [L,QSA]\n\nAlso, I saw you said:\n\namong all others i need to use\n\nIf all your pages goes to the same file (in this case mainpage.php), you can create one rule that will automatically rewrites them instead of creating 10 or 15 rules (or more). ",
"You can do this like this:\nRewriteEngine on\nREwriteBase /\nRewriteRule ^([a-z0-9\\-_]+)/?$ mainpage.php?id=$1 [L,QSA]\n\nThis rule will use Letters, Numbers, Dash and Underscores as the page.",
"\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0,
0.008670520231213872,
0,
0,
0,
0.015503875968992248,
0,
0.006269592476489028,
0.0106951871657754,
0
] | 0.004114
| 5
|
[
"Q:\n\nFind $\\frac{1}{1.2.3.4}+\\frac{4}{3.4.5.6}+\\frac{9}{5.6.7.8}+\\frac{16}{7.8.9.10}+\\dots$\n\nProve that\n $$\n\\frac{1}{1.2.3.4}+\\frac{4}{3.4.5.6}+\\frac{9}{5.6.7.8}+\\frac{16}{7.8.9.10}+\\dots=\\frac{1}{6}\\log2-\\frac{1}{24}\n$$\n\nMy Attempt\n$$\nT_n=\\frac{n^2(2n-2)!}{(2n+2)!}=\\frac{n^2}{(2n+2)(2n+1)(2n)(2n-1)}\\\\\n=\\frac{1}{24}\\Big[\\frac{-2}{n+1}+\\frac{3}{2n+1}+\\frac{2}{2n-1}\\Big]\\\\\n$$\n$$\nS=\\frac{1}{24}\\Big[{-2}\\big[\\frac{1}{2}+\\frac{1}{3}+\\frac{1}{4}+\\dots\\big]+{3}\\big[\\frac{1}{3}+\\frac{1}{5}+\\frac{1}{7}+\\dots\\big]+{2}\\big[1+\\frac{1}{3}+\\frac{1}{5}+\\dots\\big]\\Big]\\\\\n=\\frac{1}{24}\\Big[{2}\\big[1-\\frac{1}{2}+\\frac{1}{3}-\\frac{1}{4}+\\dots\\big]+{3}\\big[\\frac{1}{3}+\\frac{1}{5}+\\frac{1}{7}+\\dots\\big]-{2}\\big[\\frac{1}{3}+\\frac{1}{5}+\\dots\\big]\\Big]\\\\\n=\\frac{1}{24}\\Big[2\\log2+\\frac{1}{3}+\\frac{1}{5}+\\frac{1}{7}+\\dots\\Big]=\\frac{1}{12}\\log 2+\\frac{1}{24}\\Big[\\frac{1}{3}+\\frac{1}{5}+\\frac{1}{7}+\\dots\\Big]\n$$\nI dont think that the last term series converges so I think I'm stuck, and what does it mean? ",
"How do I proceed further and evaluate the infinite series ?",
"\nThanx to @Robert Z for the correction.",
"\nMethod 1\n$$\nS=\\frac{1}{24}\\Big[-2[\\frac{1}{2}+\\frac{1}{3}+\\frac{1}{4}+\\dots]+3[\\frac{1}{3}+\\frac{1}{5}+\\dots]+[1+\\frac{1}{3}+\\frac{1}{5}+\\dots]\\Big]\\\\\n=\\frac{1}{24}\\Big[\\color{red}{-2\\big[\\frac{1}{3}+\\frac{1}{5}+\\dots\\big]}+2\\big[-\\frac{1}{2}-\\frac{1}{4}-\\dots\\big]+\\color{red}{2\\big[\\frac{1}{3}+\\frac{1}{5}+\\dots\\big]}+\\big[\\frac{1}{3}+\\frac{1}{5}+\\dots\\big]+\\big[1+\\frac{1}{3}+\\frac{1}{5}+\\dots\\big]\\Big]\\\\\n=\\frac{1}{24}\\Big[2(-\\frac{1}{2}-\\frac{1}{4}-\\dots)+2(1+\\frac{1}{3}+\\frac{1}{5}+\\dots)-1\\Big]\\\\\n=\\frac{1}{24}[2\\log2-1]\\implies\\boxed{S=\\frac{\\log2}{12}-\\frac{1}{24}}\n$$\nMethod 2\n$$\nS=\\frac{1}{24}\\Big[-2[\\frac{1}{2}+\\frac{1}{3}+\\frac{1}{4}+\\dots]+3[\\frac{1}{3}+\\frac{1}{5}+\\dots]+[1+\\frac{1}{3}+\\frac{1}{5}+\\dots]\\Big]\\\\\n=\\frac{1}{24}\\Big[-4[\\frac{1}{4}+\\frac{1}{6}+\\frac{1}{8}+\\dots]+4[1+\\frac{1}{3}+\\frac{1}{5}+\\dots]-3\\Big]\\\\\n=\\frac{1}{24}\\Big[4[1-\\frac{1}{2}+\\frac{1}{3}-\\frac{1}{4}+\\dots]+4.\\frac{1}{2}-3\\Big]=\\frac{1}{24}\\Big[4[1-\\frac{1}{2}+\\frac{1}{3}-\\frac{1}{4}+\\dots]-1\\Big]\\\\\n=\\frac{1}{24}[4\\log2-1]\\implies\\boxed{S=\\frac{\\log2}{6}-\\frac{1}{24}}\n$$\nWhy do I seem to get a different solution in Method 1 ?. ",
"And what is so different in methods 1 and 2 ?",
"\n\nA:\n\nNote that after the partial fraction decomposition we have that (one of your coefficients is wrong),\n$$\\frac{1}{24}\\left(\\frac{-2}{n+1}+\\frac{3}{2n+1}+\\frac{\\color{blue}{1}}{2n-1}\\right)=\\frac{1}{6}\\left(\\frac{-1}{2n+2}+\\frac{1}{2n+1}\\right)+\\frac{1}{24}\\left(\\frac{1}{2n-1}-\\frac{1}{2n+1}\\right).$$\nHence, as $N\\to\\infty$,\n$$\\begin{align}\n\\sum_{n=1}^{N}T_n\n&=\\frac{1}{6}\\sum_{n=1}^{N}\\left(\\frac{-1}{2n+2}+\\frac{1}{2n+1}\\right)\n+\\frac{1}{24}\\sum_{n=1}^{N}\\left(\\frac{1}{2n-1}-\\frac{1}{2n+1}\\right)\\\\\n&=\\frac{1}{6}\\sum_{n=3}^{2N+2}\\frac{(-1)^{n+1}}{n}\n+\\frac{1}{24}\\left( 1-\\frac{1}{2N+1}\\right)\\\\\n&\\to\\frac{1}{6}\\left(\\log(2)-1+\\frac{1}{2}\\right)+\\frac{1}{24}=\\frac{\\log(2)}{6}-\\frac{1}{24}\n\\end{align}$$\nwhere the last series is telescopic.",
"\nP.S. WA confirms the result. ",
"Note that in ss1729's first method \n$$\\begin{align}\n&S_{2n}=\\frac{1}{24}\\Big[-2[\\frac{1}{2}+\\frac{1}{3}+\\frac{1}{4}+\\dots+\\frac{1}{2n+1}]+3[\\frac{1}{3}+\\frac{1}{5}+\\dots+\\frac{1}{4n+1}]+[1+\\frac{1}{3}+\\frac{1}{5}+\\dots+\\frac{1}{4n-1}]\\Big]\\\\ &=\\frac{1}{24}\\Big[\\color{red}{-2\\big[\\frac{1}{3}+\\frac{1}{5}+\\dots+\\frac{1}{2n+1}\\big]}+2\\big[-\\frac{1}{2}-\\frac{1}{4}-\\dots-\\frac{1}{2n}\\big]+\\color{red}{2\\big[\\frac{1}{3}+\\frac{1}{5}+\\dots+\\frac{1}{2n+1}+\\frac{1}{2n+3}+\\dots+\\frac{1}{4n+1}\\big]}+2\\big[1+\\frac{1}{3}+\\frac{1}{5}+\\dots+\\frac{1}{2n+1}+\\frac{1}{2n+3}+\\dots+\\frac{1}{4n+1}\\big]-1-\\frac{2}{4n+1}\\Big]\n\\end{align}$$\nand the red part does NOT go to zero!!",
"\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0.001006036217303823,
0,
0.02564102564102564,
0.0017730496453900709,
0,
0,
0,
0,
0
] | 0.003158
| 5
|
[
"\"Filed out from Dolphin Smalltalk 7\"!",
"\r\n\r\nOLEStructure subclass: #CATEGORYINFO\r\n\tinstanceVariableNames: ''\r\n\tclassVariableNames: '_OffsetOf_catid _OffsetOf_lcid _OffsetOf_szDescription'\r\n\tpoolDictionaries: ''\r\n\tclassInstanceVariableNames: ''!",
"\r\nCATEGORYINFO guid: (GUID fromString: '{a8eebb01-0149-481c-8b90-1eeba6516286}')!",
"\r\nCATEGORYINFO addClassConstant: '_OffsetOf_catid' value: 16r0!",
"\r\nCATEGORYINFO addClassConstant: '_OffsetOf_lcid' value: 16r10!",
"\r\nCATEGORYINFO addClassConstant: '_OffsetOf_szDescription' value: 16r14!",
"\r\nCATEGORYINFO comment: '<CATEGORYINFO> is an <ExternalStructure> class to wrap the struct ''COMCAT.CATEGORYINFO'' from type information in the ''OLE Component Categories Library'' library.",
"\r\n\r\nCATEGORYINFO is used in conjunction with ICatInformation>>EnumCategories() to enumerate details of the categories registered on the host machine.'!",
"\r\n!",
"CATEGORYINFO categoriesForClass!COM Category Manager! !",
"\r\n!",
"CATEGORYINFO methodsFor!",
"\r\n\r\ncatid\r\n\t\"Answer the <GUID> value of the receiver's 'catid' field.\"",
"\r\n\r\n\t^GUID fromAddress: bytes yourAddress!",
"\r\n\r\ncatid: aGUID\r\n\t\"Set the receiver's 'catid' field to the value of the argument, aGUID\"\r\n\r\n\taGUID\r\n\t\treplaceBytesOf: bytes\r\n\t\tfrom: ##(_OffsetOf_catid + 1)\r\n\t\tto: ##(_OffsetOf_catid + GUID basicByteSize)\r\n\t\tstartingAt: 1!",
"\r\n\r\ndescription\r\n\t\"Answer the receiver's szDescription field as a <readableString>.\"",
"\r\n\r\n\t^self szDescription asString!",
"\r\n\r\ndescription: desc\r\n\t\"Set the receiver's szDescription field to <Utf16String> representation\r\n\tof the <readableString> argument, desc.\"",
"\r\n\r\n\tself szDescription: desc asUtf16String!",
"\r\n\r\nlcid\r\n\t\"Answer the <Integer> value of the receiver's 'lcid' field.\"",
"\r\n\r\n\t^bytes dwordAtOffset: _OffsetOf_lcid!",
"\r\n\r\nlcid: anInteger\r\n\t\"Set the receiver's 'lcid' field to the value of the argument, anInteger\"\r\n\r\n\tbytes dwordAtOffset: _OffsetOf_lcid put: anInteger!",
"\r\n\r\nlocale: locale\r\n\t\"Set the receiver's lcid field to <integer> LCID of the <Locale>\r\n\targument, locale.\"",
"\r\n\r\n\tself lcid: locale asParameter!",
"\r\n\r\nszDescription\r\n\t\"Answer the <Utf16String> value of the receiver's 'szDescription' field.\"",
"\r\n\r\n\t^Utf16String fromAddress: bytes yourAddress + _OffsetOf_szDescription!",
"\r\n\r\nszDescription: anUtf16String\r\n\t\"Set the receiver's 'szDescription' field to the value of the argument, anUtf16String\"\r\n\r\n\t| size |\r\n\tsize := anUtf16String byteSize - 2 min: ##(127 * 2).",
"\r\n\tanUtf16String\r\n\t\treplaceBytesOf: bytes\r\n\t\tfrom: ##(_OffsetOf_szDescription + 1)\r\n\t\tto: _OffsetOf_szDescription + size\r\n\t\tstartingAt: 1.",
"\r\n\tbytes wordAtOffset: _OffsetOf_szDescription + size put: 0! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #catid!**compiled accessors**!public! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #catid:!**compiled accessors**!public! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #description!accessing!public! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #description:!accessing!public! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #lcid!**compiled accessors**!public! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #lcid:!**compiled accessors**!public! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #locale:!accessing!public! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #szDescription!**compiled accessors**!public! !",
"\r\n!",
"CATEGORYINFO categoriesFor: #szDescription:!**compiled accessors**!public! !",
"\r\n\r\n!",
"CATEGORYINFO class methodsFor!",
"\r\n\r\ndefineFields\r\n\t\"Define the fields of the CATEGORYINFO structure.",
"\r\n\t\tCATEGORYINFO compileDefinition\r\n\t\r\n\t\ttypedef \t\tstruct tagCATEGORYINFO {\r\n\t\t\tGUID catid;\r\n\t\t\tunsigned long lcid;\r\n\t\t\tshort szDescription[128];\r\n\t\t} CATEGORYINFO;\r\n\r\n\tOriginally generated from a type library built from the Microsoft supplied IDL (comcat.idl), but\r\n\tthe szDescription member is of course a wide string, and there is some loss of information in the\r\n\ttypelib which we must correct here.",
"\r\n\t\"\r\n\r\n\tself\r\n\t\tdefineField: #catid type: (StructureField type: GUID);\r\n\t\tdefineField: #lcid type: DWORDField new;\r\n\t\tdefineField: #szDescription type: (StringField type: Utf16String length: 128)!",
"\r\n\r\ngetFieldNames\r\n\t^#(#catid #lcid #szDescription)! !",
"\r\n!",
"CATEGORYINFO class categoriesFor: #defineFields!public!template definition! !",
"\r\n!",
"CATEGORYINFO class categoriesFor: #getFieldNames!**compiled accessors**!constants!private! !",
"\r\n\r\n"
] |
{
"pile_set_name": "Github"
}
|
[
0,
0,
0.024691358024691357,
0.015873015873015872,
0.015873015873015872,
0.027777777777777776,
0,
0.006622516556291391,
0,
0,
0,
0,
0,
0,
0.004484304932735426,
0,
0,
0,
0,
0,
0,
0.006622516556291391,
0,
0,
0,
0,
0,
0.007246376811594203,
0,
0,
0.014925373134328358,
0,
0.014705882352941176,
0,
0.016666666666666666,
0,
0.01639344262295082,
0,
0.015151515151515152,
0,
0.014925373134328358,
0,
0.017857142857142856,
0,
0.013333333333333334,
0,
0.013157894736842105,
0,
0,
0.014705882352941176,
0.007444168734491315,
0.02030456852791878,
0,
0,
0,
0,
0,
0
] | 0.004979
| 5
|
[
"We hope you enjoyed those spring-like temperatures we just had, because it’s time to pay for them.",
"\n\nHow, you ask, as you drive into a massive pothole?",
"\n\nWell, that’s how.",
"\n\nThe weather is perfect – just perfect – for a barrage of new, nasty potholes.",
"\n\nA major swing from sub-zero temps to the high 60s? ",
"Check.",
"\n\nMoisture from rain or snow that can seep into cracks in the roads, freeze, thaw and freeze again? ",
"Check.",
"\n\n“Everyone here looked at the forecast this week, and they said, ‘Wow, this is going to be awful for our pavements,’” said Matt Bruning, Ohio Department of Transportation spokesman.",
"\n\nAlready this winter, ODOT crews have used 2,770 tons of asphalt to repair potholes. ",
"That’s compared to 2,195 tons during the same time frame in 2018.",
"\n\n“When we’re not plowing, we’re patching,” Bruning said. “",
"We know (potholes are) out there. ",
"We’re working hard to address them as quickly as we can.”",
"\n\nPotholes:The city could pay for damage to your car. ",
"But it probably won’t.",
"\n\nBruning urged drivers to report potholes, either on ODOT’s website, via social media or by calling a local garage.",
"\n\nBe as precise as possible, he said.",
"\n\nAnd, be sure to drive carefully and watch out for workers who are fixing the roads.",
"\n\n“It’s a dangerous job,” Bruning said, “and we’d really like for all our people to go home safe at the end of the day.”",
"\n\nDid you know:\n\nIf you hit a pothole and it damages your vehicle, there’s a chance you could get reimbursed?",
"\n\nFor state-maintained roads, that process is handled through the Ohio Court of Claims.",
"\n\nIn Cincinnati, drivers can submit a damage claim on the city’s website. ",
"Reimbursement is rare, however, as The Enquirer reported in November.",
"\n\nSince 2015, drivers have filed more than 1,000 claims with the city, asking for reimbursement from pothole damage.",
"\n\nThe city rejected 98 percent of those claims, paying out only 21 times."
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0,
0.01098901098901099,
0.011627906976744186,
0,
0,
0,
0,
0,
0,
0.008620689655172414,
0,
0,
0,
0,
0.011494252873563218,
0,
0.014492753623188406,
0,
0
] | 0.002201
| 5
|
[
"The present invention relates to a cold rolled steel sheet used as shadow mask material for a color picture tube, a method for manufacturing the cold rolled steel sheet, a shadow mask utilized with the cold rolled steel sheet and a picture tube with the shadow mask.",
"\nA cold rolled steel sheet used for shadow mask material has been manufactured by the following manufacture steps. ",
"That is, low carbon steel manufactured by a steel maker is performed by pickling and cold rolling so as to form a steel sheet having a predetermined thickness. ",
"After degreasing, the steel sheet is decarbonized and annealed in a wet atmosphere in a box type anneal furnace. ",
"Then, the steel sheet is secondary cold rolled so as to form a furnish steel sheet with a final thickness.",
"\nThe cold rolled steel sheet manufactured by such a method is installed in a picture tube after being treated by photo etching, annealing, pressing and baking. ",
"Unless carbon originally contained in the cold rolled steel sheet is decarbonized sufficiently during the above described steps, improper etching and improper press forming would be induced. ",
"Therefore, a content ratio of decarbonized and annealed carbon should be equal or less than 0.0015 wt %, preferably equal or less than 0.0008 wt %.",
"\nRegarding a cold rolled steel sheet used for a shadow mask manufactured by a method comprising the above described etching and press forming steps, it has been required that etching performance and press forming performance should be more stable than the conventional ones since a picture tube is required to provide high picture quality and improve its fine degree. ",
"Japanese Patent Laid-open Publication No. ",
"Shou 56-139624, No. ",
"Hei 2-61029 and No. ",
"Hei 8-269627 discloses a method to resolve such a problem, respectively. ",
"In the above prior art, although steel components and annealing condition are described, these are not sufficient to provide stable etching performance and press forming performance in order to satisfy recent requirements with respect to the shadow mask material such as high picture quality and its fine improvement.",
"\nA purpose of the invention is to resolve the above described drawbacks in the conventional art and to provide shadow mask material with characteristic uniformly etched in a coil and press forming characteristic installed in a picture tube.",
"\nShadow mask material according to the present invention is comprises nitrogen equal to or less than 0.0030 wt %, boron satisfying an inequality of 5 ppmxe2x89xa6Bxe2x88x9211/14xc3x97Nxe2x89xa630 ppm and the residue including iron and unavoidable impurities. ",
"Shadow mask material according to the present invention comprises carbon equal to or less than 0.0008 wt %, silicon equal to or less than 0.03 wt %, manganese from 0.1 to 0.5 wt %, phosphorus equal to or less than 0.02 wt %, sulfur equal to or less than 0.02 wt %, aluminum from 0.01 to 0.07 wt %, nitrogen equal to or less than 0.0030 wt % and boron satisfying an inequality of 5 ppmxe2x89xa6Bxe2x88x9211/14xc3x97Nxe2x89xa630 ppm and the residue including iron and unavoidable impurities.",
"\nA method for manufacturing shadow mask material made of a steel sheet according to the present invention comprising nitrogen equal to or less than 0.0030 wt %, boron satisfying an inequality of 5 ppmxe2x89xa6Bxe2x88x9211/14xc3x97Nxe2x89xa630 ppm and the residue including iron and unavoidable impurities, wherein a hot rolling furnish is higher than a point Ar3, comprises hot rolling the steel sheet at a coiling temperature from 540 to 680xc2x0 C. The sheet is then pickled, and then the steel sheet is annealed in a continuous annealing step so as to control the amount of carbon remaining as equal to or less than 0.0008 wt %.",
"\nA method for manufacturing shadow mask material made of a steel sheet according to the present invention is comprising carbon equal to or less than 0.0008 wt %, silicon equal to or less than 0.03 wt %, manganese from 0.1 to 0.5 wt %, phosphorus equal to or less than 0.02 wt %, sulfur equal to or less than 0.02 wt %, aluminum from 0.01 to 0.07 wt %, nitrogen equal to or less than 0.0030 wt % and boron satisfying an inequality of 5 ppmxe2x89xa6Bxe2x88x9211/14xc3x97Nxe2x89xa630 ppm and the residue including iron and unavoidable impurities, wherein a hot rolling finish is higher than a point Ar3, comprises hot rolling said steel sheet at a coiling temperature from 540 to 680xc2x0 C. The sheet is then pickled, and then said steel sheet is annealed in a continuous annealing step so as to control the amount of carbon remaining at equal to or less than 0.0008 wt % A shadow mask according to the present invention is characterized of comprising the above described shadow mask material. ",
"A picture tube according to the present invention is characterized comprising the above described shadow mask."
] |
{
"pile_set_name": "USPTO Backgrounds"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.05,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0.0025
| 5
|
[
"Temozolomide plus radiotherapy for glioblastoma in a Canadian province: efficacy versus effectiveness and the impact of O6-methylguanine-DNA-methyltransferase promoter methylation.",
"\nRadiotherapy with concomitant and adjuvant temozolomide has been the standard of care for newly diagnosed glioblastoma in adults since the pivotal trial by Roger Stupp and colleagues. ",
"The effectiveness of this regimen has not been evaluated in Canada. ",
"Additionally, the impact of O6-methylguanine-DNA-methyltransferase (MGMT) promoter methylation on patient survival has not been confirmed. ",
"Hence, survival outcomes and MGMT predictive value were compared for the patients in Alberta versus the Stupp trial population. ",
"Retrospective chart review of 215 adult glioblastoma patients who started radiotherapy and temozolomide between January 2007 and December 2010 at the Cross Cancer Institute (Edmonton, Alberta) or the Tom Baker Cancer Centre (Calgary, Alberta). ",
"In the Alberta population, median overall survival was 14.3 months (vs. 14.6 months in trial, p = NS) and median progression-free survival was 5.8 months (vs. 6.9 months in trial, p = NS). ",
"However, unlike the trial, the Alberta MGMT subgroup analysis for overall survival was not statistically significant, despite a hazard ratio of 0.65 in favor of the methylated group. ",
"More Alberta patients received corticosteroids (p < 0.0001) and fewer underwent complete resection (p = 0.0001) or a postprogression second surgery (p = 0.01) than the Stupp population, but characteristics were otherwise similar. ",
"Current practice in Alberta enables patients to achieve overall and progression-free survival similar to the clinical trial. ",
"Further follow-up is required to confirm the predictive value of the MGMT assay. ",
"Until that is clarified or better treatments are developed, it is reasonable to continue offering this treatment regimen to patients regardless of MGMT methylation status."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0,
0.005405405405405406,
0,
0.007194244604316547,
0.015625,
0.00819672131147541,
0,
0.00546448087431694,
0.004347826086956522,
0,
0.012345679012345678,
0.005847953216374269
] | 0.005369
| 5
|
[
"Kinematic magnetic resonance imaging of a thoracic spinal extradural arachnoid cyst: an alternative suggestion for exacerbation of symptoms during straining.",
"\nA case study of an extradural arachnoid cyst using kinematic magnetic resonance imaging. ",
"To access the dynamic and pathologic changes of an extradural subarachnoid cyst during straining by kinematic magnetic resonance imaging and to clarify the pathomechanism of a fluctuation in symptoms. ",
"Extradural arachnoid cysts of the spine are an uncommon cause of myelopathy secondary to spinal cord compression; however, the precise mechanism of cord compression and subsequent symptoms remain unclear. ",
"A 31-year-old female presented with severe left lower thoracic back pain and leg stiffness, which were exacerbated by coughing and straining. ",
"She was diagnosed with an extradural subarachnoid cyst by magnetic resonance imaging. ",
"Kinematic magnetic resonance imaging was carried out to assess the dynamic change of the extradural cyst and to demonstrate the mechanism causing her chest pain and leg stiffness during straining. ",
"Kinematic magnetic resonance imaging demonstrated that the cyst wall was compressed, and the size of extradural cyst was decreased for several seconds during straining. ",
"Furthermore, the ring of cerebrospinal fluid was gradually compressed circumferentially. ",
"After surgery, the patient experienced complete relief of symptoms. ",
"Postoperative kinematic magnetic resonance imaging revealed good decompressive results had been obtained, and the ring of cerebrospinal fluid was preserved even when the patient strained for a few minutes. ",
"Kinematic magnetic resonance imaging study demonstrated that pressure changes which occur in the extradural space as well as in the arachnoid cyst might cause spinal cord compression and result in intermittent exacerbation of symptoms."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0
| 5
|
[
"Cast immobilization after total elbow arthroplasty. ",
"A safe cost-effective method of initial postoperative care.",
"\nSeventeen nonconstrained total elbow replacements were inserted in 12 patients. ",
"One patient died prior to the one-year follow-up examination, and two others required revision in the immediate postoperative period. ",
"The remaining 14 primary total elbow arthroplasties in 11 patients were included in this study. ",
"There were eight women and three men with an average age of 58.1 years. ",
"The diagnosis was rheumatoid arthritis in 12 patients and posttraumatic arthritis and juvenile rheumatoid arthritis each in one patient. ",
"Postoperatively, patients were immobilized in a long arm cast. ",
"The mean hospital stay was 4.3 days. ",
"At four weeks, the patients were seen for cast removal. ",
"Instructions were given for range of motion (ROM) exercises and patients were encouraged to resume normal daily activities as tolerated. ",
"No formal physical therapy was prescribed. ",
"The average follow-up period was 32 months. ",
"Preoperatively, the mean elbow motions were flexion 124 degrees, extension 34 degrees, pronation 65 degrees, and supination 44 degrees. ",
"At the last follow-up examination, ROM had improved significantly in all directions except extension (flexion 141 degrees, extension 36 degrees, pronation 77 degrees, and supination 61 degrees). ",
"There was one ulnar nerve palsy that only partially resolved. ",
"Another patient's elbow had initially subluxed due to excessive shortening of the humerus; however, he had an excellent ROM and was asymptomatic at 31 months. ",
"There were no dislocations or wound healing problems. ",
"Cast immobilization provides an effective means of promoting soft-tissue healing, permitting early discharge from the hospital and simplifying the postoperative rehabilitation while achieving satisfactory ROM without formal physical therapy."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0,
0,
0,
0,
0,
0,
0.0072992700729927005,
0,
0,
0,
0.0072992700729927005,
0,
0,
0,
0.005128205128205128,
0,
0.006289308176100629,
0,
0
] | 0.001369
| 5
|
[
"Q:\n\nHow to store curly brackets in a Bash variable\n\nI am trying to write a bash script. ",
"I am not sure why in my script:\nls {*.xml,*.txt} \n\nworks okay, but \nname=\"{*.xml,*.txt}\"\nls $name\n\ndoesn't work. ",
"I get\nls: cannot access {*.xml,*.txt}: No such file or directory\n\nA:\n\nThe expression\nls {*.xml,*.txt}\n\nresults in Brace expansion and shell passes the expansion (if any) to ls as arguments. ",
" Setting shopt -s nullglob makes this expression evaluate to nothing when there are no matching files.",
"\nDouble quoting the string suppresses the expansion and shell stores the literal contents in your variable name (not sure if that is what you wanted). ",
" When you invoke ls with $name as the argument, shell does the variable expansion but no brace expansion is done.",
"\nAs @Cyrus has mentioned, eval ls $name will force brace expansion and you get the same result as that of ls {\\*.xml,\\*.txt}.",
"\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0,
0,
0.005263157894736842,
0,
0,
0.008849557522123894,
0.008,
0
] | 0.002764
| 5
|
[
"Associated organisational unit\n\nAdvances and challenges in the modelling of laser melt pool processes: Keynote presentation at the Interfinish SERIA 2013 Asia-Pacific International Conference on Surface Engineering for Research and Industrial Applications"
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0
] | 0
| 5
|
[
"Franz Maresch\n\nFranz Maresch (born 28 June 1972) is an Austrian football manager and former player.",
"\n\nExternal links\n \n\nCategory:1972 births\nCategory:Living people\nCategory:Austrian footballers\nCategory:Austrian football managers\nCategory:FK Austria Wien players\nCategory:First Vienna FC players\nCategory:SC Untersiebenbrunn players\nCategory:Austrian Football Second League players\nCategory:Austrian Football Bundesliga players\nCategory:Association football forwards"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.020202020202020204,
0.00546448087431694
] | 0.012833
| 5
|
[
"Bloomberg: Microsoft Office and how the social network LinkedIn will help each other?",
"\n\nvia:博客园 time:2016/6/14 12:00:16 readed:1372\n\nBloomberg wrote that the United States today, Microsoft's acquisition of LinkedIn professional social network can blur the boundaries between work activities, thereby creating a huge opportunity for both sides.",
"\n\nThe following is the text of the article:\n\nLinkedIn monthly active users and the total number of users (Unit: Million)\n\nUsually people use LinkedIn to find a job where Microsoft Office is a tool used for work. ",
"These two activities to isolate limit their own attractiveness: Many people often think that there is no reason to view your LinkedIn account. ",
"Microsoft spent $ 26.2 billion acquisition of LinkedIn has become one of the technology industry's largest-ever M & A transaction and rationale for the deal is this: If the merger of these two products, people use LinkedIn and the Office of the frequency will increase.",
"\n\nIn Monday's announcement, both companies stressed that the above two services will promote each other. ",
"LinkedIn also said the move will help Microsoft Outlook users to start final preparations for the meeting. ",
"Skype calls and sharing documents through Office 365 can also benefit from this. ",
"In this day and age everything is covered with a layer of social networking, provide a set of separate independent software productivity will be a big disadvantage.",
"\n\nLinkedIn monthly active users in the proportion of all users\n\nThrough the acquisition of LinkedIn, Microsoft Office will also provide their own social network. ",
"In theory, both can be described as a natural fit because both services are focused on areas of work. ",
"This cooperation can enhance the frequency of people use Microsoft software, and services to reduce their unsubscribe at the end of probabilities. ",
"In addition, it is possible to obtain data LinkedIn will also make Microsoft's personal assistant Cortana become more intelligent. ",
"Microsoft cited an example: Cortana can tell the user that she is about to meet with the man she was with alumni of the same university, at the same time showing them the latest record of the school sports teams to prepare for both chatting purposes.",
"\n\nLinkedIn is hoping that if people can integrate into the working process, may be able to help them find more use of professional social networks. ",
"Although many people are now using LinkedIn, but less than a quarter of the monthly real users sign in to the service.",
"\n\nLinkedIn has a lot to explore ways to enhance the interactivity. ",
"The company tried a lot of ways, it will become a destination workplace news of their own, and by Influencers service cultivate a stable of writers. ",
"The company also acquired several other news readers and development related products, start-up companies. ",
"LinkedIn last year spent $ 1.5 billion acquisition of Lynda, the company can provide training and guidance to users in many areas. ",
"However, the proportion of active users monthly LinkedIn still slowly lowered. ",
"For any social network, this is not good news.",
"\n\nMicrosoft said in the announcement, the company can increase the LinkedIn user information and training, and through direct payments and generate additional advertising revenue. ",
"At the same time, LinkedIn will also create a range of opportunities to work with other Microsoft-related business. ",
"The world's largest software company, this business is really under the original capital."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.03529411764705882,
0.011673151750972763,
0.0047169811320754715,
0.006993006993006993,
0.01486988847583643,
0,
0.018691588785046728,
0,
0,
0.012345679012345678,
0,
0.006802721088435374,
0.022900763358778626,
0.008,
0,
0.00847457627118644,
0,
0,
0,
0.007633587786259542,
0.012658227848101266,
0,
0.011111111111111112,
0.017241379310344827,
0
] | 0.007976
| 5
|
[
"Ο Λεονάρντο Μπονατίνι θα είναι η πρώτη μεταγραφή του ΠΑΟΚ για την τρέχουσα μεταγραφική περίοδο και ο άνθρωπος που θα αντικαταστήσει τον Αλεξάνταρ Πρίγιοβιτς.",
"\n\nΟ ΠΑΟΚ και η Γουλβς ήρθαν σε συμφωνία για δανεισμό του επιθετικού με ρήτρα αγοράς για το καλοκαίρι.",
"\n\nΟ παίκτης κατά πάσα πιθανότητα θα βρίσκεται μέσα στην εβδομάδα στη Θεσσαλονίκη οπότε και θα ανακοινωθεί από τους ασπρόμαυρους. ",
"Ο ΠΑΟΚ ήταν ανάμεσα στον παίκτη της Γουλφ και τον Μπεργκ αλλά απέρριψε τον Σουηδό για λόγους ηλικίας και έναν παίκτη που θα προσφέρει για πολλά χρόνια στην ομάδα.",
"\n\nΘυμίζουμε ότι ο αθλητικός διευθυντής του ΠΑΟΚ, Μάριο Μπράνκο, βρέθηκε την προηγούμενη εβδομάδα στην Αγγλία όπου διαπραγματεύτηκε τη μεταγραφή του ποδοσφαιριστή."
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.025477707006369428,
0,
0.015503875968992248,
0.030864197530864196,
0.024691358024691357
] | 0.019307
| 5
|
[
"\n\nA Visual Album by Danny Perez and Animal Collective\n\n\n\nScreenings 2010:\n\n\n\nWorld Premiere: Sundance Film Festival, January 21 - 31, 2010.",
"\n\n\n\nMarch 2, 2010\n\nNew York City NY, USA\n\nVisual Arts Theatre\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"6:30pm & 8:30pm\n\nSOLD OUT, SECOND NIGHT ADDED.",
"\n\nWill-call tickets will be available for pickup at the theater starting at 5:30pm.",
"\n\n\n\nMarch 3, 2010\n\nNew York City NY, USA\n\nVisual Arts Theatre\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"6:30pm, tickets available at the door starting at 5:30pm, cash only. ",
"8:30pm SOLD OUT.",
"\n\nWill-call tickets will be available for pickup at the theater starting at 5:30pm.",
"\n\n\n\nMarch 17, 2010\n\nChicago IL, USA\n\nMusic Box Theatre\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"7pm & 9pm SOLD OUT. ",
"Will-call tickets will be available for pickup at the theater starting at 6pm.",
"\n\n\n\nMarch 20, 2010\n\nMinneapolis MN, USA\n\nThe Cedar\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"Get tickets: 7pm, 9pm.",
"\n\n\n\nMarch 22, 2010\n\nLos Angeles CA, USA\n\nArcLight Cinerama Dome\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"Get tickets: 9pm SOLD OUT. ",
"Tickets are still available for the 7pm show, and can be purchased at the theater starting at 5:30pm, cash only. ",
"Will-call tickets will also be available for pickup starting at 5:30pm.",
"\n\n\n\nMarch 25, 2010\n\nSan Francisco CA, USA\n\nSundnace Kabuki Cinemas\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"8:30pm SOLD OUT. ",
"There are a few tickets available for the 6:30pm show, they'll be available at the door starting at 5:30pm, cash only. ",
"Will-call tickets will be available for pickup at the theater starting at 5:30pm.",
"\n\n\n\nMarch 29, 2010\n\nPortland OR, USA\n\nCinema 21\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"Tickets still available for 7pm and 9pm screenings. ",
"Walk up ticket sales (cash only) and will-call pickup starts at 6pm at the theater.",
"\n\n\n\nMarch 30, 2010\n\nSeattle WA, USA\n\nThe Egyptian Theatre\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"7pm & 9pm. ",
"Tickets available at the door, cash only. ",
"Walk up ticket sales and will-call pickup starts at 6pm at the theater.",
"\n\n\n\nApril 16, 2010\n\nPhiladelphia PA, USA\n\nInternational House\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n7pm & 9pm SOLD OUT\n\n\n\nApril 17, 2010\n\nBaltimore MD, USA\n\nSenator Theatre\n\nWith special guests director Danny Perez and members of Animal Collective. ",
"Produced in association with The Friends of the Senator and Fortune5Fifty. ",
"After-party at the theater following screening.",
"\n\n$15, 8pm. ",
"Tickets still available and can be purchased at the theater starting at 6pm, cash only, first come, first served. ",
"Will-call tickets will also be available for pickup starting at 6pm.",
"\n\n\n\nApril 19, 2010\n\nAmherst MA, USA\n\nHampshire College\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15, 9:15pm & 11:15pm. ",
"Tickets are ONLY available to 5-College students with a valid Hampshire, Smith, Amherst, Mt. Holyoke or UMASS ID. ",
"Tickets will be on sale Saturday, April 10 in Hampshire College's Harold F. Johnson Library from 1:00pm - 5:00 pm, and April 12 - April 16 in the CLA Office (attached to the Dakin House) from 9:00am - 4:00pm. ",
"For more info email [email protected]\n\n\n\nApril 20, 2010\n\nBoston MA, USA\n\nBrattle Theatre\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"8:30pm & 10:30pm SOLD OUT. ",
"Midnight show added, get tickets. ",
"Will-call pickup starts at 6:30pm at the theater, and midnight tickets will be available for purchase at the theater, cash only.",
"\n\n\n\nApril 21, 2010\n\nSilver Spring MD, USA\n\nAFI Silver Theatre\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"Get tickets: 8pm & 10pm. ",
"Will-call pickup and walk-up ticket sales (cash only) will begin at 7pm at the theater.",
"\n\n\n\nApril 23, 2010\n\nChapel Hill NC, USA\n\nVarsity Theatre\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n$15. ",
"Get tickets: 7pm & 9pm. ",
"Will-call pickup and walk-up ticket sales (cash only) will begin at 6pm at the theater.",
"\n\n\n\nApril 25, 2010\n\nMiami FL, USA\n\nGrand Central\n\nWith special guests director Danny Perez and members of Animal Collective. ",
"Presented in association with Sweat Records.",
"\n\n$15, all ages, the film starts at 8pm. ",
"Walk-up tickets can be purchased starting at 7pm at the theater, cash only, first-come first-served. ",
"Will-call pick-up also starts at 7pm.",
"\n\n\n\nApril 26, 2010\n\nAtlanta GA, USA\n\nPlaza Theatre\n\nWith special guests director Danny Perez and members of Animal Collective. ",
"After-party at the Highland Ballroom with special guest DJs.",
"\n\n$15. ",
"Get tickets: 7pm & 9pm. ",
"Will-call pickup and walk-up ticket sales (cash only) will begin at 6pm at the theater.",
"\n\n\n\nMay 13, 2010\n\nLondon, UK\n\nICA London\n\nUK Premiere, with special guests director Danny Perez and members of Animal Collective. ",
"ICA Bar event after the screenings with special guest DJ sets.",
"\n\n£12. ",
"6:30pm, 8:30pm & 10:30pm shows SOLD OUT.",
"\n\n\n\nMay 14, 2010\n\nManchester, UK\n\nMint Lounge\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n£8. ",
"6pm, 8pm, book now.",
"\n\n\n\nMay 15, 2010\n\nLeeds, UK\n\nBrudenell Social Club\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n£8. ",
"3pm, 5pm, book now.",
"\n\n\n\nMay 17, 2010\n\nCopenhagen, Denmark\n\nGrand Teatret\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n95kr. ",
"9:30pm, 11:00pm screening, get tickets.",
"\n\n\n\nMay 18, 2010\n\nBerlin, Germany\n\nBabylon\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n€11. ",
"9pm. ",
"Get tickets. ",
"Kino Karten/Kasse/Informationen: Fon: +49 - (0)30 - 24 25 969 (ab 17.00 Uhr)\n\n\n\nMay 19, 2010\n\nHamburg, Germany\n\nUebel und Gefaehrlich\n\nWith special guests director Danny Perez and members of Animal Collective.",
"\n\n€11, 9pm, get tickets.",
"\n\n\n\nMay 21, 2010\n\nAmsterdam, The Netherlands\n\nSmart Project Space\n\nWith special guests director Danny Perez and members of Animal Collective. ",
"After-party.",
"\n\n€12. ",
"8pm, get tickets.",
"\n\n\n\nMay 27 - 29, 2010\n\nBarcelona, Spain\n\nPrimavera Sound\n\nWith special guests director Danny Perez with Avey Tare and Panda Bear of Animal Collective.",
"\n\nPart of the Primavera Sound Festival, get tickets.",
"\n\n\n\nJune 2, 2010\n\nLisbon, Portugal\n\nFaculdade de Belas Artes da Universidade de Lisboa\n\nLargo da Academia Nacional de Belas-Artes\n\nWith special guests director Danny Perez and Panda Bear of Animal Collective.",
"\n\n22:00. ",
"Tickets are €6 and on sale starting May 24.",
"\n\n\n\nJuly 4 & 8, 2010\n\nKarlovy Vary, Czech Republic\n\nKarlovy Vary Film Festival\n\nWith special guest director Danny Perez.",
"\n\nGet tickets and info\n\n\n\nAugust 6 and 7, 2010\n\nNew York NY, USA\n\nIFC Center\n\nSpecial midnight screenings, with director Danny Perez in attendance 8/7.",
"\n\nGet tickets\n\n\n\nSeptember 2 - 5, 2010\n\nMexico City, Mexico\n\nCineteca Nacional\n\nSeptember 2 Premiere, with special guests director Danny Perez and Panda Bear of Animal Collective in attendance.",
"\n\nTickets: 40 pesos, more info at www.cinetecanacional.net and www.chronic.mx\n\n\n\n\n\nFollow the movie on Facebook for screening announcements and other news.",
"\n\n\n\n\n\n\n\n\n\n\n\nThe ODDSAC DVD is shipping now!",
"\n\n\n\nIf you're in the UK and Europe: order from Plexi UK.",
"\n\nIf you're in the USA or rest of the world: order from Plexifilm.",
"\n\n\n\n\n\n\n\nDVD PACKAGE INCLUDES:\n\n* The 53-minute film, with new songs and score by Animal Collective\n\n* 40-page hardcover art book in a slipcover case\n\n* Dolby 2.0 stereo and 5.1 surround sound audio\n\n* Region 0 (world)\n\n\n\n"
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.014388489208633094,
0.021897810218978103,
0,
0.021739130434782608,
0,
0.021897810218978103,
0,
0,
0,
0,
0.023076923076923078,
0,
0,
0.01282051282051282,
0.023809523809523808,
0,
0,
0.02158273381294964,
0,
0,
0,
0,
0.02112676056338028,
0,
0,
0,
0,
0.024390243902439025,
0,
0,
0,
0.022556390977443608,
0,
0,
0,
0,
0.021897810218978103,
0.019867549668874173,
0.013333333333333334,
0,
0,
0,
0.014705882352941176,
0.03076923076923077,
0.04,
0,
0.019138755980861243,
0.017857142857142856,
0,
0.037037037037037035,
0,
0,
0.014598540145985401,
0,
0,
0,
0.022727272727272728,
0,
0,
0,
0.024,
0.022727272727272728,
0.024390243902439025,
0,
0.02702702702702703,
0.023622047244094488,
0,
0,
0,
0,
0.023076923076923078,
0.016129032258064516,
0,
0.025,
0.01652892561983471,
0,
0,
0.023809523809523808,
0,
0,
0.0234375,
0,
0,
0.01694915254237288,
0,
0,
0,
0.023923444976076555,
0,
0.014084507042253521,
0,
0,
0,
0.02,
0,
0.014423076923076924,
0,
0,
0.008333333333333333,
0.013245033112582781,
0.010362694300518135,
0.012903225806451613,
0,
0,
0.015151515151515152,
0.004524886877828055
] | 0.008348
| 5
|
[
"Basal cell carcinoma on the trunk is associated with excessive sun exposure.",
"\nBasal cell carcinoma (BCC) is the most common of all cancers. ",
"Ultraviolet radiation is the major etiologic agent in the pathogenesis of BCC, but there is not a straightforward relationship between cumulative exposure and risk. ",
"A high proportion of lesions arise on the trunk, which is generally much less exposed to the sun than the head, the major site affected. ",
"We tested the hypothesis that the phenotypic determinants and patterns of sun exposure that give rise to BCC on the head and trunk vary in a way that explains the anomalous site distribution. ",
"The study was set in the context of the Nambour Skin Cancer Study, a community-based follow-up study among 1621 participants with virtually complete ascertainment of BCCs between 1992 and 2004. ",
"We compared phenotypic and sun exposure characteristics of participants who developed a first BCC of the head or trunk with those of participants who had no diagnosis of BCC. ",
"BCCs of the trunk were more likely to occur in men; they also occurred at a younger age than BCCs of the head. ",
"There was a positive association between sun sensitivity and BCC of the head that was absent for BCC of the trunk. ",
"A high number of solar keratoses conferred a greater than 3-fold risk for BCCs of both the head and the trunk. ",
"BCCs of the trunk had a particularly strong association with the number of reported sunburns and solar lentigines on the trunk, whereas many lentigines conferred a greater than 3-fold risk of truncal BCC compared with a 50% increased risk of BCC of the head. ",
"The relatively small numbers of tumors may have limited our ability to detect statistically significant differences. ",
"BCCs of the trunk are the result of overexposure of the sensitive basal cells of the epidermis to ultraviolet radiation. ",
"This may result from acute intense exposures sufficient to cause sunburn among people whose ability to tan makes the skin of their face generally less susceptible to the carcinogenic effects of ultraviolet radiation."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0,
0.015873015873015872,
0.006060606060606061,
0,
0.005208333333333333,
0,
0.005714285714285714,
0,
0.017391304347826087,
0,
0.007722007722007722,
0,
0,
0
] | 0.004141
| 5
|
[
"DTI have reached a 637 settlement with it's customers, they have filed with FERC for approval, the first pipeline to reach a settlement. ",
"The settlement includes the netting and trading of imbalances, intraday recalls on released capacity, and other GISB mandates that took years to implement but in reality have no application to the industry.",
"\nLiquidity has increased on the system, TTT volumes have increased from 3 Bcf/d to 5 Bcf/d over the last year with a 5:1 ration of physical to traded volumes. ",
"\nThe interconnect with Empire @ Lysander currently flowing 30-60,000dt/d has a maximum capability of 100,000dt/d. Empire is now allowing secondary deliveries to Lysander therefore volumes have increased at the location. ",
" Note: Empire recently bought out by Union from ANR.",
"\nDTI have an new pipeline project called Green brier. ",
" A new company will be started that will consist of DTI as part owners and operators and other equity interests. ",
" The new pipeline will flow 600,000 dt/d from Cornwell (interconnect with Tennessee and DTI) and run down through VA, into Granville County, NC.",
"\nDTI are offering winter only (30cents) and summer only (13cents) service, the project is designed to compete with Transco's Momentum expansion into Zn4. ",
" \nDTI have remarketed all the 55 Bcf of GSS that was turned back over the past year and also reconstructed for 90% of the 2.2 Bcf/d of transport.",
"\nAnother project they are looking to release to the market is an expansion of deliveries to Leidy in conjunction with Marketlink.",
"\nDTI have a current transportation offering, Lebanon to Leidy capacity 29,100dt/d, for one year starting 11/1/01. ",
" DTI are looking and will probably get max rates (approximately 30 cents).",
"\nDTI will be increasing the transportation fuel rates from 2.28% to 2.78% as per a TCRA settlement recently agreed to by it's customers. ",
" The net effect of this will be a small reduction in the delivered quantity at the delivery locations and a small amount of stranded receipt point capacity on peak days. ",
" This news has not been released to the market, I'm not sure when this will take effect."
] |
{
"pile_set_name": "Enron Emails"
}
|
[
0.014598540145985401,
0.0048543689320388345,
0.006289308176100629,
0,
0.018867924528301886,
0.037037037037037035,
0.008849557522123894,
0.020833333333333332,
0.012987012987012988,
0.006896551724137931,
0.015503875968992248,
0.017543859649122806,
0.02702702702702703,
0.014598540145985401,
0,
0
] | 0.012868
| 5
|
[
"Q:\n\nUsing os.scandir to get all txt files in subfolders\n\nI have a parent dir that has X children dirs each with Y txt files. ",
"I want to list all txt files. ",
"Is there a way to simplify this?",
"\nfor entry in os.scandir(DIR): \n for subentry in os.scandir(entry.path):\n if subentry.is_dir():\n for file in os.scandir(subentry.path):\n if file.is_file() and file.name.endswith(\"txt\"):\n print(file.name)\n\nA:\n\nThere are (at least) two ways to easily achieve this. ",
"The first one is what @Ludisposed suggested in the comments, glob. ",
"It can also recurse down into subdirectories with ** (in Python 3):\nimport glob\n\ndef get_txt_files(base_dir):\n return glob.iglob(f\"{base_dir}/**/*.txt\", recursive=True)\n\nOr, if you are using Windows, which uses different delimiters for paths:\ndef get_txt_files(base_dir):\n return glob.iglob(rf\"{base_dir}\\**\\*.txt\", recursive=True)\n\nThe other one is basically what @Mast suggested, also in the comments, make this a fully recursive function:\ndef get_txt_files(base_dir):\n for entry in os.scandir(base_dir):\n if entry.is_file() and entry.name.endswith(\".txt\"):\n yield entry.name\n elif entry.is_dir():\n yield from get_txt_files(entry.path)\n else:\n print(f\"Neither a file, nor a dir: {entry.path}\")\n\nBoth functions return iterators. ",
"You can print all names with a simple for loop:\nfor name in get_txt_files(\"foo\"):\n print(name)\n\nIf your directory X also contains txt files, they will be yielded from these functions. ",
"You can avoid this with glob by making the depth level explicit:\ndef get_txt_files(base_dir):\n return glob.iglob(f\"{base_dir}/*/*.txt\")\n\nA third, very similar, way is to use pathlib.",
"Path (Python 3 only), which also has a glob method (that directly returns an iterator). ",
"This way you can be sure that this works both on UNIX and Windows:\nfrom pathlib import Path\n\ndef get_txt_files(base_dir):\n return Path(base_dir).glob(\"*/*.txt\")\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0,
0,
0,
0,
0.014925373134328358,
0.0037831021437578815,
0,
0,
0,
0.01818181818181818
] | 0.003689
| 5
|
[
"Conceding she broke a Progressive Conservative election promise by axing a Wynne-era pilot program aimed at finding a new path for people on welfare, Social Services Minister Lisa MacLeod says she made a “tough decision.”",
"\n\nThe basic income pilot project involving about 6,000 people in the Hamilton, Brant, Lindsay, and Thunder Bay areas was a “disincentive” for people to find jobs, MacLeod told reporters Wednesday.",
"\n\n“When you’re encouraging people to accept money without strings attached it really doesn’t send a message that our ministry and our government wants to send,” she said.",
"\n\n“We want to get people back on track and make them productive members of society where that’s possible.”",
"\n\nRead more:\n\nOntario government scraps basic income pilot project, limits welfare increase to 1.5 per cent\n\nOpinion | Bob Hepburn: Where are the grown-ups in Ford’s cabinet?",
"\n\nTories take NDP questions after fracas over alleged mimicry\n\nThe three-year pilot project, which cost $50 million annually, was designed by Kathleen Wynne’s Liberal government with help from former PC senator Hugh Segal. ",
"It gave single participants just under $17,000 annually and couples just over $24,000 in hopes the money — about double standard welfare rates — would boost their odds of finding employment and improving their housing, health and nutrition.",
"\n\nCritics of the cancellation said the fledgling program enabled participants to move into apartments and go back to college, university or other training programs to lift themselves off social assistance.",
"\n\n“This minister is callously dashing their hopes for the future,” said NDP Leader Andrea Horwath. “",
"This minister is out of touch. ",
"She has no idea what people living in poverty are facing.”",
"\n\nBut MacLeod insisted the program wasn’t living up to its promise, although she could not provide any details or analysis when she announced the decision Tuesday. ",
"On the same day she also revealed a planned 3 per cent welfare increase for September would be cut in half.",
"\n\n“The decision (was) in the campaign and you find the realities when you’re in government,” MacLeod said before she walked away from reporters’ questions for the second day in a row.",
"\n\nDuring the campaign, a spokeswoman for PC Leader Doug Ford said “nope” when asked if the basic income pilot would be scrapped, and added “we look forward to seeing the results.”",
"\n\nGreen Leader Mike Schreiner said the decision on the pilot program — leaving participants with an uncertain future — appears to be based on ideology given the lack of a detailed explanation from MacLeod.",
"\n\n“It’s cruel to rip that away from people with one month’s notice and clearly having no evidence, analysis or facts to back up the decision they made,” added Schreiner, the MPP for Guelph.",
"\n\nHe said the basic income pilot had the potential to be a “small government, non-bureaucratic solution to eliminate poverty,” providing eligible recipients with money while saving on costly staff time for welfare case workers — who MacLeod lamented spend the vast majority of their time on paperwork.",
"\n\nThe minister’s words about improving incentives to get people off welfare ring hollow because the Conservatives are suspending rules allowing social assistance recipients to keep $400 monthly, up from $200, earned through part-time jobs, said interim Liberal Leader John Fraser.",
"\n\n“It’s all doublespeak. ",
"She’s trying to say one thing and doing absolutely the other,” he added, pleading with the new government to continue the basic income pilot project that thousands of people “took a chance” on.",
"\n\nLoading... Loading... Loading... Loading... Loading... Loading...\n\n“The government owes them the respect to continue the program, and more importantly to continue the program to get the information that Ontarians need to find a way to help lift people out of poverty, to create incentives.”",
"\n\nMacLeod said people on the pilot program will be treated “ethically and humanely.”",
"\n\n“If they are eligible for Ontario Works, for example, we’ll repatriate them on to that program” or help with the Ontario Student Assistance Program, she added.",
"\n\nRead more about:"
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.013574660633484163,
0.015306122448979591,
0,
0,
0.011494252873563218,
0.013452914798206279,
0,
0,
0.02,
0,
0,
0.006097560975609756,
0,
0.00546448087431694,
0.00558659217877095,
0.00975609756097561,
0.015873015873015872,
0.0033222591362126247,
0.0035714285714285713,
0,
0,
0.003424657534246575,
0.011904761904761904,
0.012422360248447204,
0
] | 0.00605
| 5
|
[
"from os.path import exists, join, basename, dirname, splitext\nfrom os import makedirs, remove, rename\nfrom six.moves import urllib\nimport tarfile\nimport zipfile\nimport requests\nimport sys \nimport click\n\ndef download_and_uncompress(url, dest=None, chunk_size=1024, replace=\"ask\",\n label=\"Downloading {dest_basename} ({size:.2f}MB)\"):\n dest = dest or \"./\"+url.split(\"/\")[-1]\n dest_dir = dirname(dest)\n if not exists(dest_dir):\n makedirs(dest_dir) \n if exists(dest):\n if (replace is False\n or replace == \"ask\"\n and not click.confirm(\"Replace {}?\"",
".format(dest))):\n return\n # download file\n with open(dest, \"wb\") as f:\n response = requests.get(url, stream=True)\n total_length = response.headers.get('content-length')\n\n if total_length is None: # no content length header\n f.write(response.content)\n else:\n dl = 0\n total_length = int(total_length)\n for data in response.iter_content(chunk_size=4096):\n dl += len(data)\n f.write(data)\n done = int(50 * dl / total_length)\n sys.stdout.write(\"\\r[%s%s]\" % ('=' * done, ' ' * (50-done)) ) \n sys.stdout.write(\"{:.1%}\".format(dl / total_length))\n sys.stdout.flush()\n sys.stdout.write(\"\\n\")\n # uncompress\n if dest.endswith(\"zip\"):\n file = zipfile.",
"ZipFile(dest, 'r')\n elif dest.endswith(\"tar\"):\n file = tarfile.open(dest, 'r')\n elif dest.endswith(\"tar.gz\"):\n file = tarfile.open(dest, 'r:gz')\n else:\n return dest\n\n print(\"Extracting data...\")\n file.extractall(dest_dir)\n file.close()\n \n return dest\n\ndef download_PF_willow(dest=\"datasets/proposal-flow-willow\"):\n print(\"Fetching PF Willow dataset \") \n url = \"http://www.di.ens.fr/willow/research/proposalflow/dataset/PF-dataset.zip\"\n file_path = join(dest, basename(url))\n download_and_uncompress(url,file_path)\n \n print('Downloading image pair list \\n') ;\n url = \"http://www.di.ens.fr/willow/research/cnngeometric/other_resources/test_pairs_pf.csv\"\n file_path = join(dest,basename(url))\n download_and_uncompress(url,file_path)\n\ndef download_PF_pascal(dest=\"datasets/proposal-flow-pascal\"):\n print(\"Fetching PF Pascal dataset \") \n url = \"http://www.di.ens.fr/willow/research/proposalflow/dataset/PF-dataset-PASCAL.zip\"\n file_path = join(dest, basename(url))\n download_and_uncompress(url,file_path)\n \n print('Downloading image pair list \\n') ;\n url = \"http://www.di.ens.fr/willow/research/cnngeometric/other_resources/test_pairs_pf_pascal.csv\"\n file_path = join(dest,basename(url))\n download_and_uncompress(url,file_path)\n url = \"http://www.di.ens.fr/willow/research/cnngeometric/other_resources/val_pairs_pf_pascal.csv\"\n file_path = join(dest,basename(url))\n download_and_uncompress(url,file_path)\n\ndef download_pascal(dest=\"datasets/pascal-voc11\"):\n print(\"Fetching Pascal VOC2011 dataset\")\n url = \"http://host.robots.ox.ac.uk/pascal/VOC/voc2011/VOCtrainval_25-May-2011.tar\"\n file_path = join(dest, basename(url))\n download_and_uncompress(url, file_path)\n \ndef download_pascal_parts(dest=\"datasets/pascal-parts\"):\n print(\"Fetching Pascal Parts dataset\")\n url = \"http://www.di.ens.fr/willow/research/cnngeometric/other_resources/pascal_data.tar\"\n file_path = join(dest, basename(url))\n download_and_uncompress(url, file_path)\n \ndef download_caltech(dest=\"datasets/caltech-101\"):\n print(\"Fetching Caltech-101 dataset\")\n url = \"http://www.vision.caltech.edu/Image_Datasets/Caltech101/101_ObjectCategories.tar.gz\"\n file_path = join(dest, basename(url))\n download_and_uncompress(url,file_path)\n\n print(\"Fetching Caltech-101 annotations\")\n url=\"http://www.vision.caltech.edu/Image_Datasets/Caltech101/Annotations.tar\" \n file_path = join(dest, basename(url))\n download_and_uncompress(url,file_path)\n \n print('Renaming some annotation directories\\n') ;\n rename(join(dest,'Annotations','Airplanes_Side_2'),join(dest,'Annotations','airplanes'))\n rename(join(dest,'Annotations','Faces_2'),join(dest,'Annotations','Faces'))\n rename(join(dest,'Annotations','Faces_3'),join(dest,'Annotations','Faces_easy'))\n rename(join(dest,'Annotations','Motorbikes_16'),join(dest,'Annotations','Motorbikes'))\n print('Done renaming\\n') ;\n\n print('Downloading image pair list \\n') ;\n url='http://www.di.ens.fr/willow/research/weakalign/other_resources/test_pairs_caltech_with_category.csv'\n file_path = join(dest, basename(url))\n download_and_uncompress(url,file_path)\n \ndef download_TSS(dest=\"datasets/tss\"):\n print(\"Fetching TSS dataset \") \n url = \"http://www.hci.iis.u-tokyo.ac.jp/datasets/data/JointCorrCoseg/TSS_CVPR2016.zip\"\n file_path = join(dest, basename(url))\n download_and_uncompress(url,file_path)\n \n print('Downloading image pair list \\n') ;\n url = \"http://www.di.ens.fr/willow/research/cnngeometric/other_resources/test_pairs_tss.csv\"\n file_path = join(dest,basename(url))\n download_and_uncompress(url,file_path)\n\n"
] |
{
"pile_set_name": "Github"
}
|
[
0.0031746031746031746,
0.002242152466367713,
0.005356186395286556
] | 0.003591
| 5
|
[
"\nChisel – free public and private Fossil repository hosting - networked\nhttp://chiselapp.com/\n======\nrkeene2\nI currently operate this service, let me know if there's any questions about\nit!",
"\n\n"
] |
{
"pile_set_name": "HackerNews"
}
|
[
0.010582010582010581,
0
] | 0.005291
| 5
|
[
"Each time a eukaryotic cell divides it must duplicate, not only its genomic DNA, but the underlying chromatin structure, as well. ",
"The faithful propagation of chromatin structure is necessary for the packaging and protection of the eukaryotic genome as well as for the maintenance of epigenetically inherited transcriptional programs. ",
"The primary goal of our research program is to decipher the mechanisms by which the primary protein components of chromatin (the core histones H2A, H2B H3 and H3 and the linker histone H1) are brought together with genomic DNA to form chromatin. ",
"The specific focus of this proposal is the characterization of a class of enzymes known as type B histone acetyltransferases. ",
"These enzymes are responsible for the post-translational acetylation of newly synthesized histones. ",
"While it has been known for decades that newly synthesized histones are acetylated during the process of chromatin assembly, the function of these modifications is not known. ",
"We have proposed a number of studies that will help to identify the role of the type B histone acetyltransferase Hat1p in chromatin assembly. ",
"The first specific aim utilizes S. cerevisiae as a model system to study Hat1p and the acetylation of newly synthesized histones. ",
"We will use experimental systems that will allow us to directly assay for the effect of Hat1p on chromatin assembly in several different contexts. ",
"In addition, will use a variety of yeast molecular genetic techniques to decipher the unique and overlapping functions of the multiple sites of acetylation that have been identified on newly synthesized histones. ",
"Finally, we will continue the isolation and characterization of a novel chromatin assembly factor that we have identified in yeast extracts. ",
"The second specific aim extends our studies of the yeast enzyme, to the characterization of mammalian Hat1. ",
"We will use biochemical techniques to isolate and characterize complexes containing the human Hat1 enzyme. ",
"In addition, we will characterize a Hat1 mouse knockout model in order to identify the function of this type B histone acetyltransferase in a complex organism. ",
"PUBLIC HEALTH RELEVANCE: Eukaryotic cells contain an enormous linear length of DNA that must be highly condensed to be packaged inside cells. ",
"This packaging results from the formation of a structure known as chromatin that plays an important role in regulating most processes that occur in the nucleus. ",
"The importance of chromatin structure is evidenced by the numerous examples of defects in chromatin structure that cause serious human diseases. ",
"This proposal seeks to understand the mechanisms by which chromatin is assembled and regulated which will aid in our understanding and treatment of these diseases."
] |
{
"pile_set_name": "NIH ExPorter"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0
| 5
|
[
"T cell expansions in lymph nodes and peripheral blood in HIV-1-infected individuals: effect of antiretroviral therapy.",
"\nTo evaluate dynamics in CD8 T cell expansions during highly active antiretroviral therapy (HAART). ",
"Various T cell subsets were isolated from blood and lymph nodes and analysed for T cell receptor (TCR) diversity. ",
"TCR complementarity determining region 3 (CDR3) spectratyping and single-strand conformation polymorphism (SSCP) analyses were performed in combination with sequencing to assess clonality of the subsets. ",
"Strongly skewed CDR3 patterns in total CD8 cells and the CD8 subsets CD45RO+CD27+ and CD45RO-CD27+ showed substantial dynamics in dominant CDR3 sizes, resulting in relative improvement of CDR3 size diversity in the first months of therapy. ",
"During sustained treatment, TCR diversity changed only moderately. ",
"SSCP profiles confirmed oligoclonality of TCR CDR3 perturbations. ",
"Various dominant CDR3 sizes for CD4 and CD8 T cells present in lymph nodes, but not in peripheral blood mononuclear cells, before the start of therapy emerged in peripheral blood early during therapy. ",
"HAART induces substantial changes in CD8 TCR diversity, eventually resulting in improvement of the repertoire. ",
"Clonal expansions observed in lymph nodes before therapy were observed in peripheral blood after therapy, suggesting that recirculation of CD4 and CD8 T cells from lymph nodes contributes to the early T cell repopulation. ",
"Decreased immune activation and possibly naive T cell regeneration subsequently decreased clonal expansions and perturbations in the CD8 TCR repertoire."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0,
0.01,
0.008771929824561403,
0.00980392156862745,
0.0125,
0.014925373134328358,
0.015151515151515152,
0.009950248756218905,
0.009009009009009009,
0.0045045045045045045,
0.006578947368421052
] | 0.0092
| 5
|
[
"Elizabeth Warren has suggested Donald Trump ordered the drone assassination of Iranian general Qassem Suleimani to distract the American public from his own impeachment, taking the country “to the edge of war” for his own political purposes.",
"\n\nMaking of a martyr: how Qassem Suleimani was hunted down Read more\n\n“We know Donald Trump is very upset about this upcoming impeachment trial,” the Massachusetts senator and candidate for the Democratic presidential nomination told NBC’s Meet the Press. “",
"But look what he’s doing now. ",
"He is taking us to the edge of war.”",
"\n\nObservers were quick to say Warren was accusing Trump of “wag the dog” tactics, meaning an attempt to distract public attention by launching a military strike.",
"\n\nA 1997 film satire starring Robert De Niro and Dustin Hoffman used the phrase as its title and similar charges were levelled against Bill Clinton in 1998, when he ordered strikes in Afghanistan and Sudan while embroiled in the scandal which led to his own impeachment.",
"\n\nTrump ordered the strike against Suleimani, which happened in Baghdad on Friday. ",
"It followed a rocket strike in Iraq that killed an American contractor and wounded US troops, US airstrikes in response and a siege of the US embassy in Baghdad by Iranian-backed militias.",
"\n\nTimeline The buildup to Qassem Suleimani's death Show Hide A rocket attack on an Iraqi military base near Kirkuk kills an American contractor and injures US and Iraqi soldiers. ",
"The US blames Shia militia group, Kata’ib Hizbullah (KH) The US conducts retaliatory airstrikes against five KH bases in Iraq and Syria, saying there had been 11 attacks against Iraqi bases hosting coalition forces in Iraq over the past two months Protesters storm the US embassy in Baghdad, trapping diplomats inside while chanting “Death to America” and slogans in support of pro-Iranian militias. ",
"At one point they breached the main gate and smashed their way into several reception rooms. ",
"The rampage was carried out with the apparent connivance of local Iraqi security forces who allowed protesters inside the highly protected Green Zone In a drone strike ordered by US president Donald Trump, the US kills Iranian general Qassem Suleimani while he was being transported from Baghdad airport\n\nOn Sunday Iran called Trump a “terrorist in a suit” and told US media outlets retaliation would hit US military targets.",
"\n\nWarren told CNN’s State of the Union it was “reasonable” to ask if the strike was meant to be a distraction, “particularly when the administration, immediately after having taken this decision, offers a bunch of contradictory explanations for what’s going on.",
"\n\n“There was a reason that he chose this moment, not a month ago, not a month from now, not a less aggressive, less dangerous response.”",
"\n\nEchoing the terms of the articles of impeachment, Warren accused him of using foreign policy or “whatever he can to advance the interests of Donald Trump”.",
"\n\nSenate minority leader Chuck Schumer told ABC’s This Week the evidence for an “imminent” Iranian attack provided by the administration after the Suleimani strike was “very unsatisfying”.",
"\n\n“We don’t know the reasons that it had to be done now,” he said. “",
"They don’t seem very clear. ",
"The documents they sent us last night” – notification of the strike as required by the War Powers Act of 1973 – “is very unsatisfying as to that, even though I can’t talk about it because the whole thing is classified.”",
"\n\nFacebook Twitter Pinterest Nancy Pelosi holds a press conference after the House passed articles of impeachment against Donald Trump. ",
"Photograph: Saul Loeb/AFP via Getty Images\n\nIn Washington, House speaker Nancy Pelosi is withholding articles of impeachment from the Senate, in the hope of forcing concessions over the rules of Trump’s trial. ",
"Republican Senate leader Mitch McConnell has said Trump will not be convicted and removed and said he is co-ordinating closely with the White House.",
"\n\nModerate Republicans who Democrats hope will pressure McConnell to call witnesses potentially damaging to the president show little sign of shifting but Pelosi has placed Trump in constitutional limbo, the third president to be impeached but not yet the third to be acquitted.",
"\n\nThe articles of impeachment concern abuse of power, in the withholding of military aid from Ukraine amid pressure for investigations of Trump’s political foes, and obstruction of Congress.",
"\n\nWarren told NBC: “The administration can’t keep its story straight and in the case of Ukraine, it was all about protecting Donald Trump’s skin. ",
"We know that Donald Trump was very upset about this upcoming impeachment trial, but look what he’s doing now. ",
"He is taking us to the edge of war.",
"\n\n“We’ve been at war for 20 years in the Middle East and now, he’s talking about expanding that war. ",
"This has been something that has cost thousands of American lives. ",
"It has cost us enormously in many ways both at home and around the world and at the same time, look what it’s done to the Middle East – millions of people who’ve been killed, who’ve been injured, who’ve been displaced.",
"\n\n“The job of the president is to keep us safer. ",
"The job of the president is not to move us to the edge of war.”",
"\n\nSenior Democrats backed Pelosi, whose tactics could push Trump’s trial into February, when the presidential primary will be in full swing.",
"\n\nTrump vows to hit 52 sites 'very hard' if Iran retaliates over Suleimani killing Read more\n\nThe speaker, Schumer said, “has said that she will send the articles of impeachment when she believes she can – she will maximize sending them to get the fairest trial possible. ",
"If she had sent them right away, McConnell could have well just voted for dismissal the day before or after Christmas.",
"\n\n“Now, in the last two weeks, where we haven’t had the articles, lots of new evidence that bolsters our case for witnesses – for witnesses and documents – has come out. ",
"So the bottom line is very simple. ",
"We need the truth, not a coverup, not a sham, not to have some nationally televised mock trial where there’s no evidence.”",
"\n\nAsked how long Democrats might be willing to hold the line, House intelligence chair Adam Schiff told CNN: “I don’t think it’s going to be indefinite, no … The desire is to get a commitment from the Senate that they’re going to have a fair trial, fair to the president, yes, but fair to the American people.”",
"\n\nSchiff said holding back the articles had the effect of “flushing out senators”.",
"\n\n“Withholding the articles has thus far flushed out where Mitch McConnell is coming from,” he said. “",
"It’s required senators to go on record..”\n\nThe South Carolina senator Lindsey Graham, a key Trump ally, poured cold water on Democratic hopes. ",
"Speaking on Fox News’ Sunday Morning Futures with Maria Bartiromo, Graham called Pelosi’s move as a “political stunt” and threatened to “change the rules of the Senate so that we can start the trial without her if necessary”.",
"\n\n“If we don’t get the articles this week,” he said, “then we need to take matters into our own hands”."
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.012448132780082987,
0.01556420233463035,
0,
0,
0,
0.011111111111111112,
0.012048192771084338,
0,
0.00558659217877095,
0.0075,
0,
0.007058823529411765,
0.007662835249042145,
0,
0.012738853503184714,
0.015957446808510637,
0,
0,
0,
0.022058823529411766,
0.023809523809523808,
0.02702702702702703,
0.007194244604316547,
0.010526315789473684,
0.0136986301369863,
0.00909090909090909,
0,
0,
0,
0,
0,
0,
0.007142857142857143,
0.003676470588235294,
0.00847457627118644,
0,
0,
0,
0.012903225806451613,
0.012195121951219513,
0.00980392156862745,
0.006993006993006993,
0.017777777777777778,
0
] | 0.006819
| 5
|
[
"\n640 F.Supp.2d 1262 (2009)\nConstance RUYLE, Plaintiff,\nv.\nSAFECO INSURANCE COMPANY OF AMERICA, and Does I-V, unknown Parties, Defendants.",
"\nCase No. ",
"CV 09-0069-CWD.",
"\nUnited States District Court, D. Idaho.",
"\nJune 29, 2009.",
"\n*1264 Scott L. Lundgreen, Johnson and Lundgreen, Boise, ID, for Plaintiff.",
"\nMark D. Sebastian, Robert A. Anderson, Anderson Julian and Hull LLP, Boise, ID, for Defendants.",
"\n\nMEMORANDUM DECISION AND ORDER\nCANDY W. DALE, United States Chief Magistrate Judge.",
"\nThe Court has before it Plaintiffs Motion to Remand. (",
"Docket No. ",
"5.) ",
"Having reviewed the parties' briefing, as well as the record in this action, the Court has determined that oral argument on the motion is not necessary. ",
"Dist. ",
"Idaho Loc. ",
"Civ. ",
"R. 7.1(d)(2). ",
"The Court finds, as more fully explained below, that Plaintiffs Motion to Remand will be denied.",
"\n\nI.\n\nBackground\nConstance Ruyle (\"Plaintiff\") filed suit on November 25, 2008, in the Fourth Judicial District for the State of Idaho, in and for the County of Ada, against Safeco Insurance Company of America (\"Defendant\") for general and special damages arising out of alleged breach of insurance contract and breach of the duty of good faith and fair dealing. (",
"Compl., ",
"Docket No. ",
"1-2.) ",
"The Complaint alleges that Defendant failed to pay the amount due under an uninsured motorist's policy to Plaintiff within thirty days after proof of loss was furnished by Plaintiff to Defendant, in relation to an automobile accident that occurred in 2005. ",
"Id.\nDefendant removed this case to the Court on February 20, 2009. (",
"Notice of Removal, Docket No. ",
"1.) ",
"In its Notice of Removal, Defendant states that Plaintiff is a citizen of the State of Idaho and Defendant is a foreign corporation with its state of incorporation and principle place of business located outside of Idaho. (",
"Notice of Removal p. 2, Docket No. ",
"1.) ",
"Defendant alleges the amount in controversy exceeds $75,000, and more specifically, as supported by an Affidavit of Counsel filed with the Notice of Removal, indicates that Plaintiff demanded $118,000 to settle the lawsuit shortly after her complaint was filed. (",
"Sebastian Aff. ¶ ",
"2., ",
"Docket No. ",
"2.)",
"\nPlaintiff asks the Court to remand the case to state court, contending the amount in controversy does not exceed the $75,000 *1265 required for diversity of citizenship jurisdiction under 28 U.S.C. § 1332(a)(2). (",
"Memo. ",
"in Support p. 3, Docket No. ",
"9.) ",
"In support of her motion, Plaintiffs attorney submitted an affidavit indicating that Plaintiff offered to accept $55,000 in settlement of her claims in this lawsuit on February 24, 2009, after Defendant filed its Notice of Removal. (",
"Lundgreen Aff. ¶ ",
"6., ",
"Docket No. ",
"10.) ",
"Plaintiff does not contest the existence of diversity of citizenship between the parties nor claim Defendant's notice of remand was untimely. ",
"Therefore, the issue presented to the Court is whether the amount in controversy exceeds the requisite sum for federal jurisdiction.",
"\n\nII.",
"\n\nDiscussion\n\nA. Standards for Determining Amount In Controversy\n28 U.S.C. § 1332(a)(2) provides the basis for federal jurisdiction of \"all civil actions where the matter in controversy exceeds the sum or value of $75,000, exclusive of interests and costs, and is between citizens of a state and citizens or subjects of a foreign state.\" ",
"The sum or amount in controversy is determined by the value of the object plaintiff is seeking, which may include punitive damages and attorney's fees. ",
"Kroske v. U.S. Bank Corp., 432 F.3d 976, 980 (9th Cir.2005); Ridder Bros., Inc. v. Blethen, 142 F.2d 395, 399 (9th Cir. ",
"1944). ",
"The removal statute, 28 U.S.C. § 1441, is strictly construed against removal jurisdiction; if there is any doubt to the right of removal in the first instance, federal jurisdiction must be rejected. ",
"Prize Frize, Inc. v. Matrix, Inc., 167 F.3d 1261, 1265 (9th Cir.1999), rev'd in part by Abrego Abrego v. The Dow Chem. ",
"Co., 443 F.3d 676 (9th Cir.2006); Gaus v. Miles, Inc., 980 F.2d 564, 566 (9th Cir.1992).",
"\nWhen suit is instituted in state court and removed to federal court, a strong presumption exists that the plaintiff has not claimed a large enough amount to confer jurisdiction on a federal court. ",
"St. Paul Mercury Indem. ",
"Co. v. Red Cab Co., 303 U.S. 283, 290, 58 S.Ct. ",
"586, 82 L.Ed. ",
"845 (1938). ",
"As a result of the strong presumption against removal jurisdiction, the party seeking removal must carry the burden of establishing that removal is proper. ",
"Prize Frize, 167 F.3d at 1265; Gaus, 980 F.2d at 566. ",
"The removing defendant cannot base removal on conclusory allegations. ",
"Singer v. State Farm Mut. ",
"Auto. ",
"Ins. ",
"Co., 116 F.3d 373, 377 (9th Cir.1997).",
"\nWhen it is not facially apparent from the complaint that the damage claims exceed the amount in controversy, the defendant must prove by a preponderance of evidence that plaintiffs claim exceeds the amount in controversy. ",
"Sanchez v. Monumental Life Ins. ",
"Co., 102 F.3d 398, 404 (9th Cir.1996). ",
"To do this, the removing party may present underlying facts, in the removal notice or by affidavit, that support the requisite amount. ",
"Allen v. R & H Oil & Gas Co., 63 F.3d 1326, 1335 (5th Cir. ",
"1995). ",
"The Ninth Circuit endorses the Fifth Circuit's approach to the preponderance of evidence standard for establishing the amount in controversy. ",
"See also Kroske, 432 F.3d at 980; Valdez v. Allstate Ins. ",
"Co., 372 F.3d 1115, 1117 (9th Cir. ",
"2004).",
"\nPlaintiff argues the amount in controversy is not facially apparent from the Complaint (Memo. ",
"in Support, Docket No. ",
"9.)[1] However, Defendant provided, with its Notice of Removal, a settlement letter from Plaintiff's attorney, sent one *1266 week after the complaint was filed in state court, indicating Plaintiff was willing to accept $118,000 to resolve her claims before proceeding with the lawsuit. ",
"Sebastian Aff., ",
"Ex. ",
"1, Docket No. ",
"2. ",
"A settlement letter is relevant evidence of the amount in controversy if it appears to reflect a reasonable estimate of the plaintiffs claim. ",
"Cohn v. Petsmart, Inc., 281 F.3d 837, 840 (9th Cir.2002). ",
"Since the amount in controversy was not apparent from the Complaint, there is no reason to doubt the amount stated in the December 2, 2008 settlement letter as a reasonable estimate of Plaintiffs claims.",
"\n\nB. Amount in Controversy at the Time of Removal\nPlaintiff also argues that the February 24, 2009 letter sent by her attorney to Defendant illustrates Plaintiffs willingness to settle the case for $55,000, and this amount supports her motion to remand. ",
"Mem. ",
"in Support at 3, Docket No. ",
"9; Sebastian Aff., ",
"Attach 1, Docket No. ",
"13. ",
"However, it is well settled law that the amount in controversy is determined from the pleadings as they exist at the time a petition for removal is filed. ",
"Eagle v. Am. ",
"Tel. & ",
"Tel., ",
"769 F.2d 541, 545 (9th Cir. ",
"1985). ",
"Events occurring subsequent to removal which reduce the amount in controversy, whether beyond the plaintiffs control or the result of her volition, do not oust the federal district court's jurisdiction once it has attached. ",
"St. Paul Mercury Indem. ",
"Co. 303 U.S. at 293, 58 S.Ct. ",
"586.",
"\nPlaintiff contends that Defendant should have understood that the $118,000 offer of settlement in the December 2, 2008 letter would have been offset by the $63,000 already paid by Defendant to Plaintiff. (",
"Mem. ",
"in Support p. 3, Docket No. ",
"9; Lundgreen Aff. ¶ ",
"5, Docket No. ",
"10.) ",
"However, neither the Complaint nor the December 2, 2008 letter state anything regarding such an offset. ",
"Instead, the Complaint alleges a variety of damages[2] and, of note, includes statutory claims for attorneys fees under I.C. § 41-1839 and I.C. § 12-120(3). (",
"Compl. ¶ ",
"21, Docket No. ",
"1-2.) ",
"Nothing within the Complaint or the December 2, 2008 letter would or should have alerted Defendant that the $118,000 offer was not a reasonable estimate of the value of Plaintiffs claims, thereby supporting removal to federal court at the time Defendant's notice of removal was filed.[3]\nBased on the record before the Court, the preponderance of evidence establishes that Plaintiffs damage claims exceed the amount in controversy, or $75,000, required for federal jurisdiction based on diversity of citizenship. ",
"Plaintiffs subsequent attempt to reduce her damage claims for purposes of settlement or remand do not divest jurisdiction from the Court that attached at the time Defendant removed the action to the Court.",
"\n\nORDER\nBased on the foregoing, the Court being otherwise fully advised in the premises, IT IS HEREBY ORDERED that:\nPlaintiff's Motion to Remand (Docket No. ",
"5) is DENIED.",
"\nNOTES\n[1] Plaintiff alleges damages \"all in an amount to be proven, but in all cases in excess of the minimum jurisdictional limits [$10,000] of this Court.\" (",
"Compl. ¶ ",
"7, Docket No. ",
"1-2.)",
"\n[2] Damages include \"general and special damages for personal injuries, physical pain and suffering, medial expenses, future medical expenses, loss of earnings in the future, mental anguish and grief, loss of the joy of life, and loss of consortium, together with other general damages.\" (",
"Compl. ¶ ",
"7, Docket No. ",
"1-2.)",
"\n[3] Further, Plaintiff's attorney rejected an offer from Defendant to claim damages less than $75,000 because he did not want to limit Plaintiff's damages. (",
"Sebastian Aff. ¶ ",
"3, Docket No. ",
"13.)",
"\n"
] |
{
"pile_set_name": "FreeLaw"
}
|
[
0.021897810218978103,
0,
0,
0.025,
0,
0.04,
0.041666666666666664,
0.011904761904761904,
0.03636363636363636,
0,
0,
0.006535947712418301,
0,
0.09090909090909091,
0,
0.07142857142857142,
0.020833333333333332,
0.008241758241758242,
0,
0,
0,
0.0038910505836575876,
0.014705882352941176,
0.03333333333333333,
0,
0.008968609865470852,
0.02857142857142857,
0,
0.0076045627376425855,
0.058823529411764705,
0,
0,
0,
0.004672897196261682,
0,
0.03571428571428571,
0,
0.008583690987124463,
0,
0,
0,
0,
0,
0.007575757575757576,
0,
0.0029585798816568047,
0,
0.025,
0,
0,
0.025210084033613446,
0.011363636363636364,
0,
0.041666666666666664,
0.020833333333333332,
0,
0,
0,
0.037037037037037035,
0,
0.038461538461538464,
0,
0,
0,
0,
0.03125,
0,
0,
0.01694915254237288,
0,
0.014084507042253521,
0,
0,
0,
0,
0,
0.010452961672473868,
0.0625,
0,
0.07142857142857142,
0,
0,
0.017241379310344827,
0.0049261083743842365,
0,
0,
0.03571428571428571,
0.05263157894736842,
0.047619047619047616,
0,
0,
0,
0.14285714285714285,
0,
0,
0,
0,
0.041666666666666664,
0,
0,
0,
0,
0.03571428571428571,
0.05,
0.07142857142857142,
0,
0.009615384615384616,
0.006329113924050633,
0,
0.06666666666666667,
0,
0.005847953216374269,
0.00975609756097561,
0.006369426751592357,
0,
0.006211180124223602,
0,
0.07142857142857142,
0,
0,
0,
0.07142857142857142,
0,
0.012578616352201259,
0.058823529411764705,
0.07142857142857142,
0,
0
] | 0.014787
| 5
|
[
"Denefield School\n\nDenefield School is a secondary school located in Tilehurst, Reading, Berkshire, England. ",
"The school offers education for mixed students from aged 11 to 18.",
"\n\nHistory \nThe school was founded in 1976 and was originally called Long Lane Comprehensive School after its location. ",
"This name was later changed to avoid confusion with a primary school of the same name on the same road.",
"\n\nWhen founded, the school had an enrolment of 180 students in Year 7 which was greatly increased the following year when all the students from Cintra Secondary Modern School joined after that school closed.",
"\n\nThe Sixth form took its first students in 1981. ",
"Over the years Denefield has continued to grow and by 1992 when it became a grant-maintained school it had over 1,000 students on roll. ",
"It was awarded a specialism as a Technology College in 1994.",
"\n\nIn 1999, Denefield became a foundation school and in January 2012, Denefield became an academy school.",
"\n\nOfsted judgements\n\nThe school was judged Good with outstanding features in 2005;Satisfactory in 2010. ",
"In 2012 it was judged Inadequate. ",
"In 2014 it was inspected again and judged Good. ",
"It was judged as Good following a short inspection in January 2018.",
"\n\nBuilding\nThe original school building was erected in 1976 as temporary accommodation, however, the old building still stands and much of the school has been rebuilt and refurbished. ",
"The school has facilities for Science, Technology, Art and Music and has large grounds which are used for sporting activities.",
"\nThe school was graded 'good' in its last Ofsted inspection in January 2018.",
"\n\nHeadteachers\n\nReferences\n\nExternal links\nDenefield School Website\n\nCategory:Secondary schools in West Berkshire District\nCategory:Tilehurst\nCategory:Educational institutions established in 1976\nCategory:1976 establishments in England\nCategory:Academies in West Berkshire District"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.009259259259259259,
0,
0.008403361344537815,
0,
0.004830917874396135,
0,
0.007352941176470588,
0,
0.019230769230769232,
0,
0,
0,
0,
0,
0.007874015748031496,
0,
0
] | 0.00335
| 5
|
[
"In honor of the apocalypse that didn’t happen yesterday (it’s already Saturday morning in my timezone), I though I’d answer a question that’s near and dear to the hearts of many people of my generation: what would you do in a zombie apocalypse? [",
"Read more...]"
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0,
0
] | 0
| 5
|
[
"hello my name is Lydia, are a cosplayer from a few years ....\nwhat I love most is to create original costumes inspired to Demons, Fallen Angels etc ...\nI hope you like!^_^\nthis is my facebook page follow me here...\nhttps://www.facebook.com/pages/Lydia-creations-Cosplay/608812012552635\n\nHello and welcome to my WC's page ♥\nMy name's Laura and I'm an italian cosplayer.",
"\nHope you'll like my shoots; surely I'm not the best around, but at least I try my best ~\n【FACEBOOK】 https://www.facebook.com/profile.php?id=1118093755\n\nHello!",
"\nI'm Zeressa Scream! ",
"I cosplay since 2011\nI do not consider myself a great cosplayer, but I get along\n^ ^\nFacebook Account: https://www.facebook.com/zeressa.scream\nFacebook FanPage: https://www.facebook.com/pages/Zero-Scream-Cosplay/302302056583485\nDeviant Art: http://zeressascream.deviantart.com/\n\nHello everyone! ",
"My name is Aoi and I'm an Italian cosplayer.",
"\nI like to cosplay, draw and making weapons! ",
"˛˛ꉂ ◞•̀д•́)◞⚔◟(•̀д•́◟ )\n●Facebook: https://www.facebook.com/pages/Aoi-Cosplays-Props/579464382075043?ref=hl\n●DeviantART: http://aoiinji.deviantart.com/\n\nHi! ",
"Luthien-chan is here!◕‿◕\nI'm an Italian cosplayer and you are welcome!",
"♥\nI hope you like my cosplay!",
"\nIf you love my cosplay photos and give me a Thumb, I would be appreciated.",
"❤\nxxx\n☺ ☻\nFacebook: https://www.facebook.com/pages/Luthien/1547114078895700?fref=ts"
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.01358695652173913,
0.006289308176100629,
0.047619047619047616,
0.010169491525423728,
0.022727272727272728,
0,
0.012738853503184714,
0.014285714285714285,
0,
0.013333333333333334,
0.012048192771084338
] | 0.013891
| 5
|
[
"1. ",
"Technical Field\nThe present invention pertains to an electronically commutated, collectorless direct-current motor.",
"\n2. ",
"Background Art\nSuch a direct-current motor is known from DE-OS 34 38 747. ",
"The stator winding of the known electronically commutated, collectorless direct-current motor comprises an insulating body which consists of a disk-shaped ring and a plurality of axially extending slotted portions annularly arranged thereon. ",
"The slotted portions are supported by a tubular section. ",
"The individual phase windings of the stator winding are located outside the slotted portions, the ends of the windings being connected to a circuit board. ",
"The ends are commonly soldered directly to the circuit board.",
"\nThe disadvantage of the known direct-current motor is that during production, the ends of the winding must be soldered to the circuit board by hand."
] |
{
"pile_set_name": "USPTO Backgrounds"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0
| 5
|
[
"Subscribe today!",
"\n\nSize Guide\n\nWHAT COLLAR SIZE SHOULD I ORDER FOR MY DOG?",
"\n\nAs we carry many brands, the product sizes vary between designers. ",
"The sizes for each dog collar is located in the product description.",
"\n\nMeasure for a new dog collar with a piece of non-elastic string. ",
"Place the string around the dog's neck. ",
"Hold the two ends of the string together. ",
"Place two fingers of one hand under the string, so it's not tight on the dog's neck. ",
"Use scissors to trim the string. ",
"Measure the string and compare it with the collar measurements.",
"\n\nHere are some “rules of thumb” when sizing a collar for your dog:\n\nTwo fingers must be able to fit under the collar\n\nWhen sizing for a dog collar, ensure it is not on the last hole\n\nHOW DO I MEASURE MY DOG FOR A CLOTHING ITEM OR HARNESS?",
"\n\nAs we carry many brands, the product sizes vary between designers. ",
"The sizes for each article of clothing is located in the product description.",
"\n\nClothing Items:\n\nHave the dog stand for the measurement. ",
"Hold the end of a tape measure at the base of the dog's neck on the top of her back. ",
"Start approximately where the collar would fit. ",
"Pull the tape measure to the base of the tail. ",
"Record the measurement. ",
"This length is the measurement size for the different brands of our dog clothes.",
"\n\nDog Harness:\n\nEnsure your dog is standing and measure their chest behind the front legs."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0
| 5
|
[
"If McVitie’s had trademarked its Jaffa Cakes some time after inventing them in 1927, we might not eat as many as we do. ",
"But the generic cake is now the favourite of MPs and House of Commons staff, and quite possibly of the country as a whole, since McVitie’s alone bakes more than a billion of them a year. ",
"The Jaffa is, of course, a cake and not a biscuit, as every VAT expert knows, because a biscuit turns limp when stale, whereas a cake hardens. ",
"MPs like biscuits too, of course, but when confronted with a choice of Jaffas and digestives, they are 12 times more likely to choose the cake. ",
"Small children, and possibly some adults, like to eat the sponge and chocolate first, before sucking the shimmering orange disc. ",
"But dunking a Jaffa remains the ultimate test of hand-eye coordination: immerse it a microsecond too long and the whole thing vanishes."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.016666666666666666,
0.0053475935828877,
0.006993006993006993,
0.006944444444444444,
0,
0.007407407407407408
] | 0.007227
| 5
|
[
"Hasan Saka\n\nHasan Saka (1885, Akçaabat – 29 July 1960) was a Turkish politician, Minister of Foreign Affairs, and Prime Minister of Turkey.",
"\n\nPolitical career\n\nHe graduated from \"Mülkiye Mektebi\" (School of Civil Service) in 1908. ",
"Hasan Saka started working for government in \"Divan-ı Muhasebat\" (Council of Accounts). ",
"He was sent to France for further education by the Ottoman government in 1909. ",
"After graduating from the School of Political Science with a Diplomacy major, he returned home to continue his prior job.",
"\n\nHe was elected as a member of the Ottoman Parliament in Istanbul at its last term and kept his position until the parliament was closed. ",
"He was elected as a member of Grand National Assembly of Turkey (TBMM) from Trabzon at its first term on 28 January 1921.",
"\n\nSaka was appointed as Minister of Foreign Affairs on 13 September 1944. ",
"He quit this position on 9 September 1947 when the entire cabinet resigned.",
"\n\nHe was appointed as Prime Minister on 10 September 1947. ",
"He resigned on 9 September 1949 but continued to be a member of parliament. ",
"His political life ended in 1954 when he decided not to run for the parliament again.",
"\n\nHe died on 29 July 1960 in Istanbul, and was laid to rest at the Zincirlikuyu Cemetery.",
"\n\nReferences\nMinistry of Defence of Republic of Turkey \n\nCategory:1885 births\nCategory:People from Trabzon\nCategory:Ministers of Foreign Affairs of Turkey\nCategory:Prime Ministers of Turkey\nCategory:1960 deaths\nCategory:Burials at Zincirlikuyu Cemetery\nCategory:Ministers of National Defence of Turkey\nCategory:Republican People's Party (Turkey) politicians\nCategory:Ministers of Finance of Turkey\nCategory:Deputies of Trabzon\nCategory:Members of the 1st government of Turkey\nCategory:Members of the 2nd government of Turkey\nCategory:Members of the 4th government of Turkey\nCategory:Members of the 15th government of Turkey\nCategory:Members of the 16th government of Turkey\nCategory:Members of the 17th government of Turkey\nCategory:Mekteb-i Mülkiye alumni\nCategory:Members of the 2nd Parliament of Turkey"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.02158273381294964,
0.01098901098901099,
0.022727272727272728,
0,
0.008264462809917356,
0.007194244604316547,
0.01652892561983471,
0.013513513513513514,
0,
0,
0,
0,
0,
0.0037267080745341614
] | 0.007466
| 5
|
[
"453627277?",
"\n3\nWhat is the hundred thousands digit of 269279816?",
"\n2\nWhat is the ten millions digit of 39847490?",
"\n3\nWhat is the hundred millions digit of 1046547700?",
"\n0\nWhat is the millions digit of 1578362386?",
"\n8\nWhat is the millions digit of 113959257?",
"\n3\nWhat is the tens digit of 9022968959?",
"\n5\nWhat is the billions digit of 1512477984?",
"\n1\nWhat is the tens digit of 1448425164?",
"\n6\nWhat is the hundreds digit of 252360931?",
"\n9\nWhat is the thousands digit of 3881326500?",
"\n6\nWhat is the millions digit of 276036037?",
"\n6\nWhat is the hundreds digit of 79570122?",
"\n1\nWhat is the hundreds digit of 612356112?",
"\n1\nWhat is the tens digit of 5002073337?",
"\n3\nWhat is the thousands digit of 136691225?",
"\n1\nWhat is the hundred thousands digit of 183251654?",
"\n2\nWhat is the hundred thousands digit of 663295009?",
"\n2\nWhat is the units digit of 54871605?",
"\n5\nWhat is the units digit of 300414893?",
"\n3\nWhat is the hundreds digit of 184253460?",
"\n4\nWhat is the hundreds digit of 493097393?",
"\n3\nWhat is the tens digit of 14624629?",
"\n2\nWhat is the units digit of 85276782?",
"\n2\nWhat is the units digit of 49111163?",
"\n3\nWhat is the thousands digit of 252634626?",
"\n4\nWhat is the hundred millions digit of 1081021117?",
"\n0\nWhat is the millions digit of 168618580?",
"\n8\nWhat is the hundred millions digit of 125630059?",
"\n1\nWhat is the billions digit of 1246473589?",
"\n1\nWhat is the millions digit of 17727949?",
"\n7\nWhat is the millions digit of 2831847708?",
"\n1\nWhat is the thousands digit of 19387252?",
"\n7\nWhat is the tens digit of 19688586?",
"\n8\nWhat is the hundreds digit of 112742803?",
"\n8\nWhat is the thousands digit of 686579255?",
"\n9\nWhat is the billions digit of 3285592350?",
"\n3\nWhat is the ten thousands digit of 639009239?",
"\n0\nWhat is the millions digit of 1218885022?",
"\n8\nWhat is the tens digit of 317597663?",
"\n6\nWhat is the tens digit of 30567769?",
"\n6\nWhat is the tens digit of 117727205?",
"\n0\nWhat is the hundred thousands digit of 7562018893?",
"\n0\nWhat is the hundreds digit of 327830338?",
"\n3\nWhat is the millions digit of 6755158408?",
"\n5\nWhat is the hundreds digit of 3469113543?",
"\n5\nWhat is the hundred thousands digit of 1765135372?",
"\n1\nWhat is the ten millions digit of 394961123?",
"\n9\nWhat is the units digit of 302764930?",
"\n0\nWhat is the ten millions digit of 372232989?",
"\n7\nWhat is the tens digit of 1932699701?",
"\n0\nWhat is the ten thousands digit of 211156951?",
"\n5\nWhat is the hundred millions digit of 190499106?",
"\n1\nWhat is the tens digit of 48753108?",
"\n0\nWhat is the tens digit of 768271790?",
"\n9\nWhat is the ten thousands digit of 18767745?",
"\n6\nWhat is the hundred millions digit of 807702503?",
"\n8\nWhat is the tens digit of 68779782?",
"\n8\nWhat is the tens digit of 17719296?",
"\n9\nWhat is the ten millions digit of 307126335?",
"\n0\nWhat is the hundred millions digit of 218377937?",
"\n2\nWhat is the units digit of 22708588?",
"\n8\nWhat is the tens digit of 283951898?",
"\n9\nWhat is the ten millions digit of 53917413?",
"\n5\nWhat is the hundred thousands digit of 25701106?",
"\n7\nWhat is the hundred millions digit of 6136345934?",
"\n1\nWhat is the thousands digit of 18211147?",
"\n1\nWhat is the thousands digit of 348425927?",
"\n5\nWhat is the thousands digit of 4991194266?",
"\n4\nWhat is the ten millions digit of 55968168?",
"\n5\nWhat is the thousands digit of 39333602?",
"\n3\nWhat is the ten millions digit of 2794269537?",
"\n9\nWhat is the units digit of 228446897?",
"\n7\nWhat is the hundred thousands digit of 83145464?",
"\n1\nWhat is the ten thousands digit of 102248527?",
"\n4\nWhat is the units digit of 76611597?",
"\n7\nWhat is the hundreds digit of 690179130?",
"\n1\nWhat is the millions digit of 35794616?",
"\n5\nWhat is the hundred millions digit of 1937350152?",
"\n9\nWhat is the tens digit of 341785123?",
"\n2\nWhat is the ten thousands digit of 251311083?",
"\n1\nWhat is the units digit of 630665503?",
"\n3\nWhat is the hundreds digit of 61687570?",
"\n5\nWhat is the units digit of 120712295?",
"\n5\nWhat is the tens digit of 1297528590?",
"\n9\nWhat is the ten millions digit of 5779684526?",
"\n7\nWhat is the hundred millions digit of 2281531570?",
"\n2\nWhat is the ten thousands digit of 1413213445?",
"\n1\nWhat is the units digit of 93405608?",
"\n8\nWhat is the tens digit of 229620121?",
"\n2\nWhat is the hundred thousands digit of 275761644?",
"\n7\nWhat is the hundred thousands digit of 511253599?",
"\n2\nWhat is the hundreds digit of 329526105?",
"\n1\nWhat is the ten thousands digit of 117174936?",
"\n7\nWhat is the billions digit of 3942518762?",
"\n3\nWhat is the hundred millions digit of 843982721?",
"\n8\nWhat is the ten millions digit of 1027339327?",
"\n2\nWhat is the tens digit of 1276307234?",
"\n3\nWhat is the ten millions digit of 352710986?",
"\n5\nWhat is the ten thousands digit of 582712055?",
"\n1\nWhat is the ten thousands digit of 14791626?",
"\n9\nWhat is the hundred thousands digit of 209119636?",
"\n1\nWhat is the millions digit of 1447219081?",
"\n7\nWhat is the ten thousands digit of 2469738241?",
"\n3\nWhat is the thousands digit of 58001416?",
"\n1\nWhat is the billions digit of 5450419032?",
"\n5\nWhat is the hundred thousands digit of 58922756?",
"\n9\nWhat is the thousands digit of 211889447?",
"\n9\nWhat is the tens digit of 39463827?",
"\n2\nWhat is the ten millions digit of 3282659153?",
"\n8\nWhat is the units digit of 180664925?",
"\n5\nWhat is the hundreds digit of 94082178?",
"\n1\nWhat is the millions digit of 422997361?",
"\n2\nWhat is the hundred thousands digit of 17365433?",
"\n3\nWhat is the units digit of 68356325?",
"\n5\nWhat is the hundreds digit of 1313820591?",
"\n5\nWhat is the units digit of 738155870?",
"\n0\nWhat is the thousands digit of 411347154?",
"\n7\nWhat is the hundred thousands digit of 99131126?",
"\n1\nWhat is the hundreds digit of 42686605?",
"\n6\nWhat is the ten millions digit of 148654208?",
"\n4\nWhat is the billions digit of 1959572532?",
"\n1\nWhat is the hundreds digit of 635921335?",
"\n3\nWhat is the hundreds digit of 101935755?",
"\n7\nWhat is the hundred thousands digit of 133112513?",
"\n1\nWhat is the units digit of 723850955?",
"\n5\nWhat is the ten millions digit of 1989563815?",
"\n8\nWhat is the ten thousands digit of 52512773?",
"\n1\nWhat is the ten thousands digit of 6926698796?",
"\n9\nWhat is the units digit of 273083296?",
"\n6\nWhat is the ten thousands digit of 22137810?",
"\n3\nWhat is the thousands digit of 701062829?",
"\n2\nWhat is the millions digit of 220281106?",
"\n0\nWhat is the units digit of 2190762629?",
"\n9\nWhat is the thousands digit of 652346305?",
"\n6\nWhat is the units digit of 117605623?",
"\n3\nWhat is the ten millions digit of 2354519844?",
"\n5\nWhat is the hundred millions digit of 1858225796?",
"\n8\nWhat is the thousands digit of 302182357?",
"\n2\nWhat is the hundred thousands digit of 199529696?",
"\n5\nWhat is the hundred millions digit of 2368648841?",
"\n3\nWhat is the millions digit of 8495099?",
"\n8\nWhat is the ten millions digit of 34492059?",
"\n3\nWhat is the hundreds digit of 432740701?",
"\n7\nWhat is the hundreds digit of 10990572?",
"\n5\nWhat is the units digit of 525399239?",
"\n9\nWhat is the thousands digit of 94088619?",
"\n8\nWhat is the units digit of 242922405?",
"\n5\nWhat is the hundreds digit of 5948418747?",
"\n7\nWhat is the hundreds digit of 47972746?",
"\n7\nWhat is the hundred millions digit of 1148252296?",
"\n1\nWhat is the units digit of 5296205815?",
"\n5\nWhat is the tens digit of 12263244?",
"\n4\nWhat is the millions digit of 6823957?",
"\n6\nWhat is the hundred millions digit of 1254612027?",
"\n2\nWhat is the ten thousands digit of 35168208?",
"\n6\nWhat is the tens digit of 3351471741?",
"\n4\nWhat is the hundreds digit of 300788549?",
"\n5\nWhat is the units digit of 582996069?",
"\n9\nWhat is the hundred thousands digit of 420652870?",
"\n6\nWhat is the ten thousands digit of 1443075885?",
"\n7\nWhat is the millions digit of 48139182?",
"\n8\nWhat is the hundred thousands digit of 58112764?",
"\n1\nWhat is the ten millions digit of 170464275?",
"\n7\nWhat is the millions digit of 36592867?",
"\n6\nWhat is the ten millions digit of 146215677?",
"\n4\nWhat is the hundreds digit of 466879912?",
"\n9\nWhat is the hundred millions digit of 4416627587?",
"\n4\nWhat is the hundred thousands digit of 4401595?",
"\n4\nWhat is the millions digit of 168393687?",
"\n8\nWhat is the millions digit of 3122289?",
"\n3\nWhat is the hundreds digit of 498098558?",
"\n5\nWhat is the units digit of 4564901688?",
"\n8\nWhat is the ten millions digit of 19993425?",
"\n1\nWhat is the thousands digit of 39449252?",
"\n9\nWhat is the hundreds digit of 64111735?",
"\n7\nWhat is the hundreds digit of 53328633?",
"\n6\nWhat is the millions digit of 195293171?",
"\n5\nWhat is the tens digit of 2179796840?",
"\n4\nWhat is the thousands digit of 92514169?",
"\n4\nWhat is the hundred millions digit of 879302449?",
"\n8\nWhat is the units digit of 236627889?",
"\n9\nWhat is the hundred millions digit of 2002866765?",
"\n0\nWhat is the hundred millions digit of 189070041?",
"\n1\nWhat is t"
] |
{
"pile_set_name": "DM Mathematics"
}
|
[
0,
0,
0,
0,
0,
0,
0.025,
0,
0,
0,
0,
0,
0,
0,
0.025,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.022727272727272728,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.019230769230769232,
0,
0,
0,
0,
0,
0.020833333333333332,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.020833333333333332,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.019230769230769232,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.019230769230769232,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.025,
0,
0,
0,
0,
0,
0
] | 0.001065
| 5
|
[
"API & ISO Certification\nAll products of us are conformed to API Standard and under the ISO 9001:2008 international standard, we ensure that each products from our company should be fully inspected. ",
"SENWELL term is dedicated to ensuring that the products and services offered exceed the “expectation of value” of our customer.",
"Quality control\nQuality comes from the professional, services to win the future.",
"\nAbsorption makes profession, profession makes excellence!Quality Policy: Keep quality first and always to foster “Customers First”; keep constant improvement for the first-grade products. ",
"Quality Objective: The eligible rate of internal control products must be more than 97%, and all products must be 100% qualified before go out mill.",
"Quality Tenet: The quality of products and service is the lifeline of company’s development. ",
"Quality Philosophy: How to do it better! ",
"Constant improvement, make progress bit by bit every day.",
"\n\nTo make the utmost satisfactory and successful for our customers is our working mission, and is the most important measurement of our performance. ",
"To provide high-quality products, is the best way to reward customer."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.015151515151515152,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0.001515
| 5
|
[
"Nokia 808 PureView is a camera engineering marvel - are you getting one?",
"\n\n0.phoneArena\n27 Feb 2012, 13:52posted on\n\nWhat we are interested in is whether you are intrigued by Nokia's bombshell device as a phone, and if you are planning to get one the day it comes out, or are already distracted by something else. ",
"Checkmark our little poll and sound off in the comments...\n\nDoubt we'll see everything this phone has to offer, running Windows Phone by the end of the year. ",
"Not a big fan of the design either. ",
"Would love to see another N8 looking phone with a bigger 4.3\" display on it plus all this has to offer. ",
"HDMI is still something we've yet to see on WP so hopefully since Apollo allows for microSD expansion, it will allow for HDMI as well. ",
"It's crazy how immature WP still is in so many respects.",
"\n\nEven though this phone isn't actually that great of a phone, it is the thing at the back that it's designed for. ",
"It may change the future of camera's, at least for a certain line of phones. ",
"Either way it is a great technology.",
"\n\nIt'll sell to a niche group. ",
"The N8 which sold well by 'nokias' sales standards but poorly in the global comparison scale and from returns we had instore it was not without a fair few software and hardware problems most notably freezing and self charging till the battery died quickly without actually being connected to a charger.",
"\n\nDon't get me wrong I had an N8 and loved the cameras photos but it too was a fairly limited phone,the os is dated and the browser was only ok at best incomparison to other smartphone browsers,facebook apps wouldn't open half people status updates,links or photos.",
"\n\nMost people certainly wouldn't sacrifice 400 bucks or a bill upgrade for 2 years for the sake of the camera. ",
"No professional photographers would swap an dslr for this 41mp camera either as zoom functions and optical zooms for instance are very limited in the 808\n\nHow come you didn't just edit what you said and just said \"Nailed It!\" ",
"instead you realized your error, left it there, and showed what you meant to say? ",
"Not trying to be a douche but that just stood out to me when scrolling down.",
"\n\n29.thatdude1 (unregistered)\n\nAndro, have you ever tried Belle on Nokia hardware? ",
"I would wager that you have not. ",
"It's really good. ",
"Its definitely is not dated. ",
"This phone will definitely sell well where Symbian is strong, and will do better than average in places that Symbian is not so strong. ",
"You clearly don't like anything other than Android, which is fine, so why bother wasting your time commenting on anything other than Android?",
"\n\nIts a wager you'd have lost,my n8 when i had it was on Anna and my N700 when i had it was on Belle,its handy working in the phone industry as lots of manufacturers give you phones to mess around with it! ;-)",
"\n\nAnna was an improvement in software but still dated,belle is better but merely was so because it brings in pull down task bar features ala android style and a few tweaks. ",
"Mostly the improvements were cosmetic in nature. ",
"I do infact prefer belle to windows and sales wise we have definitely sold more nokia symbian phones than windows.",
"\n\nStill both are really show their level in the industry by the sales figures they have ended up on. ",
"Nokias best phones ultimately are its features phones which have prolific sales and zero trouble. ",
"They are the very life of nokias sales figures year in year out and will continue to be so\n\nBelle was not just cosmetic changes. ",
"It was the whole system written from the ground up using the new qt engine. ",
"Brought large improvements in operation and use of system resources. ",
"I'll point out one that i expect you'll understand. ",
"With Anna, it was common to run out of RAM especially using opera mobile with lots of pages open. ",
"With Belle, that has never happen, even with more than 10 apps running, several pages open in opera mobile, and thats a phone with only 256MB RAM.",
"\n\nIts gonna be like the n8,a fantastic camera but nobody wanting the mediocre phone. ",
"The N8 camera was the best camera ive ever used. ",
"Unfortunately most of the people who bought an n8 was for the camera itself rather than the phone.",
"\n\nThe 41mp camera here will be wasted on an os that nobody wants and nobody buys in windows phone.",
"\n\nThere will be some other very capable shooters on very popular and very top level smartphones this year on platforms much more capable than windows\n\n6.thatdude1 (unregistered)\n\nGotta disagree with you there, andro. ",
"I happen to own a Nokia N8 and it's a fantastic smartphone, and not just because of the camera. ",
"The N8 was a hit for Nokia, hence the follow up in the 808 pureview. ",
"The OS on the phone(Symbian/Nokia Belle)is a joy to use and is a powerful one at that. ",
"And the 808 will be running Belle out the gate, not Windows. ",
"This phone is destined, at the very least, to be every bit as popular as the N8.",
"\n\nThe phone is being released with Symbian Belle, not Windows Phone. ",
"And despite the fact that you clearly have something against Windows Phone 7 (as evidenced by almost every one of your posts in WP7 related articles), it is a good operating system.",
"\n\nChoice is a good thing, and companies innovating for the platform you may not like will still benefit you in the long run, so don't be so hateful toward them.",
"\n\nLol @ the last option in the poll. ",
"Very trollish choice there to end it with the comment about apps. ",
"How about just leaving the option at \"My smartphone camera is good enough, so I'm not going to change phones for it?\"",
"\n\n30.thatdude1 (unregistered)\n\nFinally I can have what I was waiting for my entire life!!! ",
"N8 made my dream come true for the most part, but this one is unbelievable. ",
"It's a true marvel of technology, and only Nokia could have done it!!!",
"\n\nI don't see why people are unhappy with Symbian OS. ",
"It's a pretty good OS, much more efficient than iOS and Android, which is why N8 with 680MHz processor and 256MB ram has an unbelievably amazing performance (despite my initial doubts). ",
"Plus it's a very stable OS. ",
"I have never seen it crashing so far despite the fact that I torture it quite a bit on a regular basis.",
"\n\nyou must be kidding !!! ",
"i am with nokia since old times but can't say that Symbian is comperable to IOS Or Android !!! ",
"NO way sir ..\nthey even kill the memo and mego which was a really good OS if they support it !!",
"\n\nJust put iOS or Android on a device with 680MHz cpu and 256MB ram, and you will see why Symbian is better. ",
"Even Satio with 600MHz cpu and the ancient S60 has a brilliant performance. ",
"Everyday I amaze my Android and iOS friends with my N8 and Satio.",
"\n\nThere may not be as many apps for Symbian as there is for Android and iOS, but the Symbian OS on its own is very capable.",
"\n\n41 MP might be a little too much. ",
"Since it's an amazing camera phone, it better be water proof, sand proof, shake proof and everything proof. ",
"Otherwise, I drop my phone too often as it is. ",
"I know I would break that camera easily. ",
"Now they need to cramp 1 TB hard drive in that baby to store all that super high quality pictures.",
"\n\nWhy do all of keep saying 41MP is too much? ",
"Have you actually tried to find out the reason they are using the 41MP in the first place? ",
"Personally the ability of zooming into what ever i am capturing is really something to love. ",
"And in the fact that you get better low light performance. ",
"Seriously, anybody that uses their phone camera heavily will want these qualities.",
"\n\nWhy is there so much hate here towards pureview 808? ",
"Is it cos its a Nokia? ",
"Or is it cos its Symbian..or both? ",
"You ppl all hate Nokia cos you know it was once a king and it can take back the throne if it really tries and you ppl are eager not to let that happen cos the brand you support will be down the drain wen that happens..And regarding symbian, i agree its a dead platform, but so wat? ",
"it still does well wat its supposed to do and does it better than any other fone out there wen u just compare fones with similar hardware. ",
"and no i'm not a troll or a fanboy, i'm just in awe of the technology nokia has developed. '",
"m using samsung omnia w, so 'm neither a nokia fan nor a symbian fan. ",
"there are some things that are facts and there's no denying it..Nokia is a great company and symbian is a good os, not an awesome one like ios or wp, but still good..\n\nBest new Android, iPhone and Windows Phone apps\n\nBest new Android, iPhone and WP games\n\nAll content (phone reviews, news, specs, info), design and layouts are Copyright 2001-2015 phoneArena.com. ",
"All rights reserved. ",
"Reproduction in whole or in part or in any form or medium without written permission is prohibited! ",
"Privacy . ",
"Terms of use . ",
"Cookies . ",
"Team"
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.013888888888888888,
0.004149377593360996,
0.012658227848101266,
0,
0.009615384615384616,
0.022222222222222223,
0.017857142857142856,
0,
0,
0,
0,
0.0033112582781456954,
0.007547169811320755,
0,
0,
0,
0,
0.012048192771084338,
0,
0,
0,
0,
0.014184397163120567,
0.014354066985645933,
0.005780346820809248,
0,
0,
0,
0,
0.007751937984496124,
0,
0,
0,
0.01020408163265306,
0.00684931506849315,
0,
0,
0.01020408163265306,
0,
0,
0,
0.028985507246376812,
0.011494252873563218,
0,
0,
0.028985507246376812,
0.011049723756906077,
0,
0,
0,
0,
0,
0.013157894736842105,
0.014285714285714285,
0,
0.016129032258064516,
0,
0,
0,
0.010526315789473684,
0.010526315789473684,
0.01834862385321101,
0,
0.015384615384615385,
0.016260162601626018,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.043478260869565216,
0,
0.0035460992907801418,
0,
0,
0.014285714285714285,
0.024793388429752067,
0,
0,
0,
0,
0,
0
] | 0.0051
| 5
|
[
"\n\n\n\nThe Week’s Most Mundane, Inane, and Arcane Headlines\n\nTWICE AS MANY ILLEGALS IN USA AS PREVIOUSLY THOUGHT\n\nFor the longest time—almost since Speedy Gonzales and the Frito Bandito ruled American pop culture—we’ve been hearing that there are a dozen million illegal Mexicans—sorry, undocumented migrants—picking lettuce and spreading intestinal parasites throughout our whitebread-and-mayo land.",
"\n\nWe were told that this is nothing to be alarmed about, because normal average lazy fat entitled bigoted dying Americans don’t especially like to pick lettuce or spread intestinal parasites, and if we didn’t want a head of iceberg to cost 100,000 dollars, we should be happy that 44 million people in the USA don’t speak English at home, because English is the language of slavery and colonialism and it’s what the KKK spoke and it’s also what Adolf Hitler would have spoken if he had been born in England.",
"\n\nWe were expected to believe the tally of 12 million undocumented immigrants as a fixed and immutable and unchanging number, because we’re all well aware that these people don’t like to breed, and they especially don’t like to shoot out a dozen kids like cannonballs and then stuff them all into a motel room with the rest of their extended family.",
"\n\nWell, think again, Paco.",
"\n\nAccording to a new study by three Yale-affiliated researchers, there is a 95% probability that the likely number of illegal, tax-grubbing, tuberculosis-hacking, baby-squeezing, Anglo-despising illegal Mexicans in the USA hovers somewhere on the thin line between 16 and 19 million, with the mean population estimated at 22 million—in other words, almost twice what they’ve been telling us.",
"\n\nAccording to researcher Edward Kaplan, at first he thought they’d find a total much lower than 12 million:\n\nOur original idea was just to do a sanity check on the existing number. ",
"Instead of a number which was smaller, we got a number that was 50% higher. ",
"That caused us to scratch our heads….The analysis we’ve done can be thought of as estimating the size of a hidden population. ",
"People who are undocumented immigrants are not walking around with labels on their foreheads.…Yet for policy, it is very important to know the size of these hidden populations because that sets the scale of the problem in each of these different policy areas.",
"\n\nKaplan actually sees an upside to it all: If there are twice the illegals, they’re only committing half the per-capita crime we thought they were! ",
"Hey, that sounds pretty wholesome, although one must assume that “being in the country illegally” is not considered a crime.",
"\n\n“Think of it as two burritos for the price of one.”",
"\n\nIt’s not as if the hordes flooding in from Central and South America come from violent cultures or anything. ",
"Pay no attention to the fact that enough people have been murdered in South America since the year 2000 to wipe out the entire city of Chicago. ",
"It’s not as if 43 of the 50 cities on Earth with the highest murder rates are in Central and South America. ",
"And it’s definitely not as if El Salvador—who are mailing in our colorful friends from MS-13—has a murder rate almost 17 times higher than that of the USA.",
"\n\nIn short, there’s nothing to worry about, you bigots. ",
"Think of it as two burritos for the price of one.",
"\n\nMARINE LE PEN ORDERED TO TAKE PSYCH EXAM\n\nMarine Le Pen, the hot middle-aged blonde with nice firm jugs and a mischievous smirk who sought to reclaim France from the globalists, has been ordered to undergo psychiatric tests after tweeting graphic images of Islamic atrocities.",
"\n\nHer “crime” was to show an image of an Islamic beheading and to blame Daesh for it. “",
"In other countries,” Le Pen griped, “this would have earned me a medal.” ",
"Instead, she was charged in March with “violent messages that incite terrorism and pornography or seriously harm human dignity.”",
"\n\nIn other words, protesting terrorism is terrorism. ",
"And France is no longer France. ",
"Hasn’t been for a while.",
"\n\nCOKEHEAD RODENTS, REJOICE: A CURE IS COMING\n\nAre you a mouse with a cocaine problem? ",
"Or are you a coke fiend who wants to look cooler than all your friends by being able to snort a quarter-pound and not break a sweat?",
"\n\nWe bring you glad tidings of great joy: Gene therapists in Chicago who thought it’d be fun to dose mice with massive amounts of pure-white blow have developed a stem-cell implant that releases an enzyme which neuters cocaine’s intoxicating effects and quickly flushes it from the body.",
"\n\nResearchers say they plan to develop similar implants for alcohol and opioid addiction in order to reestablish a functional and harmonious rodent society.",
"\n\nRISE OF THE GLUTEN-FREE EUCHARIST\n\nAlthough Christianity is split into countless sects, to our knowledge the Roman Catholic Church is the only denomination that teaches the doctrine of transubstantiation, which means that when the priest consecrates the wine and wafer during Mass, they literally become the substantial blood and body of Jesus Christ—and if you don’t understand what “literally” means, turn away from “symbolically” and head in the other direction. ",
"Catholics teach that the what they call the “accidents” of the communion ceremony remain—in other words, yeah, it still looks like a wafer and, to be honest, it still tastes like wine—but be ye not fooled, because that is the literal flesh and blood of Jesus and it is no longer bread and wine.",
"\n\nGood thing for Catholics, then, that they don’t have to worry about gluten in their Eucharists, because it will become divine flesh anyway and you won’t have to worry about gluten OR wheat or any of that humanoid-diet nonsense. ",
"However, at St. Stephens Episcopal Church in Charleston, SC, communicants who have been scared out of their wits by the recent celiac panic can elect to take holy communion via an entirely gluten-free wafer. ",
"At the church, where there are about 170 attendees at any given time, a full five of them decide to be such difficult babies that they opt for the gluten-free eucharist.",
"\n\nIt’s a good thing that their Savior wasn’t nearly so delicate.",
"\n\nA FOOD-STAMP STRIP CLUB CALLED SHARKY’S\n\nOne would think that a gentlemen’s club called Sharky’s tucked away in a flat, nondescript southwest corner of Ohio would have a pinch of class and razzmatazz and swank. ",
"Hate to shatter your caviar wishes and champagne dreams, but Sharky’s has jumped the shark.",
"\n\nAfter a five-month police investigation that ended in 2017, officials say they plied the ritzy adult female entertainers of Sharky’s with a grand total of $2,000 worth of food stamps in exchange for “heroin, fentanyl, carfentanil, cocaine, methamphetamine and lap dances.” ",
"We were wondering how the cops were able to stay awake for the lap dances after all those opiates until we realized that they would wisely buy some meth just prior to the dances.",
"\n\nBut seriously, fellas—five months and only $2,000 of taxpayers’ dollars spent on debauchery? ",
"What kind of lightweights are you guys?",
"\n\nThis is now the second strip joint in Harrison Township OH, to lose its liquor license in recent years after officials with the Ohio Investigative Unit came down on a place called the Harem in May of this year. ",
"As with Sharky’s, the Harem was located on North Dixie Drive.",
"\n\nHarrison Township, OH, sounds like more and more fun the more we read about it.",
"\n\nIS IT RACIST TO CALL KOREANS “FISHY”?",
"\n\nAndy Kim was the swarthy, sexy, sultry, smoky Canadian pop singer of Lebanese origin who thrilled the world with such 1970s dance hits as “Rock Me Gently” and others whose names escape us at the moment. ",
"But we’re not talking about that Andy Kim anyway.",
"\n\nThe Andy Kim in question is a Korean American Democratic politician who is running for a U.S. House seat in southern New Jersey. ",
"Yes, he has slanty eyes, and yes, we assume he’s shorter than most males, and yes, according to the statistics, he very likely has a penis that is just a smidge under five inches—not that it’s any of your business.",
"\n\nThe reason his race is now an issue is because his opponent, a white Republican named Tom MacArthur, recently issued an ad that shows raw fish heads and has the slogan “THERE’S SOMETHING REAL FISHY ABOUT ANDY KIM.” ",
"As proof that the MacArthur campaign used a “racist font” in the ad, a Democratic spokeswoman wrongly claimed that the font was called “Chop Suey,” but it was clearly not. ",
"This is what the Chop Suey font looks like. ",
"According to spokeslady Caitlin Mota, who from one glance appears to be a fat white woman with possible lesbian inclinations and at least three cats:\n\nThe GOP’s decision to show images of raw fish and to use this particular red block font, which is actually called ‘Chop Suey’ and has long been used to visually convey Asian heritage, makes it abundantly clear what this mailer is — a shameful racist attack on a qualified and capable public servant.",
"\n\nThe MacArthur campaign countered that their man can’t be racist against Koreans because he has two Korean children even though his wife also looks white, so there’s a very remote possibility that he may have stolen the children in haste to appear less racist.",
"\n\nSTUDY: ROBOTS TEACH THEMSELVES TO BE RACIST\n\nArtificial intelligence experts from Wales and the USA have published a report which states that when robots split off into groups, they quickly learn to favor members of their own group at the expense of outsiders. ",
"Amazingly, a researcher concluded that this behavioral pattern was the result of “prejudice” rather than “pattern recognition”:\n\nBy running these simulations thousands and thousands of times over, we begin to get an understanding of how prejudice evolves and the conditions that promote or impede it…Our simulations show that prejudice is a powerful force of nature and through evolution, it can easily become incentivised in virtual populations, to the detriment of wider connectivity with others….Such widespread prejudice is hard to reverse.",
"\n\nEither that, or favoring your own kind is such a no-brainer, even robots do it without blinking.",
"\n\nEvery Monday, Jim Goad reads the previous day’s “Week That Perished” on his podcast"
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.010075566750629723,
0.0019723865877712033,
0,
0.038461538461538464,
0.0025575447570332483,
0.005494505494505495,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.004273504273504274,
0,
0,
0.009615384615384616,
0,
0,
0.004694835680751174,
0.01098901098901099,
0.007272727272727273,
0,
0,
0,
0.009389671361502348,
0.03278688524590164,
0,
0,
0.004878048780487805,
0.02040816326530612,
0.015267175572519083,
0,
0.004608294930875576,
0.005813953488372093,
0,
0.0044444444444444444,
0.0038314176245210726,
0,
0,
0,
0.011764705882352941
] | 0.003597
| 5
|
[
"Justin Kennedy\n\nJustin Kennedy (born 17 May 1972) is an actor, writer, voice-over artist and comedian from Melbourne, Australia. ",
"He started his performing career in 2002, after making his first stand-up appearance in the national Raw Comedy competition.",
"\n\nCareer\nIn 2003, Kennedy teamed up with fellow comedians Gavin Baskerville and Dwight Bandy to write and perform the show Successful Losing: How to be a Spectacular Failure in both the WA Fringe Festival (winning 'Best Comedy') and the Melbourne International Comedy Festival. ",
"In 2004, Kennedy performed his first solo stand-up show in the Melbourne International Comedy Festival, Simple Pleasures, which he followed over the next four years with I'm With Stupid, Beelzebuzz (nominated for a Golden Gibbo Award), Ladies...? ",
"and Passionista.",
"\n\nIn 2009, Kennedy teamed up with Sarah Collins to write and perform, Donna and Damo: An Asexual Love Story for the Melbourne Fringe before performing it at the Arts Centre in the 2010 Melbourne Comedy Festival. ",
"He proposed to Collins onstage during the curtain call of a performance in April 2010.",
"\n\nIn 2008, Kennedy wrote and performed as a cast member of Foxtel's The Mansion with Michael Chamberlin and Charlie Pickering. ",
"He appeared three times on Foxtel's Stand Up Australia. ",
"He was a regular writer for Rove from 2007 until its final episode, appearing in numerous sketches during this time.",
"\n\nKennedy has appeared as an actor in numerous television shows including The Time of Our Lives, The Secret, It's a Date and Utopia, as well as voiced characters for the animated series' Sumo Mouse, Flea-Bitten and SheZow. ",
"\n\nKennedy was formerly Head Writer at The Project and now writes for Hard Quiz and The Weekly with Charlie Pickering.",
"\n\nSelect filmography\n Rove\n The Mansion\n Stand Up Australia\n The Secret\n Neighbours\n Stingers\n Reverse Runner\n\nReferences\n\nExternal links\n\n Official website\n\nCategory:1972 births\nCategory:Living people\nCategory:Australian stand-up comedians"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.023255813953488372,
0.008064516129032258,
0.02158273381294964,
0.008097165991902834,
0.0625,
0.018867924528301886,
0.011627906976744186,
0.031496062992125984,
0.017857142857142856,
0.008620689655172414,
0.017937219730941704,
0.02564102564102564,
0
] | 0.019658
| 5
|
[
"Star-struck Selena Gomez doing a cameo in Brad Pitt's The Big Short\n\nAmerican pop star Selena Gomez will reportedly make a guest appearance in The Big Short, which co-stars actors Brad Pitt, Christian Bale and Ryan Gosling. ",
"It seems that she will appear in a cameo which was shot for only a day.",
"\n\nAll you Selena Gomez fans rejoice. ",
"The American pop star will reportedly make a guest appearance in Brad Pitt, Christian Bale and Ryan Gosling's forthcoming film, The Big Short.",
"\n\nThe film, which was being shot in New Orleans, follows wealthy opportunists who profited off the American economic meltdown in the mid-2000s, reported Entertainment Weekly.",
"\n\nGomez, 22, is apparently playing a Manhattan professional. ",
"It seems that she will appear in a cameo, as her participation in the shoot, which took place at Harrah's Casino in the French Quarter, was for only a day.",
"\n\nIn 2013, the singer-actor admitted to TV show host Ellen DeGeneres that she was starstruck when she first met Pitt after he came to meet her at a concert.",
"\n\nThe Big Short also stars actors Marisa Tomei, Steve Carell and Scarlett Johansson. ",
"According to a source, singers Jay Z and Beyonce are also scheduled to shoot cameos for the film later this week."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.026785714285714284,
0,
0.02702702702702703,
0.02112676056338028,
0.005747126436781609,
0,
0.012903225806451613,
0.01282051282051282,
0.03529411764705882,
0.008849557522123894
] | 0.015055
| 5
|
[
"Anonymous\n\nfrom Eugene, Oregon\n\nThese boots are very soft with a light-weight sole. ",
"They are more of a dress shoe than a boot. ",
"Very attractive, but not wide enough for my feet. ",
"I was hoping that the rounded toe would provide me the width I needed. ",
"It did not. ",
"Not a shoe to wear in heavy weather, but nice looking, like wearing fine gloves on your feet. ",
"Also did not have good insoles or any arch support, very flat inside.",
"\n\nVictoria\n\nfrom Colorado Springs, CO\n\nI have a high instep and this shoe was too tight to accommodate it. ",
"Could not get my foot into the shoe. ",
"On top of that, the shoe was actually kind of ugly. ",
"I just printed my return label and they are going back.",
"\n\nFit Rating\n\nAnonymous\n\nThis is my 2nd pair of Arcopedicoboots and they are both so comfortable! ",
"They are also stylish, these will need no breaking in at all and look great with skinny jeans or skirts. ",
"I also have a pair of the L31 which I can wear all day, I definitely recommend them both and will buy another pair sometime. (",
"Go up a 1/2 size though.)",
"\n\nFit Rating\n\nBeebe C\n\nfrom Las Vegas\n\nI purchased these boots for work in a casual office setting. ",
"I am on my feet many hours and have had a history of multiple foot problems. ",
"For the last 5 years I purchase all shoes 1 size larger then place athletic inserts ($25 & up) inside for better support, & allows space for swelling. ",
"From the moment I put these on, they felt like house shoes. ",
"No break-in, no reminder they were new. ",
"Just good, basic boots & I wear them daily without pain. ",
"Receive many compliments. ",
"Snaps, I could do without. ",
"But 5 stars for sure!",
"\n\nFit Rating\n\nAnonymous\n\nThis shoe has a very nice padded innersole and was generally comfortable. ",
"My only problem was that it pinched across the instep of the right foot no matter what socks I wore. ",
"I am 72 years old, have a little arthritis in my feet and one foot has had two operations, one for a bad bunion and the second for an equally severe hammer toe. ",
"I wear 3/4 length inserts. ",
"I look for good arch support, soft leather and some padding in the innersole (plus an attractive and supportive style), all of which is a lot to ask for in one pair of shoes but, thanks to Zappos, I found it...Rieker's Lynn.",
"\n\nFit Rating\n\nAnonymous\n\nfrom Los Angeles\n\nThese shoes run large. ",
"Even with my orthotics in them and wearing heavy socks they were loose. ",
"I liked the ankle treatment, but the toes are very round. ",
"I didn\\'t much care for how they looked with pants.",
"\n\nFit Rating\n\nAnonymous\n\nI wanted a comfortable, flat boot that I could wear with skinny jeans when it was too wet or chilly to wear ballet flats and when my heeled boots added too much height. ",
"I ordered these in brown and liked the look and fit so well that I decided to get the red, too. ",
"Both will work with leggings and other jeans styles, not just skinnies. ",
"They'll be easy to get out of when I come indoors from the rain or snow. ",
"This red will work with blue denim and with browns, blacks, grays, darker purples, and maybe even teal.",
"\n\nFit Rating\n\nAnonymous\n\nThese are THE most comfortable shoes I have ever put on! ",
"I did need to put my orthotics in, as I needed more support - and there was plenty of room. ",
"My feet feel like they are on clouds. ",
"I have walked miles and miles in them, from the first day I got them. ",
"The leather is super soft and that's a big part of the comfort.",
"\n\nFit Rating\n\nLillynbloom\n\nfrom Virginia\n\nI have the type of old lady feet that are always hurting for one reason or another, bunions, neuromas, etc. ",
"My husband gave me a trip to Istanbul and once again, I set out on my quest for a comfortable pair of shoes that did not scream out, \"Tourist!\" ",
"or \"Old Lady!\" ",
"I decided with trepidation to wear these stylish boots but brought a backup old lady pair just in case. ",
"I walked miles on cobblestones for days and nights and down long airport hallways as my feet sang out, \"Hallelujah!\" ",
"Neuroma? - ",
"What neuroma? ",
"The arch and heel feel a bit strange at first and the shoes are not very cushy but somehow, it works and they are among the most comfortable shoes I've ever owned and yet they are also stylish with a pair of leggings and a tunic top. ",
"I could go on and on, but you get the point. ",
"Amazingly comfortable shoes.",
"\n\nFit Rating\n\nShawn H\n\nI am obsessed! ",
"I can't wear anything else now! ",
"These funny looking boots are SO comfortable I find myself changing my wardrobe around to work with this little boot! ",
"I bought it in red. ",
"Now I am buying it in black. ",
"Plus I am buying other styles from Archepedico. ",
"I can put these on and hours later I realize I have been walking and going everywhere and forgot I was even wearing shoes! ",
"I have a tripled fused left foot and double knee replacements. ",
"Believe you me, there are no other shoes that feel like this to me. ",
"Obsessed, I tell you!!",
"\n\nFit Rating\n\nNaomi P\n\nfrom Durham, NC\n\nThese might be my favorite shoes I've ever owned. ",
"They are buttery soft and I wore them all over Boston the first weekend I had them. ",
"Now I wear them pretty much every day. ",
"SO CUTE with rolled up jeans, cropped pants, or skirts.",
"\n\nFit Rating\n\nMrs. D\n\nfrom San Francisco Bay Area, CA\n\nI wanted a red boot that was not Red! ",
"This is a winner, I am wearing them right now. ",
"Even after a day of teaching high school, I have a smile on my face. ",
"And they are so very cute. ",
"The leather is so soft - it seems to mold to my foot."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.011904761904761904,
0,
0,
0,
0,
0,
0,
0.009345794392523364,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.004464285714285714,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.006666666666666667,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.020833333333333332,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0.000739
| 5
|
[
"package auth\n\nimport (\n\t\"github.com/go-kratos/kratos/pkg/ecode\"\n\tbm \"github.com/go-kratos/kratos/pkg/net/http/blademaster\"\n\t\"github.com/go-kratos/kratos/pkg/net/metadata\"\n)\n\n// Config is the identify config model.",
"\ntype Config struct {\n\t// csrf switch.",
"\n\tDisableCSRF bool\n}\n\n// Auth is the authorization middleware\ntype Auth struct {\n\tconf *Config\n}\n\n// authFunc will return mid and error by given context\ntype authFunc func(*bm.",
"Context) (int64, error)\n\nvar _defaultConf = &Config{\n\tDisableCSRF: false,\n}\n\n// New is used to create an authorization middleware\nfunc New(conf *Config) *Auth {\n\tif conf == nil {\n\t\tconf = _defaultConf\n\t}\n\tauth := &Auth{\n\t\tconf: conf,\n\t}\n\treturn auth\n}\n\n// User is used to mark path as access required.",
"\n// If `access_token` is exist in request form, it will using mobile access policy.",
"\n// Otherwise to web access policy.",
"\nfunc (a *Auth) User(ctx *bm.",
"Context) {\n\treq := ctx.",
"Request\n\tif req.",
"Form.",
"Get(\"access_token\") == \"\" {\n\t\ta.UserWeb(ctx)\n\t\treturn\n\t}\n\ta.UserMobile(ctx)\n}\n\n// UserWeb is used to mark path as web access required.",
"\nfunc (a *Auth) UserWeb(ctx *bm.",
"Context) {\n\ta.midAuth(ctx, a.authCookie)\n}\n\n// UserMobile is used to mark path as mobile access required.",
"\nfunc (a *Auth) UserMobile(ctx *bm.",
"Context) {\n\ta.midAuth(ctx, a.authToken)\n}\n\n// Guest is used to mark path as guest policy.",
"\n// If `access_token` is exist in request form, it will using mobile access policy.",
"\n// Otherwise to web access policy.",
"\nfunc (a *Auth) Guest(ctx *bm.",
"Context) {\n\treq := ctx.",
"Request\n\tif req.",
"Form.",
"Get(\"access_token\") == \"\" {\n\t\ta.GuestWeb(ctx)\n\t\treturn\n\t}\n\ta.GuestMobile(ctx)\n}\n\n// GuestWeb is used to mark path as web guest policy.",
"\nfunc (a *Auth) GuestWeb(ctx *bm.",
"Context) {\n\ta.guestAuth(ctx, a.authCookie)\n}\n\n// GuestMobile is used to mark path as mobile guest policy.",
"\nfunc (a *Auth) GuestMobile(ctx *bm.",
"Context) {\n\ta.guestAuth(ctx, a.authToken)\n}\n\n// authToken is used to authorize request by token\nfunc (a *Auth) authToken(ctx *bm.",
"Context) (int64, error) {\n\treq := ctx.",
"Request\n\tkey := req.",
"Form.",
"Get(\"access_token\")\n\tif key == \"\" {\n\t\treturn 0, ecode.",
"Unauthorized\n\t}\n\t// NOTE: 请求登录鉴权服务接口,拿到对应的用户id\n\tvar mid int64\n\t// TODO: get mid from some code\n\treturn mid, nil\n}\n\n// authCookie is used to authorize request by cookie\nfunc (a *Auth) authCookie(ctx *bm.",
"Context) (int64, error) {\n\treq := ctx.",
"Request\n\tsession, _ := req.",
"Cookie(\"SESSION\")\n\tif session == nil {\n\t\treturn 0, ecode.",
"Unauthorized\n\t}\n\t// NOTE: 请求登录鉴权服务接口,拿到对应的用户id\n\tvar mid int64\n\t// TODO: get mid from some code\n\n\t// check csrf\n\tclientCsrf := req.",
"FormValue(\"csrf\")\n\tif a.conf !",
"= nil && !",
"a.conf.",
"DisableCSRF && req.",
"Method == \"POST\" {\n\t\t// NOTE: 如果开启了CSRF认证,请从CSRF服务获取该用户关联的csrf\n\t\tvar csrf string // TODO: get csrf from some code\n\t\tif clientCsrf !",
"= csrf {\n\t\t\treturn 0, ecode.",
"Unauthorized\n\t\t}\n\t}\n\n\treturn mid, nil\n}\n\nfunc (a *Auth) midAuth(ctx *bm.",
"Context, auth authFunc) {\n\tmid, err := auth(ctx)\n\tif err !",
"= nil {\n\t\tctx.",
"JSON(nil, err)\n\t\tctx.",
"Abort()\n\t\treturn\n\t}\n\tsetMid(ctx, mid)\n}\n\nfunc (a *Auth) guestAuth(ctx *bm.",
"Context, auth authFunc) {\n\tmid, err := auth(ctx)\n\t// no error happened and mid is valid\n\tif err == nil && mid > 0 {\n\t\tsetMid(ctx, mid)\n\t\treturn\n\t}\n\n\tec := ecode.",
"Cause(err)\n\tif ecode.",
"Equal(ec, ecode.",
"Unauthorized) {\n\t\tctx.",
"JSON(nil, ec)\n\t\tctx.",
"Abort()\n\t\treturn\n\t}\n}\n\n// set mid into context\n// NOTE: This method is not thread safe.",
"\nfunc setMid(ctx *bm.",
"Context, mid int64) {\n\tctx.",
"Set(metadata.",
"Mid, mid)\n\tif md, ok := metadata.",
"FromContext(ctx); ok {\n\t\tmd[metadata.",
"Mid] = mid\n\t\treturn\n\t}\n}\n"
] |
{
"pile_set_name": "Github"
}
|
[
0,
0.02631578947368421,
0.017045454545454544,
0.013289036544850499,
0,
0,
0.034482758620689655,
0,
0.0625,
0,
0.014925373134328358,
0.03125,
0.009523809523809525,
0.02857142857142857,
0.02247191011235955,
0,
0,
0.03333333333333333,
0,
0.0625,
0,
0,
0,
0.009523809523809525,
0.027777777777777776,
0.023255813953488372,
0,
0,
0,
0,
0.019801980198019802,
0,
0,
0,
0.015384615384615385,
0.03333333333333333,
0.1,
0,
0.05263157894736842,
0.007633587786259542,
0,
0.013888888888888888,
0,
0,
0.047619047619047616,
0.013513513513513514,
0.012422360248447204,
0.047619047619047616,
0,
0,
0.1,
0.011494252873563218,
0,
0,
0.07692307692307693,
0,
0,
0
] | 0.016707
| 5
|
[
"Q:\n\nJenkins not able to access java : localhost jenkins[807]: Starting Jenkins bash: /usr/bin/java: Permission denied\n\nI have installed and configured jenkins on the centos 7.I have added valid java path i.e \"/usr/bin/java\" in the file /etc/init.d/jenkins.",
"\nBelow are the java path detils:\nlrwxrwxrwx. ",
"1 root root 22 Dec 24 2015 java -> /etc/alternatives/java\n\nNow, on running \"service jenkins start\" command from root user, I am getting below error.",
"\n● jenkins.service - LSB: Jenkins Continuous Integration Server\n Loaded: loaded (/etc/rc.d/init.d/jenkins)\n Active: failed (Result: exit-code) since Wed 2016-07-13 18:25:51 IST; 5s ago\n Docs: man:systemd-sysv-generator(8)\n Process: 807 ExecStart=/etc/rc.d/init.d/jenkins start (code=exited, status=1/FAILURE)\n\nJul 13 18:25:51 localhost systemd[1]: Starting LSB: Jenkins Continuous Integration Server...\nJul 13 18:25:51 localhost runuser[812]: pam_unix(runuser:session): session opened for user jenkins by (uid=0)\nJul 13 18:25:51 localhost jenkins[807]: Starting Jenkins bash: /usr/bin/java: Permission denied\nJul 13 18:25:51 localhost runuser[812]: pam_unix(runuser:session): session closed for user jenkins\nJul 13 18:25:51 localhost jenkins[807]: [FAILED]\nJul 13 18:25:51 localhost systemd[1]: jenkins.service: control process exited, code=exited status=1\nJul 13 18:25:51 localhost systemd[1]: Failed to start LSB: Jenkins Continuous Integration Server.",
"\nJul 13 18:25:51 localhost systemd[1]: Unit jenkins.service entered failed state.",
"\nJul 13 18:25:51 localhost systemd[1]: jenkins.service failed.",
"\n\nI am not able to figure out why it's giving me permission denied even though every user having access to the java path.",
"\nalso on running \"journalctl -xe\" command it shows below log:\nJul 13 18:45:33 localhost systemd[1]: Unit jenkins.service entered failed state.",
"\nJul 13 18:45:33 localhost systemd[1]: jenkins.service failed.",
"\nJul 13 18:45:33 localhost polkitd[20151]: Unregistered Authentication Agent for unix-process:27889:3161602 (system bus name :1.303, object path /org/freedesktop/PolicyKit1/AuthenticationAgen\n\nIs it like that the Jenkins service does't having permission to access the java path? ",
"if not why it's giving that error?",
"\n\nA:\n\nYou have two options to solve the problem.",
"\n\nJenkins service is started by jenkins user. ",
"The error says that jenkins user does not have permission to run java. ",
"So check orginal java path and give execute permissions to other users.",
"\nIn jenkins.service unit file, change the owner of the service. ",
"Replace User=jenkins with User=root\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0.0078125,
0,
0,
0.004153686396677051,
0,
0,
0,
0.007042253521126761,
0,
0.007168458781362007,
0,
0,
0,
0,
0,
0,
0.02702702702702703
] | 0.00313
| 5
|
[
"Desiderii Marginis\n\nDesiderii Marginis is a dark ambient music project from Sweden.",
"\n\nHistory \nDesiderii Marginis was formed by Johan Levin in 1993 in Mjölby, Sweden as a solo project.",
"\nThe first three tapes Consecrare, Via Peregrinus and Triptych were originally released in very limited editions, however in 2009 these tracks were released on the retrospective album Years Lend a Golden Charm. ",
"Some of these songs appeared in new versions on Songs Over Ruins, the debut album released on Cold Meat Industry in 1997.",
"\n\nAlbums \n Songs Over Ruins. ",
"Cold Meat Industry, 1997\n Deadbeat. ",
"Cold Meat Industry, 2001\n Strife. ",
"Cold Meat Industry, 2004\n The Ever Green Tree. ",
"Kaosthetik Distribution, 2005\n That Which Is Tragic and Timeless. ",
"Cold Meat Industry, 2005\n Seven Sorrows. ",
"Cold Meat Industry, 2007\n Years Lend a Golden Charm. (",
"Compilation) Eternal Pride, 2009\n Procession. ",
"Cyclic Law, 2012\n Hypnosis. ",
"Cyclic Law, 2014\n Thaw. ",
"Zoharum, 2014\n Vita Arkivet. ",
"Cyclic law, 2018\n\nSee also \n List of dark ambient artists\n\nCategory:Dark ambient music groups\nCategory:Swedish musical groups"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.012048192771084338,
0.02,
0,
0.01652892561983471,
0.034482758620689655,
0.027777777777777776,
0.029411764705882353,
0.02127659574468085,
0.015151515151515152,
0.024390243902439025,
0.018518518518518517,
0,
0.03571428571428571,
0.041666666666666664,
0,
0.008
] | 0.01906
| 5
|
[
" z. Round q to 3 dps.",
"\n0.001\nLet g = -44 - -9. ",
"Let y = g + 19. ",
"Let p = y + 15.99999943. ",
"What is p rounded to seven decimal places?",
"\n-0.0000006\nLet b = 0.9 - 0.7. ",
"Let y = 0 - b. Round y to one decimal place.",
"\n-0.2\nLet t = -1.1 - 1.9. ",
"Let d = -2.9948 - t. Round d to 3 dps.",
"\n0.005\nLet c = -2.9 + 3.59. ",
"Let b = c - 0.07. ",
"Round b to 1 dp.",
"\n0.6\nLet m = 2.062 - 1.43. ",
"Round m to 1 dp.",
"\n0.6\nLet p = 0.0314 + -0.04134. ",
"Let l = 23.99 + -24. ",
"Let s = l - p. What is s rounded to 4 decimal places?",
"\n-0.0001\nLet m be 4/(-3) + (-2430012)/(-9). ",
"Round m to the nearest one hundred thousand.",
"\n300000\nLet j = -23 - -39. ",
"Let p = j + -15.9999932. ",
"Round p to six dps.",
"\n0.000007\nSuppose -3*n + 2*a - 173731 - 31249 = 0, 2*a - 273310 = 4*n. ",
"Let m = -129330 - n. What is m rounded to the nearest 10000?",
"\n-60000\nLet v = -2689.07 - -2713. ",
"Let s = 3.03 - v. Round s to 0 decimal places.",
"\n-21\nLet o = 124 - 124.036. ",
"What is o rounded to 1 decimal place?",
"\n0\nLet a = 146.302111 + 0.032889. ",
"Let g = a + -0.335. ",
"Let y = g + -145.9913. ",
"What is y rounded to 3 decimal places?",
"\n0.009\nLet w = -126.0000138 + 126. ",
"What is w rounded to six dps?",
"\n-0.000014\nLet a(p) = 66*p - 4. ",
"Let l be a(-6). ",
"What is l rounded to the nearest one thousand?",
"\n0\nLet r = 57.05 + -55. ",
"Let u = r - 2.05147. ",
"What is u rounded to 4 dps?",
"\n-0.0015\nLet f = 0.2 - 0.272. ",
"What is f rounded to two dps?",
"\n-0.07\nLet g = -37 - -44. ",
"Let z = 1.27434 + -8.27436. ",
"Let n = g + z. Round n to four dps.",
"\n0\nSuppose 0 = -w - 0*w - 1085061. ",
"Let z = w + 2345061. ",
"Suppose x + z = -x. ",
"What is x rounded to the nearest one hundred thousand?",
"\n-600000\nLet b be (469526/(-4))/(1/(-3544)). ",
"Let v be b/(-10) + (-6)/15. ",
"Let o be (-2)/4 + v/(-8). ",
"What is o rounded to the nearest 1000000?",
"\n5000000\nLet x = -10 - -26. ",
"Let l = 15.93 - x. Round l to two dps.",
"\n-0.07\nLet w = -173 + 172.484. ",
"Let d = w - 0.074. ",
"Round d to 1 decimal place.",
"\n-0.6\nSuppose h = -m + 3207 + 7797, h = 2*m - 21996. ",
"Round m to the nearest ten thousand.",
"\n10000\nLet n(p) = -934435*p**2 + p + 2 - 1504307*p**2 + 563741*p**2. ",
"Let a be n(2). ",
"What is a rounded to the nearest 1000000?",
"\n-8000000\nLet j = -195 - -100. ",
"Let t = j + 94.9999838. ",
"What is t rounded to 6 decimal places?",
"\n-0.000016\nLet r be 2/(-7) + (-330)/70. ",
"Let j be 12*-1000*2/r. What is j rounded to the nearest 1000?",
"\n5000\nLet g = 83 - 124. ",
"Let j = g + 71. ",
"Let v = -29.9999942 + j. What is v rounded to six decimal places?",
"\n0.000006\nSuppose 4*u + 350012 = -7*z + 2*z, z + 70015 = -5*u. ",
"What is z rounded to the nearest 100000?",
"\n-100000\nLet w(f) = -8*f**3 + 6*f**2 + 3*f - 5. ",
"Let n(i) = i + 2. ",
"Let q be n(3). ",
"Let s be w(q). ",
"What is s rounded to the nearest one hundred?",
"\n-800\nLet l = 215.8 + -238. ",
"What is l rounded to the nearest 10?",
"\n-20\nLet l = -343132136 - -343132195.6197746. ",
"Let m = 57.61978 - l. Let a = 2 + m. What is a rounded to 6 dps?",
"\n0.000005\nLet q(p) = 540*p**3 + 2*p**2 + 4*p. ",
"Let m be q(18). ",
"What is m rounded to the nearest 1000000?",
"\n3000000\nLet k = -5 - -9. ",
"Let u = -0.1248 - -4.1223. ",
"Let n = k - u. What is n rounded to 3 dps?",
"\n0.003\nLet d = -2.9 - 33.1. ",
"Let x = -36.000027 - d. Round x to five decimal places.",
"\n-0.00003\nLet j = -5.8 + 5.80000103. ",
"What is j rounded to seven dps?",
"\n0.000001\nSuppose 0*m = m - 1. ",
"Let b be (-2 + 2)*m/(-2). ",
"Let l be -32 - (3 - b/(-2)). ",
"Round l to the nearest ten.",
"\n-40\nSuppose d = -3, 4*t + d = 2*d - 5. ",
"Let n be 3/t + (-543)/(-2). ",
"Round n to the nearest one hundred.",
"\n300\nLet d be ((-956)/2)/((-4)/(-10)). ",
"Let b = -2085 - d. What is b rounded to the nearest one hundred?",
"\n-900\nLet m = -14774.812 - -6235998.812. ",
"Let w = -6221253.0000026 + m. Let g = w + 29. ",
"Round g to 6 decimal places.",
"\n-0.000003\nLet z = 135 + -135.63. ",
"Round z to 1 dp.",
"\n-0.6\nLet q = -0.02 - -3.62. ",
"Round q to zero dps.",
"\n4\nLet z = 1 + 14. ",
"Let l = z - 10. ",
"Let s = -5.0005 + l. Round s to 4 dps.",
"\n-0.0005\nLet w = 0.0943 - 0.099. ",
"What is w rounded to three dps?",
"\n-0.005\nLet a = -34.56 + 34. ",
"Let o = a - -0.533. ",
"Let h = o + 0.0269938. ",
"Round h to 6 dps.",
"\n-0.000006\nLet j = 0.38 + -15.38. ",
"Let w = -15.0217 - j. Let o = w + 0.017. ",
"What is o rounded to 3 dps?",
"\n-0.005\nLet m(l) = 1093*l**3 + 4*l**2 - 4*l. ",
"Let s be m(4). ",
"Round s to the nearest 10000.",
"\n70000\nLet x = 150687.93000055 + -150688. ",
"Let h = -5 + 4.93. ",
"Let c = h - x. What is c rounded to 7 decimal places?",
"\n-0.0000006\nLet l = -31.1345206 - -38.134522. ",
"Let c = -6.2 + -0.8. ",
"Let h = c + l. What is h rounded to six decimal places?",
"\n0.000001\nLet y = -0.2 - -0.3. ",
"Let i = y - 0.12. ",
"Let g = i - -0.01978. ",
"What is g rounded to 4 dps?",
"\n-0.0002\nSuppose 0*g = -2*g + 6, -3*m - 5*g + 24 = 0. ",
"Suppose 0 = m*s - 784977 + 19977. ",
"What is s rounded to the nearest ten thousand?",
"\n260000\nLet v = 170115.27891 + -169952.28. ",
"Let z = v + -163. ",
"Round z to 4 decimal places.",
"\n-0.0011\nLet d = -116 - -2772. ",
"Let q = d + -1681. ",
"Suppose -3*p + 1265 = -4*a, 0 = -3*a - 2*p - p - q. Round a to the nearest one hundred.",
"\n-300\nLet r = -1 - -5. ",
"Suppose -5*h - 3*f + 1 = -r*h, -h + 3*f = -7. ",
"Suppose -4*c + 2*y + 24806 = 0, 0 = h*y + 8 + 4. ",
"What is c rounded to the nearest one thousand?",
"\n6000\nLet o = 4.999981 - 5. ",
"Round o to five dps.",
"\n-0.00002\nLet n = -2484.59972 + 2485. ",
"Let w = n + -0.4. ",
"What is w rounded to 4 dps?",
"\n0.0003\nLet r = 3 + -1. ",
"Suppose r*l = -l - 1234026. ",
"Let n = -41342 - l. What is n rounded to the nearest 100000?",
"\n400000\nLet c = -397.6 - -311.561. ",
"Let x = 86 + c. Let w = x - -0.039041. ",
"Round w to five decimal places.",
"\n0.00004\nLet j = -18.24828 - -0.05228. ",
"Let a = 0.096 + j. Let k = a - -24. ",
"Round k to zero dps.",
"\n6\nLet v = -1.76 + 17.54. ",
"Let b = v - -0.42. ",
"Round b to zero dps.",
"\n16\nLet s = 16.99999963 + -17. ",
"Round s to seven dps.",
"\n-0.0000004\nSuppose -4*v - 2 = a + 2*a, 0 = 3*v - 3. ",
"Suppose m + 3*m = 5*u - 45, 0 = 4*m + 4*u. ",
"Let r be (136 - a - -2)*m. ",
"Round r to the nearest 100.",
"\n-700\nLet n = -27 + 29.13. ",
"Let d = n + -2.524. ",
"Let h = 0.4 + d. What is h rounded to two decimal places?",
"\n0.01\nLet h = -1.36 - -0.59. ",
"What is h rounded to one dp?",
"\n-0.8\nLet a = -75317 + 43111. ",
"Let f = a - -32205.904053. ",
"Let t = -0.096 - f. Round t to 5 dps.",
"\n-0.00005\nLet o = 4 - 4. ",
"Let h = o + 0.0008. ",
"What is h rounded to 3 decimal places?",
"\n0.001\nLet f(y) = 955556*y - 4. ",
"Let k be f(9). ",
"What is k rounded to the nearest one million?",
"\n9000000\nLet l = 27800.07999985 + -27800.14. ",
"Let u = 0.06 + l. What is u rounded to seven decimal places?",
"\n-0.0000002\nLet j be ((-12)/4)/(6/(-3028)). ",
"Let m be j + 2 + (-4 - -8). ",
"What is m rounded to the nearest one hundred?",
"\n1500\nLet p = 0.077 + -0.076. ",
"Round p to two decimal places.",
"\n0\nLet r = 452263.999994 - 452265. ",
"Let p = r + 1. ",
"What is p rounded to six decimal places?",
"\n-0.000006\nLet i be 264 - (0 - 0/(-1)). ",
"Let a = -166 + i. Round a to the nearest 10.",
"\n100\nLet n be (-4)/(-6) + 56/(-12). ",
"Let q be (-1)/n + 60/16. ",
"Let x be 681/(-4) + 1/q. Round x to the nearest 100.",
"\n-200\nSuppose 158 = -p + 446. ",
"Let d be ((-12250)/21)/(2/p). ",
"Round d to the nearest 10000.",
"\n-80000\nLet s = 112 - -175. ",
"Let k = 67 - s. What is k rounded to the nearest one hundred?",
"\n-200\nLet n(o) = -o - 11. ",
"Let f be n(-7). ",
"Let r(t) be the first derivative of -1157*t**4/4 - 2*t**3/3 + 2*t**2 + 4. ",
"Let q be r(f). ",
"Round q to the nearest 10000.",
"\n70000\nLet v = -0.26 - -0.260029. ",
"What is v rounded to five decimal places?",
"\n0.00003\nLet b be 0 + 3 - (-4 - -4). ",
"Suppose -5*l = a + 2*a + 85, l + b*a = -17. ",
"What is l rounded to the nearest 10?",
"\n-20\nSuppose 95980 = 5*z - 2*z - 4*u, 4*u - 128020 = -4*z. ",
"Suppose -w - w = z. Round w to the nearest 1000.",
"\n-16000\nLet i = -19115934.30000075 + 19115937. ",
"Let c = i - 2.7. ",
"Round c to 7 decimal places.",
"\n-0.0000008\nLet b = -1984.99 + 1993. ",
"What is b rounded to zero dps?",
"\n8\nLet t = 2.9 - -49.1. ",
"Let o = t + -68.9. ",
"Let g = o + 16.90000067. ",
"Round g to seven decimal places.",
"\n0.0000007\nLet l = -24892693 + 35092693. ",
"Round l to the nearest 1000000.",
"\n10000000\nLet f = -12608235 - -12608235.18719743. ",
"Let x = 16.18719123 - f. Let o = 16 - x. What is o rounded to six dps?",
"\n0.000006\nSuppose 0 = l + l - 8. ",
"Suppose 0 = -l*f + 6*f + 6. ",
"Let u be (-3450)/((6/(-4))/f). ",
"Round u to the nearest one thousand.",
"\n-7000\nLet f = -104154 - -191154. ",
"What is f rounded to the nearest 10000?",
"\n90000\nLet l(d) = -1. ",
"Let o(v) = 70*v - 13. ",
"Let k(g) = 5*l(g) - o(g). ",
"Let f be k(-7). ",
"Let b = -1002 - f. What is b rounded to the nearest one thousand?",
"\n-2000\nLet b = -453 + 454.004. ",
"Round b to one decimal place.",
"\n1\nLet l = 8.99999744 + -9. ",
"What is l rounded to seven dps?",
"\n-0.0000026\nLet b "
] |
{
"pile_set_name": "DM Mathematics"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.037037037037037035,
0,
0,
0.014084507042253521,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.038461538461538464,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.024390243902439025,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.06666666666666667,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.043478260869565216,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.03571428571428571,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.020833333333333332,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.045454545454545456,
0,
0.038461538461538464,
0,
0,
0,
0,
0,
0,
0
] | 0.001494
| 5
|
[
"« ON STAGE » WINDOWS AT LE BON MARCHÉ RIVE GAUCHE\n\nThe new designs of Nicolas Ghesquière are celebrated in Parisian department store Le Bon Marché Rive Gauche with a dedicated window display entitled “The New Classics”, from Sept. 26th to Oct. 31st.",
"\n\nWith this short film discover how Louis Vuitton’s new windows at Le Bon Marché Rive Gauche are composed of digital installations, animations, videos and lighting, all taking inspiration from the Fall-Winter 2015 show.",
"\n\nUnder Le Bon Marché’s central glasshouse, you’ll also find an exhibition merging contemporary designs that have become Louis Vuitton icons, with archive trunks."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.004016064257028112,
0.0045662100456621,
0.012345679012345678
] | 0.006976
| 5
|
[
"This article was produced by the Deep State , a project of the Independent Media Institute.",
"\n\nIt is safe to say President Trump did not read the new National Intelligence Strategy of the United States (NIS) released on Tuesday.",
"\n\nWhich is a good thing.",
"\n\nThe document shows the intelligence community (meaning the 17 U.S. government intelligence agencies) has mobilized against the threat posed by President Trump, his incoherent impulses on war and peace, and his furtive machinations with Russia.",
"\n\nAdvertisement:\n\nMuch of the 36-page glossy report, issued by Director of National Intelligence Dan Coats, will be daunting to outsiders: boilerplate mission statements mixed with inter-office shoutouts, and deep dives on complex organizational issues.",
"\n\nBut the conclusions of the Intelligence Community (IC) (which some will call the “deep state”) are stated up front.",
"\n\nIf Trump had read them, he would have noticed his government’s 17 clandestine services had targeted his friends in Moscow, his business partners in the skyscraper hotel business.",
"\n\nAdvertisement:\n\nThe IC is on the record (again) as saying the threat of Russian penetration is not “fake news,” not a hoax, but a menace.",
"\n\n\"Radical Islamic terror\" redefined\n\nSome argue that the IC finding on Russian interference in the 2016 election was only signed by four of these 17 agencies.",
"\n\nAdvertisement:\n\nIn the new document, the other 13 agencies weigh in. ",
"They don’t disagree much: Russia is the emerging threat.",
"\n\nThe report opens:\n\n“Traditional adversaries will continue attempts to gain and assert influence, taking advantage of changing conditions in the international environment — including the weakening of the post-WWII international order and dominance of Western democratic ideals, increasingly isolationist tendencies in the West, and shifts in the global economy. ",
"These adversaries pose challenges within traditional, non-traditional, hybrid, and asymmetric military, economic, and political spheres. ",
"Russian efforts to increase its influence and authority are likely to continue and may conflict with U.S. goals and priorities in multiple regions.”",
"\n\nNote the absence in the above of the T-word. ",
"The threat of transnational terrorism — that hardy perennial of U.S. national security doctrine for 20 years — is not mentioned.",
"\n\nAdvertisement:\n\nNo mention of “radical Islamic terrorists,” which was once a go-to line for Trump.",
"\n\nThe 2019 IC has made it official: the “radical Islamic terrorists” have been replaced by “traditional adversaries.”",
"\n\nThis is a good thing, too. ",
"The idea that a network of religious fundamentalists, armed with rifles and homemade explosives, posed an existential threat to the American people was a Bush-Cheney meme that expired about the same time that Osama bin Laden departed.",
"\n\nAdvertisement:\n\nThe rise of Trump has coincided with — perhaps caused — the decline of counterterrorism as a declared U.S. policy priority.",
"\n\nThis is another good thing. ",
"This is not to praise Trump’s geopolitical acumen (of which he has none), merely to state the facts.",
"\n\nThe last 18 years of U.S. counterterrorism policy have made Americans (but not Europeans) marginally safer. ",
"It has cost us $5 trillion. ",
"It has embroiled our volunteer army and legion of contractors in undeclared wars in Afghanistan, Iraq, eastern Syria, Yemen and Somalia.",
"\n\nAdvertisement:\n\nThe benefits of these wars to the American people are far from clear. ",
"Yet, in all five theaters, victory is clearly impossible.",
"\n\nThe 2019 strategy document says, in effect, it’s time to move on.",
"\n\nThe question is where does U.S. intelligence go under a president of dubious loyalty and confirmed ignorance.",
"\n\nCold War II?",
"\n\nAdvertisement:\n\nIs it time to confront Russia? ",
"Is the National Intelligence Strategy a declaration of Cold War II?",
"\n\nRussia has been elevated as a threat, but it is not defined as an existential threat, as jihadist terrorism was from 2001 to 2018.",
"\n\nI think the IC — or, if you prefer, “the deep state” — is looking for legitimacy, which Trump threatens. ",
"Russia now seems more threatening to the U.S. intelligence community than Iran or jihadist terror. ",
"This is accurate but no reason for a new Cold War. ",
"It is a reason to reduce and eliminate Russia’s nuclear arsenal—and to do the same with our own nukes.",
"\n\nBottom line: Russia is the growing threat to the United States, according to the intelligence community. ",
"If the president says Russia is no threat, well, he doesn’t read U.S. intelligence reports, least of all this one.",
"\n\nAdvertisement:\n\nThis report is a sign that Trump is losing control of his government. ",
"Don’t take it from me. ",
"Listen to the insiders.",
"\n\nOn Twitter"
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.01098901098901099,
0.022222222222222223,
0,
0.004081632653061225,
0.003952569169960474,
0.008547008547008548,
0.005555555555555556,
0.007194244604316547,
0.006289308176100629,
0,
0,
0,
0,
0,
0,
0,
0.01,
0,
0,
0.01282051282051282,
0.0070921985815602835,
0,
0.01,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.014925373134328358,
0,
0.009345794392523364,
0,
0,
0,
0,
0,
0.011363636363636364,
0,
0,
0.08333333333333333
] | 0.005175
| 5
|
[
"In his latest book, “Why Science Does Not Disprove God,” mathematician Amir Aczel explains that science and religion should not be mutually exclusive. ",
"Here are five reasons you can embrace scientific progress while staying devoted to your faith."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.006622516556291391,
0
] | 0.003311
| 5
|
[
"As a base I used scary-chic black nail polish with billions of tiny red squares - Lubu Heels from China Glaze. ",
"Once again I had to use basic black polish underneath because it's very sheer on it's own.",
"\n\nOnce my base was dry I grabbed white polish Wild White Ways by Essence and thin nail art brush and painted ghost-y pattern. ",
"Then I added eyes and mouths with some black polish and sealed everything with top coat."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.009009009009009009,
0,
0.007936507936507936,
0
] | 0.004236
| 5
|
[
"Find Local\n\nGuide to Washington, DC: 5 Iconic DC Eateries\n\nSo you’ve trekked across the Mall, schlepped through the neighborhoods, and seen more monuments than Cleopatra. ",
"No trip to Washington is complete without a meal at one of these iconic restaurants, where food, history, and atmosphere combine to make them treasured local institutions.",
"\n\nBen’s Chili BowlAnyone can mix into the eclectic crowd at Ben’s, even though the spot’s regulars have included a host of celebrities, politicians, and activists (including Barack Obama and Bill Cosby) since Ben and Virginia Ali opened for business in 1958. “",
"The Bowl” has thrived as a local gathering place through the riots following Dr. King’s assassination and U Street’s transition from a crime-riddled corridor to a nightlife hotspot. ",
"Most Washingtonians will tell you: A thick shake and a chili half-smoke are as good at noon as they are at 4 AM, when last orders are taken on weekend nights. ",
"1213 U St., NW; 202-667-0909; benschilibowl.com.",
"\n\nGadsby’s TavernThis Revolutionary War-era restaurant in Old Town Alexandria is one of the oldest dining venues in Washington, with a building that dates back to 1785 and a guest list that has included George Washington and Thomas Jefferson. ",
"John Gadsby’s original tavern has been converted into a museum, but you can still try traditional dishes such as peanut soup and mixed-meat “pye” in the adjacent building, formerly the circa-1792 City Hotel. ",
"138 N. Royal St., Alexandria; 703-548-1288; gadsbystavernrestaurant.com.",
"\n\nMartin’s TavernEvery president (minus Obama) has visited this no-frills Georgetown corner pub since it opened in 1933, and one even popped the question here—at Martin’s, you can ask to sit in the “proposal booth,” where JFK asked Jackie Bouvier to marry him in 1953. ",
"The dark-wood interior and dim lighting make this a cozy hideaway in winter and a cool one in the summer, when diners also spill onto the outdoor patio. ",
"Order a traditional martini or Scotch to wash down classic pub fare such as corned beef and cabbage or meatloaf (Richard Nixon’s favorite). ",
"1264 Wisconsin Ave., ",
"NW; 202-333-7370; martins-tavern.com.",
"\n\nOld Ebbitt GrillThis Washington establishment has moved several times since it started life as a boarding house/tavern in 1856, but its latest location, near the White House, speaks to its history. ",
"Presidents Grant, Cleveland, and Theodore Roosevelt, among others, have supped at Ebbitt’s, and contributed their own artifacts in the meantime. ",
"Take a spin through the rooms to see heads of beasts supposedly shot by Roosevelt before settling at one of the four bars for what Ebbitt does best: stiff drinks and fresh, briny oysters. ",
"675 15th St., NW; 202-347-4800; ebbitt.com.",
"\n\nTabard InnA successful decade is a long time in hospitality years, which makes the Tabard Inn’s long run even more remarkable. ",
"The hotel has been a center of Washington social life since proprietor Marie Rogers opened the doors in 1922, hosting debutantes and soldiers, politicians and visiting dignitaries. ",
"The lounge is still a popular spot in winter for creative fireside cocktails, and the warm doughnuts at weekend brunch are a perennial must. ",
"1739 N St., NW; 202-331-8528; tabardinn.com."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0,
0,
0.019230769230769232,
0.01098901098901099,
0,
0.08163265306122448,
0.00823045267489712,
0.009615384615384616,
0.0410958904109589,
0.022304832713754646,
0,
0.007142857142857143,
0,
0.08108108108108109,
0.004975124378109453,
0.013793103448275862,
0.005291005291005291,
0.06976744186046512,
0,
0.0055248618784530384,
0,
0.09090909090909091
] | 0.021436
| 5
|
[
"Man who shot up Maryland hotel room gets 15 years in prison\n\nOriginally published February 22, 2017 at 1:56 pm\n\nIn this photo provided by Washington County, Md., Sheriff’s Office, Edward Clarence Schneider is shown in a police booking photo March 15, 2016, in Hagerstown, Md. The California truck driver has been sentenced to 15 years in prison for shooting up a Hagerstown, Maryland, hotel room, sending bullets into nearby rooms, while he was high on crystal meth. (",
"Washington County, Md., Sheriff’s Office via AP.)",
"\n\nShare story\n\nHAGERSTOWN, Md. (AP) — A man who shot up his hotel room in a hallucinatory, drug-induced panic, sending bullets through occupied rooms nearby, was sentenced Wednesday to 15 years in prison by a judge who told him, “You are a dangerous person.”",
"\n\nEdward Clarence Schneider, 56, of Los Molinos, California, acknowledged he drove his pickup truck across the country, armed with a 9 mm Glock pistol and fueled by crystal meth and beer, to visit a son on the East Coast. ",
"But Schneider said he never fired the weapon irresponsibly until the night of March 14 in a Hampton Inn in Hagerstown, about 70 miles west of Baltimore.",
"\n\nHallucinating that monsters were coming through the walls, Schneider fired four shots, police said. ",
"Two bullets tore through walls or doors into occupied rooms across the hall, and at least one traveled through the hotel’s exterior wall, investigators found.",
"\n\n“I never would have done it if I had not been high on crystal meth,” the apologetic fuel-tanker driver told Washington County Circuit Judge M. Kenneth Long.",
"\n\nLong rejected Assistant Public Defender Amy Taylor’s pleas for leniency and loudly scolded Schneider. ",
"Given the length of his cross-country trip and his bingeing behavior, Long said, “the real benefit is, nobody got shot up or killed before this particular escapade.”",
"\n\nDeputy State’s Attorney Joseph Michael said Schneider was lucky he himself wasn’t shot after pointing his gun at police who used a master key to enter his room.",
"\n\nSchneider pleaded guilty in November to one count each of first-degree assault and use of a firearm in a crime of violence.",
"\n\nLong suspended another 15 years of prison time, and ordered Schneider to pay about $5,000 in restitution to the hotel."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.002136752136752137,
0.04081632653061224,
0.003875968992248062,
0.0045045045045045045,
0.006578947368421052,
0,
0,
0.012658227848101266,
0.019230769230769232,
0,
0.012345679012345678,
0,
0
] | 0.007857
| 5
|
[
"export const pkgName = '@syncfusion/ej2-angular-circulargauge';\nexport const pkgVer = '^18.2.57';\nexport const moduleName = 'CircularGaugeModule';\nexport const themeVer = '~18.2.57';\n"
] |
{
"pile_set_name": "Github"
}
|
[
0.01092896174863388
] | 0.010929
| 5
|
[
"I guess my Secret Santa really dit her homework, figuring out something that I like given my likes/dislikes on Reddit. ",
"Fantastic gift! ",
"A combination of a board game and chocolate, what does a girl want more? ",
"I don't have a picture of me playing the game yet, but I will post one when that's done :-) Thanks for the gift, it's great and I'm really happy with it! ",
"I hope you got/will get a cool Secret Santa gift as well! ",
"Merry Xmas and Happy Newyear! ",
"Annemie"
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0,
0,
0,
0,
0,
0.03333333333333333,
0
] | 0.004762
| 5
|
[
"“Western central banks conceal their gold loans and swaps because information about them is ‘highly market-sensitive and accountability about them would hinder secret currency market interventions by central banks, according to a confidential report by the International Monetary Fund obtained this week by GATA. …",
"\n\n“This is, the explicit but secret policy of Western central banking toward gold is to deceive and manipulate markets, as GATA long has complained. …",
"\n\n“…they considered that the Special Data Dissemination Standard reservestemplate should not require the separate disclosure of such information but should instead treat all monetary gold assets, including gold on loan or subject to swap agreements, as a single data item.”",
"\n\nIn a remarkable Coup, the Gold Anti-Trust Action Committee (gata.org) has uncovered even more evidence that Major Central Banks and their Allied Banks are Systematically Suppressing the Prices of Gold and Silver.",
"\n\nThis Ongoing Price Suppression legitimizes and bolsters the Ostensible Value of their Treasury Securities and Fiat Currencies as stores and measure of value vis-à-vis Gold and Silver.",
"\n\nRemarkably, The BIS, The Central Bankers’ Bank, advertised in June, 2008 that one of its “Products” was “Interventions” in the Gold Market, as well as Currencies.",
"\n\nThis came as no surprise to the GATA (GATA uncovered the BIS advertisement) nor to Deepcaster, nor to others of us who have for years contended that a Cartel (Note 1 below) of Mega-Banks (including those who own the private for-profit U.S. Federal Reserve, and Key major Eurozone Bankers) is engaged in an ongoing campaign to suppress Gold and Silver Prices.",
"\n\nMarket Manipulation (and not just of the Precious Metals Markets as we shall see) provides a Challenge to Investors, and a Threat to their Wealth, but also an Opportunity to Profit and Protect Wealth, as we explain here.",
"\n\nFirst, reviewing several facets of, and Key Points in the History of Manipulation is crucial to understand the variety of effects, and how to Profit and Protect from them (and see e.g., Notes below). ",
"Consider…\n\n“There is a whole mammoth industry out there - the big banks, hedge funds etc. - ",
"whose whole purpose is to make money from money and the more you have in the first place the easier it is to do.",
"Not by producing anything useful, but through manipulation of prices through short selling in huge volumes to drive prices down, buying on the turn, allowing prices to rise back up, taking profits, then more short selling to drive prices down again and the cycle continues.",
"This works better in a bull market, which gold has been in for the past ten years or so.",
"\n\n“The amount of money that can be devoted to such exercises is almost beyond belief - and the regulators turn a blind eye to such blatant manipulation that works strongly against the small or even medium-sized investor in favour of the really big ones.",
"If there is anything that may bring the capitalist system crashing down it is, perhaps, the power of big money to rule all our lives…\n\n“Sometimes they get it wrong…as happened with the subprime mortgage fiasco (basically another financial institutions' manipulation affair).But do the people who caused the problem in the first place suffer - for the most part no.”",
"\n\nAnother Essential to understand is that The Fed is a private for-profit entity, owned by Global Mega-Banks, some of which are headquartered in Europe. ",
"David Stockman explains some of the Negative consequences of this Mega-Bank Cartel for Investor Citizens around the World.",
"\n\n“We have had a Fed engineered serial bubble, that has created the appearance of wealth, that has caused people to consume beyond their means through borrowing, and that has flushed the income and wealth of our society up to the top, as a result of the Fed turning the financial markets into a casino. ",
"These are pure casinos, they are not capital markets, they are not adding to the productive capacity of our economy, they simply are a bunch of robots trading with each other by the millisecond as a result of the Fed giving them zero cost overnight money, and giving them all kinds of hand signals on what to front-run.",
"\n\n“The Fed is destroying prosperity by funding demand that we can't support with earnings and production, causing massive current accounts deficits and the flow of funds overseas and the build up in China, OPEC and Korea of massive dollar reserves which is a totally unsustainable, unsupportable system, and we are coming near the edge of where that can continue to remain stable.”",
"\n\nDavid Stockman, Former Reagan OMB Director, December, 2010\n\nAmong the Mega-Banks holding huge Precious Metals and other Derivatives Positions are familiar names (JPM Chase held a Derivative Portfolio of some $70 Trillion Notional value in 2010).",
"\n\n“This report (Q1 2010 Bank Derivatives report – ed.) ",
"contains more evidence that a flood of paper gold and silver instruments are being used to divert investor capital away from the purchase of the actual physical metals in order to suppress prices…\n\n“Two bullion banks, JPM and HSBC, continue to dominate the precious metals derivatives market with positions that are outrageously oversized compared to the underlying metals markets…”\n\n“Manipulative Gold & Silver Derivative Positions Continue to Grow!”",
"\n\nAdrian Douglas, Marketforceanalysis.com, 6/26/10\n\nOther Negative Consequences of Massive Fed and other Mega-Bank QE (Money “Printing” and Credit Facilitation) were presciently identified by Bob Chapman (R.I.P.) and Warren Buffet.",
"\n\n“Banana Ben, like his equally pernicious predecessor, Easy Al, is trying to paper over declining US living standards by orchestrating asset bubbles. ",
"Ironically, Ben has driven the public into bonds and his QE 2.0 is now bursting the mother of all bubbles, the bond market.",
"\n\n“Soon Ben will be at his Rubicon. ",
"He must then either monetize everything or allow short rates to explode higher. ",
"This of course would precipitate the dreaded debt deflation that solons have tried to avert.”",
"\n\nBob Chapman, International Forecaster, 12/18/10\n\n“Charlie and I are of one mind in how we feel about derivatives and the trading activities that go with them:we view them as time bombs, both for the parties that deal in them and the economic system.”",
"\n\nWarren Buffet, February 21, 2003\n\nIndeed, Ben’s Fed has arrived at his Rubicon is reflected in the recent Fed decision to conduct Q.E. to Infinity. ",
"The Time Bomb to which Buffet refers has started to explode. ",
"And The Fed and other central Bankers are Massively Monetizing (i.e. printing/digitizing Money and Buying) Sovereign and other Debt, and thus creating another Massive Asset Bubble.",
"\n\nFor example, in the December, 2011 to February, 2012 period The ECB injected One trillion Euros’ into the International Economy on top of all the Fed QE and other injections. ",
"And it is this Immense and Ongoing QE which provides Great Profit Opportunities (see Notes) as well as Great Systemic Threats, as we explain.",
"\n\nBut it is important to understand that it is not just the P.M. Markets that are manipulated but Equities, Bond, and other Markets as well. ",
"Consider one example:\n\n“…All told, the Fed has bought $20 billion worth of Treasuries in this fashion, $11.15 of which it purchased last week alone. ",
"With this kind of weekly money pumping in place, Bernanke and pals don’t need to continue their “behind the scenes” games (like the options expiration week money pumps).",
"\n\n“Or do they?",
"\n\n“Unbeknownst to most investors, last week Ben Bernanke pumped an additional $11.05 BILLION into the system ON TOP of the $11.15 pumped via the POMOs. ",
"In plain terms, the Fed juiced the system by $20+ billion in a single week, bringing its liquidity pumps RIGHT BACK to QE 1 LEVELS.",
"\n\n“If you want to know why stocks have rallied in the last month (September, 2010; Ed.) ",
"this is THE reason. ",
"The economy isn’t improving and the European Crisis isn’t over. ",
"Nothing has improved. ",
"All that has happened is the Fed funneled money into the Primary Dealers who ramped the market.",
"\n\n“This is also the reason why the latest rally has almost entirely consisted of gap ups: the Primary Dealers ramp the market and then the computer trading programs take care of the rest.",
"\n\n“In plain terms, the market is being juiced higher, plain and simple. ",
"There is no fundamental reason for stocks to be rallying. ",
"Moreover, we have numerous signs of a top forming (mutual fund cash levels, insider selling to buying ratios, negative divergence, etc). ",
"Those who choose to buy into the farce of a rally are going to get what’s coming to them. ",
"And when they do, it won’t be pretty.”",
"\n\n“The Only Reason Stocks Have Rallied This Month”\n\nGraham Summers, Seeking Alpha, 9/28/10\n\nSee also “Markets Are So Rigged By Policy Makers That I Have No Meaningful Insights To Offer” 2/20/2012, Bob Janjuah, Nomura International Strategist.",
"\n\nIndeed, near the end of the Fall, 2008 Equities Market Crash (i.e. as of December 2008) there were about U.S. $548 Trillion in Notional OTC (i.e. Dark, Not Exchange Traded; thus traded mainly by Mega-Banks) Derivatives still outstanding worldwide.",
"\n\nYet over three and one-half years later (as of June 2012 – the latest BIS Report date) that total was at about $639 Trillion, which nearly equals the all-time pre-Crash (June, 2008) High of $684 Trillion, according to the Central Banker’s Bank, the Bank for International Settlements (www.bis.org, path: Statistics>Derivatives>Statistical Tables, Table 19).",
"\n\nClearly, a Conclusion that Systemic Risk (generated by Derivatives Exposure which existed, e.g., at AIG) has somehow been substantially lessened by the actions of the private for-profit Fed, the European Central Bank, the U.S. Government, or any other source, is wrongheaded.",
"\n\nGiven the Massive Size and Impact of the over $600 Trillion in Dark OTC Derivatives, Investing or Trading without addressing the issue of likely Cartel* Market Interventions is a recipe for disaster.",
"\n\nThus, we offer the following Overview and Update regarding The Interventional Universe to provide a Springboard for the Profits and Protection Strategy which we describe below. ",
"And in our 2011 and 2012 letters and Alerts, we offer Buy Recommendations designed to profit from impending Forecast Mega-Moves.",
"\n\nThis December, 2012 Article is the Thirteenth in a series of Deepcaster's work originally entitled \"Juiced Numbers\". ",
"It provides an Updated Overview and Summary of Market Intervention and Data Manipulation.",
"It reflects Analysis of key recent Releases from (and actions of) the BIS (Bank for International Settlements – The Central Banker’s Bank), BLS (Bureau of Labor Statistics) and The U.S. Federal Reserve, as well as Highlights of recent Interventions, and updates regarding The Cartel* “End Game.” ",
"For the sake of Brevity, we refer to our earlier articles in this series.",
"\n\nBailouts and Stimuli have afforded The Cartel a whole panoply of additional tools for Market Intervention which they did not possess even five years ago. ",
"These tools make tracking “The Interventionals” ever more challenging. ",
"In sum, this report provides even more evidence of increased Risk of Hyperstagflation and/or Systemic Collapse, and of the beginning of the attempted implementation of The Cartel’s Nefarious “End Game” (see “Saving Investments, Sovereignty, & Freedom from the Cartel ‘End Game’ (1/13/11) in the ‘Articles by Deepcaster’ cache at deepcaster.com).",
"\n\nMoreover, it provides evidence that the private for-profit Fed’s and its allied Mega-Banks’ Policies and Actions are the Primary Cause of the Economic and Financial Crises from which we suffer today.",
"\n\nTherefore, Deepcaster suggests below a Systemic Solution and a Strategy for profiting and protecting from the Interventional Regime’s actions and policies, and coping with its ‘End Game’ Strategy.",
"\n\nThe Covert Interventional Context – Overview\n\nDeepcaster is periodically asked to explain, and provide evidence for, our view that a U.S. Federal Reserve-led Cartel* (apparently composed of the U.S. Federal Reserve, Major Central Bankers and key Primary Dealers manipulates a wide variety of markets.[Apparently one “Operational Vehicle” through which The Cartel works is called “The Working Group on Financial Markets” established after the 1987 crash, and which is often informally and widely referred to as “The Plunge Protection Team” or PPT.]",
"\n\nEssential to maximizing profits and to avoiding losses is to recognize that the Fed-led Cartel (Note 1) manages two complementary Interventional Regimes – one quite public, and the other dark one, at least as powerful, covert.",
"Thus, a critical key to profit and loss is tracking the “Dark Interventionals” (which leave “Tracks” so to speak) as best one can, as well as the public ones.",
"\n\nMoreover, whether an Intervention is Overt or Covert is often a matter of degree.",
"Overt Intervention often has a Covert aspect (e.g. how was that TARP Bailout Money used and who received it?), ",
"and Covert ones are often difficult to detect, but nonetheless can often be tracked using publicly available information. ",
"Consider for example, the Graham Summers Quote above.",
"\n\nIt is important to note also that by “Cartel Intervention” we do not (usually) mean that the Cartel totally controls prices in any particular market, at all times. ",
"Various markets are affected in varying degrees, at varying times, by Cartel manipulation attempts.",
"\n\nIn markets such as the (relatively) Small Cap markets for Gold and Silver Bullion and especially Mining Stocks, Cartel manipulation attempts can have much more impact and are, at times, and for certain time periods, tantamount to control.",
"But although the Cartel’s ability to manipulate certain of these Markets has been significantly weakened in recent months for reasons we explain in our Spring, 2010 and later, Letters, Articles and Alerts (e.g. “Profit from a Weakening Cartel, July, 2010 Letter”) it is far from Insignificant – note the $90ish one day February 29, 2012 Takedown of the Gold Price e.g. Here we do not focus on the Overt Interventions since they are described at length in various mainstream financial publications.",
"\n\nCOVERT DIRECT INTERVENTION\n\nCovert Direct Intervention to manipulate a variety of markets appears to be accomplished primarily via three categories of vehicles:\n\n1)“Repo” Injections from The Fed (TOMO’s & POMO’s though POMO injections have become more widely reported recently)\n\n2)Over The Counter (OTC) Derivatives (reported at www.bis.org, see above)\n\n3)“Bailout” monies and Authorizations which Congress unwisely gave the Fed without requiring full disclosure or Oversight and, in particular, the TARP and TSLF (Term Securities Lending Facility) injections by The Fed, QE1, QE2, QE3 and the ongoing QE4, and other Vehicles such as the Primary Dealer Credit Facility (PDCF)\n\n4)Debt Monetization and Credit Facilitation by other Banks such as the ECB and its $1 Trillion Dec. 2011, February 2012 LTRO Operation.",
"\n\n[For fuller Explanation, see Deepcaster’s Article “PROFIT & PROTECTION FROM CARTEL INTERVENTION -- Including New Interventional Tools Description “ (12/23/09) in the ‘Articles by Deepcaster’ Cache at www.deepcaster.com and for details regarding Cartel use of Repos, Derivatives, Bailout Monies and other Vehicles see the July, 2009 Letter.]",
"\n\nThe Challenge:Determining the Impact of The Interventionals\n\nThe challenge for Investors and Forecasters is to determine where (i.e. in what Sector/s) and how (immediately, in increments, etc.) ",
"the Repo-backed funds and/or TARP/TSLF/Bailout QE/LTRO Funds and/or OTC Derivatives (“Interventional Funds”) etc. ",
"will be employed.",
"Deepcaster and those very few others, who monitor the Interventional Funding (and related Cartel and Allies’ actions) to the extent that is feasible, make educated Forecasts of where and how such funds are likely to be used based on patterns, tendencies, and judgments virtually all of which can be gleaned or inferred from publically reported information.",
"But no outsider can know for sure.",
"\n\nThose who doubt whether the Cartel has the capacity to manipulate the markets (and especially the larger markets like the multi-trillion dollar currency and bond markets) are invited to inform themselves about the U.S. Trillions plus of OTC Derivatives at Fed Primary Dealer J.P. Morgan Chase, or U.S. at Fed Primary Dealer Goldman Sachs and Fed Primary Dealer Citibank.",
"\n\nIndeed both Opportunities for and Threats to Investors are generated by Cartel Policies and the Massive OTC Derivatives positions. ",
"Consider:\n\n“With Key Mega-Financial Institutions around the World claiming in 2008 that they risked collapse if they were not bailed out, one must ask which ones benefited from the $15 Trillion plus Increase in Gross Market Value of their OTC Derivatives in the six months between June, 2008 and December, 2008 when the Equities Markets were crashing and Investors around the world were losing trillions? ",
"A logical Conclusion: Key Central Bankers and Favored Financial Institutions of The Fed-led Cartel*, quite possibly including the shareholders of the private for-profit U.S. Federal Reserve” (cf. ",
"BIS Table 19 cited above)”\n\nDeepcaster, May 29, 2009\n\nFor further details see our July, 2009, Letter, and 12/23/09 Article, Ibid.",
"\n\nINDIRECT MANIPULATION\n\nKey Statistics continue to be gimmicked by Official Sources including especially the USA and China much to the detriment of American Citizens and Investors Worldwide. ",
"One result of this is that the extent to which Mega-Bank Policies result in the confiscation or devaluation of Investor Wealth, is hidden.",
"\n\nInvestors and citizens-at-large are misled by Official Statistics which have been gimmicked, as shadowstats.com demonstrates.",
"All of the following Real Numbers for the USA are calculated by shadowstats.com, which calculates them according to traditional methods used in the 1980s, and early 1990s, before The Political Adjustments currently being utilized began in earnest.",
"\n\nAs the Real Numbers mentioned below demonstrate, our ongoing economic and financial crisis is not merely a “normal” business cycle Recession, but a System-Threatening Crisis.",
"Indeed, we are on the Threshold of a Hyperinflationary Depression. (",
"See below)\n\nKnowing these Real Numbers facilitated Deepcaster’s recommending “Opportunities in the Impending Perfect Storm” – the title of his early September, 2008 (pre-Crash) Article warning of the impending Crash (available in the Articles Cache at www.deepcaster.com) and his making five short (and subsequently quite profitable) recommendations to subscribers at about that time.",
"\n\nTo understand the motives and Goals for Fed and Cartel Policies and actions consider:\n\nA Brief Anatomy of the “U.S.” Federal Reserve\n\nIndeed, the Profit Motive lies behind Fed Actions.",
"Even the most causal student of Economic History knows that the United States’ Federal Reserve system, or “The Fed” as it is called, is not a U.S. government owned or controlled entity.",
"\n\nVarious international private banks, several of which are headquartered in Europe, own “shares” in the “United States” Fed. ",
"Moreover, this “United States” Fed leads a Cartel of Central and Private Banks* who collectively intervene in a wide variety of markets, as Deepcaster demonstrates here. ",
"All this is obviously quite financially incestuous.",
"\n\nThese International Bankers, acting through their “U.S.” Fed, profit both by creating money out of “thin air” and by collecting “interest” from U.S. Taxpayers on the Treasury Securities it has bought with U.S. Dollars (Federal Reserve Notes) it has created out of thin air. ",
"The Dean of the Newsletter Writers, Richard Russell, eloquently describes all this:\n\n“I still can’t get over the whole Federal Reserve racket…\n\n“The damnable result is that the Fed effectively controls the U.S. money supply. ",
"The Fed is …not even a branch of the U.S. government. ",
"The Fed is not mentioned in the Constitution of the United States. ",
"No Constitutional amendment was ever created or voted on to accept the Fed. ",
"The Constitutionality of the Federal Reserve has never come before the Supreme Court. ",
"The Fed is a private bank that keeps the U.S. forever in debt - - or I should say in increasing debt along with ever rising interest payments.”",
"\n\nRichard Russell, “Richards Remarks,” dowtheoryletters.com, 3/27/2007\n\n[Historical note:recall that President John F. Kennedy was unhappy with Fed policy and therefore caused U.S. Notes to be printed by the U.S. Treasury as Constitutionally Authorized and as a substitute for Federal Reserve Notes.",
"The issuance of these Notes ceased shortly after President Kennedy's Assassination.]",
"\n\nThe one conclusion that one can make from the foregoing is that the failure to take account of the power, force and pervasiveness of Fed-led Cartel Manipulations (i.e. The Interventionals) is an invitation to financial and investment suicide (see 12/23/09 Article, Ibid).",
"\n\nThe Interventional Regime – Motive, Causes and Consequences\n\nClearly, The Cartel has created a Financial System subject to ever-greater Systemic Risk.",
"Why?",
"\n\nHarry Schultz, the Eminence Grise of the Financial Newsletter writing fraternity, puts the question in this way when writing about the Financial Crisis –\n\n“what is the reason for this seemingly random monetary mess that multiplies its momentum every day?The answer, in one word, control.",
"The elite/insiders already have control of the financial system, but they wanted more, much more…and it was not random, it was planned.” (",
"emphasis added)\n\nIbid.",
"\n\nSince the cornerstone of The Cartel’s power lies in maintaining the legitimacy of their Fiat Currencies and Treasury Securities, the last thing they want is to have Gold, Silver and Tangible Assets held by investors to increasingly be seen as the Ultimate Stores and Measures of Value rather than their Fiat Currencies and Treasury Securities, in other words, as money. ",
"Thus they will continue attempts at Takedowns of Gold and Silver prices.",
"\n\nCautions for Investors and Traders Regarding Interventions\n\nWe issue a word of caution to our readers.",
"So long as The Cartel is in a very active interventional mode (e.g. as in taking down the price of Gold and Silver periodically) one should not be lured into thinking that the periodic up spikes in the prices of Gold and Silver necessarily present a \"breakout\" or a buying opportunity.",
"As a practical matter, technical breakouts are sometimes a lure designed to suck in more \"longs\" prior to a subsequent deeper Takedown. ",
"Consider the parabolic spike up in both Gold and Silver prices in the hours before the December 13, 2012 Takedown began.",
"\n\nHowever, the Cartel’s ability to sustain Takedowns has been considerably weakened recently largely because of increasing demand for delivery of Physical Metal (as opposed to “paper” e.g. Certain ETF shares) – See Below.",
"\n\nNonetheless, it is essential to study the Fundamentals and Technicals even though the Interventionals can temporarily override the Fundamentals and Technicals.",
"One must study the Fundamentals not only for all the usual reasons but also because Fundamentals somewhat constrain the timing and effectiveness of Interventions by The Cartel.",
"\n\nSimilarly, one should study the Technicals for all the usual reasons and, in addition, because it is in The Cartel’s interest to make its actions seem technically plausible in order to continue to “run mainly under the radar.",
"”It is not in The Cartel’s interest to make its Interventions any more visible than they already are.",
"Indeed, there is powerful evidence that The Cartel often uses and/or helps create technical patterns (aka “Painting the Charts”) which lure certain investors (such as hard asset investors) into getting “off sides” before Cartel actions such as taking down the price of Gold or Silver.",
"\n\nInterest Rate Manipulation & The Bond Market\n\n(See March, 2012 Update)\n\nSpecific Interventions\n\nFor a full discussion of the following Interventions and Tools, see Deepcaster’s July, 2008, December, 2008, July, 2009, December, 2009, July, 2010, December, 2011, and 2012 Jan-March Letters & Alerts posted in the ‘Letters’ & ‘Alerts’ Archive at www.deepcaster.com:\n\nIn particular it appears that The Private for-Profit Fed has used the Primary Dealer Credit Facility (PDCF) as a Prime Tool for manipulating Equities Markets as ‘Tyler Durden’ of Zerohedge.com describes while putting Taxpayers at risk:\n\n“Recently, Zero Hedge presented a snapshot analysis [1] of the various securities that made up the triparty repo agreement involving JPM, Lehman and the Fed. ",
"We uncovered numerous bankrupt companies' equities that were being pledged as collateral for what ultimately was taxpayer exposure.” (",
"emphasis added)\n\nSee also “Gaining from Gargantua” posted in ‘Articles by Deepcaster Cache’ at deepcaster.com. ",
"The Fed is responding to claims their money pumping is inflationary by proposing an ostensible “sterilized QE.” ",
"The Fed would digitized new money, buy long-dated Treasuries and Mortgage Bonds from banks and then sequester the money thus created by borrowing it back from the Banks. ",
"Of course, this in no way diminishes hyperinflation risks because, of all the massive amounts of hot money already in the system and continuing obligation of Taxpayers and Investors to pay interest on Treasuries and Bonds.",
"\n\nThus, the net-result of Fed/Treasury actions have been to increase long-term Systemic Risk, Hyperinflation Risk and consequent Taxpayer Liability rather than diminish it.",
"\n\nA key point is that the Fed/Treasury Actions of 2008, 2009, 2010, 2011, and 2012 are not long-term fixes. ",
"One reason they are not long-term fixes is that they “fix” a liquidity problem in a way that allows insolvent or nearly insolvent financial institutions to have liquidity that would allow certain normal but often deleterious operations (i.e. the continuation of even more lending based on borrowed liquidity) to continue temporarily.",
"Deepcaster has previously demonstrated the perils inherent in an economy increasingly relying on “borrowed liquidity” (i.e. debt) as a result of Fed policies rather than the traditional “earned liquidity” (i.e. savings) – see Deepcaster’s January, 2008 Letter.",
"\n\nThus, the “borrowed liquidity cure” is worse than the disease. ",
"At about 100% of GDP, the USA’s debt cannot ever reasonably be repaid nor the debt of other countries (e.g., Japan where debt is 220% of GDP, and several Eurozone countries where debt exceeds 100% of GDP). ",
"Thus, what The Fed and ECB have given us is a flawed Financial Band-Aid, and only a Taxpayer guaranteed Band-Aid for the Mega-Bankers (and profit for The Fed and its Shareholders which make more money as borrowing increases) at that. ",
"The FASB is complicit in this Deception because it continues to allow Mark to Myth rather than requiring Mark to Market accounting for Toxic Assets.",
"\n\nWe must not forget another fundamental factor which demonstrates that The Fed Actions are neither a long-term, nor an adequate, remedy. ",
"Consider McHugh’s comments regarding the Bail Out:\n\n“This Fed injection does nothing for households. ",
"And it is households that will determine if we avert depression or not. ",
"Consumer spending is 70 percent of GDP…Somebody ought to be arrested. ",
"What a heist.”",
"\n\nRobert McHugh, Tuesday, 3/11/2008 Briefing\n\nA Systemic Solution\n\nAllowing the International Economy to be based on a Fiat Reserve Currency managed by a Private For-Profit Central Bank, The Fed, is unsustainable.",
"No Fiat Currency Regime in history has ever survived indefinitely. ",
"Many have ended in Disaster.",
"\n\nSo The Systemic Solution is apparent.",
"We outline it as follows:\n\n1) Re-link the World’s Reserve Currency (still the U.S. Dollar though China is moving relentlessly to displace it with the Yuan) to Gold and Silver, the Monetary Metals which are both stores and measures of value, tangible value.",
"\n\nFailure to re-link currencies to Gold and Silver will allow a continuing massive and unsustainable inflation of the money supply and debt by the Fed and ECB-led Cartel (Note 1) of Central Bankers.",
"Unless such re-linking to Gold and Silver is accomplished, the U.S. Dollar and other Fiat Currencies are likely doomed in the long-run, with severely negative consequences, including a continuing de facto confiscation of the Wealth of Savers, Investors, and Retirees via (largely concealed) Fiat Currency Purchasing Power Degradation.",
"\n\nExcessive Money supply inflation ultimately leads to price inflation and until recently, the continuing extraordinary rate of increase in the money supply, (as a number of commentators have pointed out) is leading us down the path to a Hyperinflationary Depression.(c.f. ",
"shadowstats.com).And, more ominously, it is leading us to a Cartel attempt to implement The Cartel “End Game” (see “Saving Investments, Sovereignty, & Freedom from the Cartel ‘End Game’ (1/13/11) in the ‘Articles by Deepcaster’ cache at deepcaster.com).",
"\n\nBut the private for-profit U.S. Federal Reserve, ECB, and its Cartel Allies are not likely to give up their Fiat Currency and “un-backed” Treasury Securities that easily - - they are the source of its power.",
"The Fed and associated International Financial Allies will strenuously resist. ",
"See “Antidote to Globalists’ Threat to U.S. Dollar-Gold Investments (11/18/10)” in the ‘Articles by Deepaster’ Cache at www.deepcaster.com.",
"Thus,\n\n2) Legendary investor Jim Rogers recently neatly expressed The Solution to the problem of The Fed:“The Fed should be abolished and Chairman Bernanke should resign.",
"”(March, 2008, CNBC)\n\nAn excellent idea.",
"Indeed, The Fed is a private for-profit group of International Banks, whose main motivation is in providing profits for, and protecting the interests of, The International Bankers Cartel and favored institutions and parasites, not in serving the needs of U.S. citizens (or most citizens of other countries for that matter). ",
"Rep. Ron Paul and the nonprofit group Carrying Capacity Network (www.carryingcapacity.org) are among those advocating Auditing and Abolishing The Fed. ",
"And the Ongoing Agony of Eurozone Citizens, could, in the long run, be halted by returning to National Currencies backed by Gold and Silver.",
"\n\n3)To replace The Fed, and in order to protect ordinary citizens interests, the U.S. Congress should create a genuinely National Bank under the auspices of the U.S. Treasury Department as authorized by the U.S. Constitution.",
"That truly National Bank should be the money issuer for the United States, not the private for-profit Cartel of International Bankers known as The Fed.",
"\n\nThis is not such a radical idea.",
"President Kennedy caused U.S. Notes to be issued late in his presidency as a replacement for Federal Reserve Notes.[He was killed a few months after the issuance was started and the U.S. Notes disappeared from the market.]",
"\n\nThe Cartel End Game\n\nThus assuming The Cartel leaders know what they are doing what is their ‘End Game’? ",
"For details regarding The Cartel ‘End Game’ see “Investor Advantage: Revisiting the Cartel's 'End Game'” (3/6/09) and “Gold-Freedom versus The Cartel ‘End-Game’ & A Strategy for Surmounting It (09/23/10)” in the ‘Articles by Deepcaster’ cache at www.deepcaster.com.",
"\n\nA Strategy for Investors & Traders\n\nFortunately, the following considerations and guidelines help enable Investors to Profit and Protect in spite of Cartel Intervention, and particularly regarding Interventions in the Precious Metals Markets.",
"\n\nAlthough The Cartel is still Potent, it is significantly less potent than it was even a few months ago due primarily to:\n\na)The years-long efforts of the leaders and members of GATA in exposing Precious Metals Price Suppression\n\nb)The stunning Allegations that Major Gold Repositories do not have nearly as much Physical Gold (or Silver for that matter) they say they do. ",
"See the allegations regarding a major Gold ETF and the London Bullion Market Association in Deepcaster’s April 9, 2010 article (“Climacteric for The Cartel; Opportunity for Investors (04/09/10)” in the ‘Articles by Deepcaster’ Cache at www.deepcaster.com).",
"\n\nc)Increasing shortages of Physical Gold and especially Silver.",
"\n\nThese reports are doubtless leading Major Gold and Silver Investors to demand Delivery and possession of Physical Gold – a wise decision. ",
"But The Cartel is still the Biggest Player in many markets and, if the timing and market context are propitious, the Biggest Player makes Market Price temporarily (witness the 2/29/12 and 12/13/12 Takedowns). ",
"In addition, The Cartel has the advantage of de facto controlling the structure and regulation of various marketplaces and that is a tremendous advantage; just as the Hunt Brothers years ago discovered much to their dismay and misfortune, when they tried to corner the Silver Market.",
"\n\nThus we recommend that Investors follow their lead with a significant portion of the funds allocated to Precious Metals purchases committed to purchasing, and taking Personal Delivery of (no Bank Vaults, please), Physical Gold and Silver.",
"\n\nIndeed, because Physical held in one’s personal possession is so precious, some forms of it trade at as much as a 20% premium to the spot price of “paper” Gold.",
"\n\nBut not all forms of Physical are Equal, as it were. ",
"Some forms are much more liquid than others, and some are much more susceptible to counterfeiting, as e.g. by Tungsten-lacing.",
"\n\nDeepcaster has recommended Purchase of One Form of Physical Gold (and Silver), that is quite liquid, not easily susceptible to counterfeiting, and commands a considerable premium over the spot price of Paper Gold (and Paper Silver). ",
"See also Deepcaster’s Alert for the week ending March 9, 2012 and his December, 2010 Letter “Gold with Income; in the ‘Alerts & Letters Cache’ at www.deepcaster.com. (",
"See Notes 1 and 2.)",
"\n\nDo not give Short Shrift to Gold and Silver Miners and other Tangible Assets in sustained and relatively inelastic demand (see Alert & Buy Reco for week ending September 30, 2011 in ‘Alerts Cache at www.deepcaster.com.)",
"\n\nBut purchasing shares of these should be done with particular care, because, being “paper” (or, usually, electronic entries on some remote server) Miners shares are especially vulnerable to periodic Cartel attacks and Price Takedowns.",
"\n\nThus, they are most profitably accumulated near Interim Lows resulting from Cartel Interventions.",
"\n\nIn order to estimate these Interim Lows one needs not only to consider Fundamentals and Technicals, but also Interventionals.",
"\n\nNote: A major premise of The Strategy is that one can certainly remain a Hard Assets Partisan while at the same time insulating oneself from future Cartel Takedowns.",
"The following points provide an outline of The Strategy (particularly as applied to the Gold and Silver Markets) and are designed to help avoid such unpleasantness, or even possible financial ruin, in the future, as well as to profit along the way:\n\nAccumulate Hard Inflation Resistant Assets near the Interim Bottoms of Cartel- induced Takedowns (see Note 2, 3, and 4 below regarding specific recommendations). ",
"And for income for the short to medium term, acquire High Yield stock aiming for a Total Return exceeding Real Inflation (e.g. 9.82% in the U.S., see Note 5 below).",
"\n\nIn order to know when one is near the bottom of a Cartel-generated takedown, it is essential to take account of the Interventionals as well as the Technicals and Fundamentals.",
"\n\nFor example, regarding Gold & Silver, near such Interim Bottoms, accumulate a combination of the Physical Commodity (Deepcaster prefers “low premium to melt” bullion coins) and well-managed Juniors with large reserves.",
"The “Physical” and “Juniors” are for holding for the long-term as a Core Position.",
"\n\nThen, to the extent one wishes to speculate on the next “long” move, one should buy the major producers or long-term options on them.",
"These latter positions are for ultimate liquidation at the next Interim Top and are not for holding for the long-term.",
"\n\nIndeed, there will be a time when The Cartel price capping is ineffective and Gold & Silver make record moves upward.",
"The benefit of this Strategy is that one will likely be long in one’s speculative positions when this happens.",
"\n\nNear the next Interim Top, liquidate the long options and majors.",
"Again, in order to know when we are close to the next Interim Top, it is essential to monitor the Interventionals, as well as Fundamentals and Technicals.",
"\n\nFor Speculators, at that Interim Top, sell short or buy puts on Majors.",
"We re-emphasize the Majors as preferred vehicles for trading positions because such positions are more liquid and tend to be quite responsive to Cartel moves.",
"\n\nAt the next Interim Bottom, cover your shorts and liquidate your puts and go long again to begin the process all over again.",
"We emphasize that it is essential to consider the Interventionals as well as the Fundamentals and Technicals in order to determine the approximate Interim Tops and Bottoms.",
"\n\nFinally, Hard Assets Partisans have the opportunity to become involved in Political Action to diminish the power of the Central Banker Cartel.",
"It is truly outrageous that the average unsuspecting citizen, and prospective retiree, can and does put his hard won assets in Tangible Assets only to have those assets effectively de-valued by Cartel Takedowns and Fiat Currency Purchasing Power Degradation. ",
"This is extremely injurious to many average citizens in many countries who are saving for the rainy day or retirement and have their retirement and/or reserves effectively taken from them.",
"\n\nNote 1:*We encourage those who doubt the scope and power of Overt and Covert Interventions by a Fed-led Cartel of Key Central Bankers and Favored Financial Institutions to read Deepcaster’s December, 2009, Special Alert containing a summary overview of Intervention entitled “Forecasts and December, 2009 Special Alert: Profiting From The Cartel’s Dark Interventions - III” and Deepcaster’s July, 2010 Letter entitled \"Profit from a Weakening Cartel; Buy Reco; Forecasts: Gold, Silver, Equities, Crude Oil, U.S. Dollar & U.S. T-Notes & T-Bonds\" in the ‘Alerts Cache’ and ‘Latest Letter’ Cache at www.deepcaster.com. ",
"Also consider the substantial evidence collected by the Gold AntiTrust Action Committee at www.gata.org, including testimony before the CFTC, for information on precious metals price manipulation. ",
"Virtually all of the evidence for Intervention has been gleaned from publicly available records. ",
"Deepcaster’s profitable recommendations displayed at www.deepcaster.com have been facilitated by attention to these “Interventionals.” ",
"Attention to The Interventionals facilitated Deepcaster’s recommending five short positions prior to the Fall, 2008 Market Crash all of which were subsequently liquidated profitably.",
"\n\nNote 2: The Various Challenging Fundamental Economic, Financial and Political Forces operating on Key Markets lately have coalesced in a way to enable our High Probability Forecasts going into 2013.",
"\n\nBut these Challenges have provided a Superb Opportunity to invest in one “Fortress Asset” International company (one likely to profit regardless of the economic environment) on the cheap. ",
"And its Recent Yield is over 8% to boot.",
"\n\nRefusal to confront, or worse, Denial of, the consequences of Inevitable Coming Crises in an understandable response, but neither constructive nor profit-generating.",
"\n\nIndeed, a much more constructive response is to Profit from those Crises which one cannot ameliorate. ",
"Given the Crises which are surely coming, Profit Opportunities abound. ",
"And we have identified several in our December 2012 letter just posted in ‘Latest Letter & Archives’ at www.deepcaster.com.",
"\n\nAnd the Markets have provided one such Superb Opportunity recently. ",
"We issued a Buy Recommendation in that December letter.",
"\n\nNote 4: The world’s population increases by over 200,000/day. ",
"That’s net births over deaths. ",
"That’s one heck of a large potential market increase for Goods and Services, provided that the increasing population has the Purchasing Power to acquire the goods and services they need and want.",
"\n\nSince not all desired goods and services can be acquired, people have to prioritize. ",
"Thus some goods and services get bought and others not.",
"\n\nOur High Yield stock recommendation last week is for a company that makes a product essential to a Sector which is the very Top Priority when it comes to consumer purchasing decisions. ",
"And its recent yield is 8.8% to boot.",
"\n\nAnd perhaps best of all it is very well situated to be profitable regardless of general economic and financial conditions, including Hyperinflation.",
"\n\n[And for those very sophisticated Investors who like to sell covered calls or naked puts, the high option premiums on this High Yield Recommendation could make that very lucrative as well.]",
"\n\nAnd we issued a Markets Warning recently regarding a substantial impending Market Risk for Traders and Investors.",
"\n\nNote 5: There are Magnificent Opportunities in the Ongoing Crises of Debt Saturation, Rising Unemployment, Negative Real GDP growth, over 9.0% Real U.S. Inflation (per Shadowstats.com) and prospective Sovereign and other Defaults.",
"\n\nOne Sector full of Opportunities is the High-Yield Sector. ",
"Deepcaster’s High Yield Portfolio is aimed at generating Total Return (Gain + Yield) well in excess of Real Consumer Price Inflation (9.82% per year in the U.S. per Shadowstats.com).",
"\n\nThe content on this site is protected\nby U.S. and international copyright laws and is the property of GoldSeek.com\nand/or the providers of the content under license. ",
"By \"content\" we mean any\ninformation, mode of expression, or other materials and services found on GoldSeek.com.",
"\nThis includes editorials, news, our writings, graphics, and any and all other\nfeatures found on the site. ",
"Please contact\nus for any further information.",
"\n\nLive GoldSeek Visitor Map | Disclaimer\n\nThe views contained here may not represent the views of GoldSeek.com, its affiliates or advertisers. ",
"GoldSeek.com makes no representation, warranty or guarantee as to the accuracy\nor completeness of the information (including news, editorials, prices, statistics,\nanalyses and the like) provided through its service. ",
"Any copying, reproduction\nand/or redistribution of any of the documents, data, content or materials contained\non or within this website, without the express written consent of GoldSeek.com,\nis strictly prohibited. ",
"In no event shall GoldSeek.com or its affiliates be\nliable to any person for any decision made or action taken in reliance upon\nthe information provided herein."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.006369426751592357,
0,
0.003663003663003663,
0.009345794392523364,
0.010810810810810811,
0.018292682926829267,
0.013888888888888888,
0.018018018018018018,
0.0049504950495049506,
0,
0,
0,
0,
0,
0,
0.013071895424836602,
0.01639344262295082,
0.006600660066006601,
0.003134796238244514,
0.005249343832020997,
0.012145748987854251,
0,
0.004434589800443459,
0.03463203463203463,
0.006622516556291391,
0.008130081300813009,
0,
0,
0,
0.007936507936507936,
0.04666666666666667,
0.03278688524590164,
0.005555555555555556,
0.011299435028248588,
0.0070921985815602835,
0.014184397163120567,
0.006711409395973154,
0.005917159763313609,
0,
0.006578947368421052,
0.007633587786259542,
0.011363636363636364,
0,
0,
0,
0.010526315789473684,
0,
0,
0,
0,
0,
0,
0.01652892561983471,
0.004016064257028112,
0.011142061281337047,
0.018050541516245487,
0.009950248756218905,
0.01675977653631285,
0.015625,
0,
0.011235955056179775,
0.016891891891891893,
0,
0.01282051282051282,
0,
0.008695652173913044,
0.009950248756218905,
0,
0.009107468123861567,
0.013157894736842105,
0.006329113924050633,
0.024096385542168676,
0.018018018018018018,
0.00819672131147541,
0,
0.006024096385542169,
0.010101010101010102,
0.0125,
0.004024144869215292,
0.013513513513513514,
0.011695906432748537,
0.01020408163265306,
0.02631578947368421,
0,
0.0028089887640449437,
0,
0.013440860215053764,
0.007518796992481203,
0.0024691358024691358,
0.01020408163265306,
0.023255813953488372,
0.005208333333333333,
0.014492753623188406,
0.007874015748031496,
0.004048582995951417,
0,
0,
0.0026041666666666665,
0.021505376344086023,
0.005405405405405406,
0.007936507936507936,
0.011764705882352941,
0,
0.014492753623188406,
0.017777777777777778,
0.018518518518518517,
0.014925373134328358,
0.013157894736842105,
0.023255813953488372,
0.006993006993006993,
0.020066889632107024,
0.011904761904761904,
0.01098901098901099,
0.013157894736842105,
0,
0.010380622837370242,
0,
0,
0.016129032258064516,
0.013888888888888888,
0,
0.0035087719298245615,
0.007352941176470588,
0,
0.013574660633484163,
0.006211180124223602,
0.011363636363636364,
0.004405286343612335,
0.009900990099009901,
0.007042253521126761,
0.009198423127463863,
0,
0.018018018018018018,
0.017857142857142856,
0.0058823529411764705,
0.0045045045045045045,
0.011627906976744186,
0.009259259259259259,
0,
0.0038461538461538464,
0,
0,
0.02564102564102564,
0.013513513513513514,
0.007246376811594203,
0.009900990099009901,
0,
0,
0,
0.014084507042253521,
0.014925373134328358,
0,
0,
0.00390625,
0.015151515151515152,
0.005988023952095809,
0,
0.015810276679841896,
0.014354066985645933,
0.02531645569620253,
0.007194244604316547,
0.01764705882352941,
0.025,
0.009259259259259259,
0.019867549668874173,
0.007142857142857143,
0.022222222222222223,
0.019867549668874173,
0,
0.013513513513513514,
0.009345794392523364,
0.007547169811320755,
0.012295081967213115,
0.0053475935828877,
0.015625,
0.015625,
0.007142857142857143,
0.009569377990430622,
0.0035335689045936395,
0.008333333333333333,
0,
0.01818181818181818,
0,
0.00425531914893617,
0.011976047904191617,
0,
0.013574660633484163,
0.00847457627118644,
0.020202020202020204,
0.007874015748031496,
0.005988023952095809,
0,
0,
0.011299435028248588,
0.00909090909090909,
0,
0,
0.00847457627118644,
0.01680672268907563,
0,
0.014925373134328358,
0.012987012987012988,
0.0410958904109589,
0.012658227848101266,
0.007936507936507936,
0.01744186046511628,
0.006944444444444444,
0.007722007722007722,
0,
0.011326860841423949,
0.01015228426395939,
0.010309278350515464,
0.007407407407407408,
0,
0.005,
0.005263157894736842,
0,
0.005988023952095809,
0,
0.014084507042253521,
0.008130081300813009,
0.014285714285714285,
0,
0,
0,
0.010256410256410256,
0,
0,
0,
0,
0,
0,
0.008695652173913044,
0.008620689655172414,
0,
0.005494505494505495,
0.005952380952380952,
0.008928571428571428,
0,
0,
0.006993006993006993,
0,
0.004672897196261682,
0
] | 0.008181
| 5
|
[
"\n982 So.2d 1 (2007)\nS.D.S. AUTOS, Inc., d/b/a Lexus of Jacksonville (\"Lexus\"), Appellant,\nv.\nFrancis A. CHRZANOWSKI, Kimberly M. Chrzanowski, Alfred G. Jonas, Harold Gregory Forrest and Rita B. Forrest, both individually and on behalf of all others similarly situated, Appellees.",
"\nBrumos Motor Cars, Inc. (\"Brumos\"), Appellant,\nv.\nCarolyn C. Montgomery, Cleophus M. Howell, Alfred G. Jonas and Heidi H. Jonas, both individually and on behalf of all others similarly situated, Appellees.",
"\nNos. ",
"1D06-5664, 1D06-5662.",
"\nDistrict Court of Appeal of Florida, First District.",
"\nNovember 26, 2007.",
"\nRehearing Denied May 16, 2008.",
"\nChristopher J. Greene and Gregory Williamson of Brant, Abraham, Reiter, McCormick & Greene, P.A., Jacksonville, for Appellant.",
"\nJ. Michael Lindell and Roger K. Gannam of Lindell, Farson & Pincket, P.A., Jacksonville, and Bryan S. Gowdy and John S. Mills of Mills & Creed, P.A., Jacksonville, for Appellees.",
"\nPER CURIAM.",
"\nIn this non-final appeal, appellants seek reversal of the trial court's certification under Florida Rule of Civil Procedure 1.220(b)(2) and (b)(3) of two classes of consumers claiming violations of the Florida Deceptive and Unfair Trade Practices Act (FDUTPA), section 501.201 et seq., ",
"Florida Statutes (2005). ",
"The trial court entered two certification orders in separate cases involving substantially identical operative facts, which appellants separately appealed. ",
"The appeals have been consolidated.",
"\nFinding no abuse of discretion in the trial court's decision to certify the classes, we affirm the certification orders. ",
"See Davis v. Powertel, Inc., 776 So.2d 971, 974 (Fla. 1st DCA 2000) (holding that, in a class action for damages under FDUTPA, class certification does not require proof of each individual putative class member's actual reliance on an alleged deceptive act because an actionable deceptive trade practice is one which is \"likely to deceive a consumer acting reasonably in the same circumstances,\" not one upon which any individual plaintiff \"actually relied\").",
"\nAffirmed.",
"\nBARFIELD, WOLF, and BENTON, JJ., ",
"concur.",
"\n"
] |
{
"pile_set_name": "FreeLaw"
}
|
[
0.021505376344086023,
0.024271844660194174,
0.16666666666666666,
0,
0,
0,
0,
0.031496062992125984,
0.027932960893854747,
0,
0.010452961672473868,
0,
0,
0,
0,
0.004357298474945534,
0,
0.058823529411764705,
0,
0
] | 0.017275
| 5
|
[
"The Dread and Fear of Kings, SGA, McShep (PG)\n\nTitle: The Dread and Fear of KingsAuthor:valderysTeam: WarPrompt: Coup de GrâcePairing: McKay/SheppardRating: PGWarnings: Angsty, some violence.",
"Notes: Written for mcshep_match.",
"Summary: They were used to odd happenings and sudden danger, even on Atlantis itself. ",
"A woman's voice calling John to come away? ",
"That wasn't even a blip on the scanner - until John began to listen to it."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.020942408376963352,
0,
0,
0.023255813953488372,
0
] | 0.00884
| 5
|
[
"Emergence of a new group CTX-M enzyme in Romania and risk factors for extended spectrum beta-lactamase producing E. coli infections.",
"\nAntibiotic resistance rates in E. coli are rapidly rising, with worrisome aspects especially regarding community--acquired resistance to third- and fourth-generation cephalosporins and fluoroquinolones. ",
"The objectives of this prospective cohort study was to determine the resistance profile of E. coli for two categories of patients (< 49 years and > or = 50 years), risk factors for ESBL positivity and to investigate the molecular epidemiology of ESBL type CTX-M enzymes. ",
"A total of 885 strains of E. coli were isolated in the Infectious Diseases Hospital laboratory between June 2008 and June 2011 and E. coli resistance due to ESBL production was noted in 17% of cases. ",
"We found that previous therapy with cephalosporins, hospitalization and urinary catheter were risk factors for ESBL positivity. ",
"We noted significant differences concerning resistance rate between patients under 49 years and aged more than 50 years for ciprofloxacin (19% and 38%, respectively, p = 0,0001), for gentamicin (15% and 23%, p = 0,008), ceftazidime (15% and 24%, p = 0,001) and ESBL positivity (14% and 20%, p = 0.009). ",
"This study highlights the predominance of CTX-M producing strains (92.5% of ESBLs-positive E. coli harboured bla CTX-M genes); CTX-M-15 producing isolates were the most common, accounting for 96% of isolates. ",
"Only 4% were belonging to CTX-M group-9, an emerging ESBL group which is newly described in Romania."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0.007575757575757576,
0,
0.0036900369003690036,
0.005,
0,
0,
0.014354066985645933,
0.01
] | 0.005077
| 5
|
[
"September: The OECD urged America's central bank to insure against the prospect of recession with an immediate cut in interest rates as it emerged that the crash in the US housing market had left real-estate activity at its weakest since the economy was brought to a halt by the terrorist attacks on 9/11\n\nMarch: Panic-stricken financial markets looked for a full one-point cut in interest rates from the US Federal Reserve, amid fears that the collapse of the investment bank Bear Stearns could be the trigger for a global financial and economic meltdown\n\nApril: Royal Bank of Scotland urged its shareholders to support a record-breaking £12bn cash call - which they unanimously did - aimed at strengthening its capital position, weakened by a £5.9bn writedown on instruments related to the credit crunch\n\nFebruary: Sir Fred Goodwin, the former chief executive who took the Royal Bank of Scotland to the brink of collapse, is refusing to give back his £16m pension despite massive political pressure for the banker to abandon the £693,000-a-year payout"
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.005698005698005698
] | 0.005698
| 5
|
[
"OTTAWA—Prime Minister Stephen Harper stepped into the Senate spending controversy Wednesday, defending Senator Pamela Wallin against mounting questions about her travel expenses, even though an outside audit of her claims is ongoing.",
"\n\nHarper was forced to answer for his high-profile Senate appointee against NDP attacks after revelations her expenses were under the microscope.",
"\n\nThe prime minister told the Commons that he had personally reviewed Wallin’s travel claims and that they appeared in line with other politicians.",
"\n\n“I have looked at the numbers. ",
"Her travel costs are comparable to any parliamentarian travelling from that particular area of the country over that period of time,” Harper said.",
"\n\nWallin, who represents Saskatchewan in the Senate, was swept up in the spending controversy after revealing that outside auditors were reviewing her travel expenses.",
"\n\nHowever, a key official in the upper chamber says Canadians may never know the outcome of that independent probe being done by Deloitte.",
"\n\n“We’re not interested in making those public,” said Conservative Senator David Tkachuk, chairman of the Senate’s committee on internal economy, budgets and administration.",
"\n\n“If there’s something that will have some impact on the public business, then they will be public. ",
"Otherwise, there’s no point to it,” he said.",
"\n\nTkachuk said the audit is underway and that he didn’t know what the results were. ",
"Asked if Wallin had repaid any expenses, he replied, “no.”",
"\n\n“I don’t have an agenda on Senator Wallin. ",
"Senator Wallin is a distinguished senator and there’s an audit being done on her expenses. ",
"That’s all there is too it,” he said in an interview.",
"\n\nWhile Wallin claims to live in Saskatchewan, published travel expenses suggest she may not be visiting very often.",
"\n\nOver a two-year period ending last November, Wallin claimed only $29,423 for expenses to travel between Ottawa and Saskatchewan, a category billed as “regular” travel. ",
"In one quarter, she claimed no expenses for Saskatchewan trips and in another she claimed just $90.",
"\n\nBy comparison, some of her Senate colleagues from Saskatchewan have claimed upwards of $200,000 for travel back to the prairie province.",
"\n\nHowever, Wallin is one of the big spenders for travel to other parts of Canada and around the globe, claiming $321,027.",
"\n\nSenate communications staff refused repeated requests by the Star to get clarification on the expense categories.",
"\n\nWallin blames the Senate accounting rules, saying only direct flights between Ottawa and a senator’s home province are counted as regular travel. ",
"Instead, she says she often flies to Saskatchewan from other parts of the country, including Toronto where she owns a condo.",
"\n\n“If I fly through Toronto and overnight there en route to Saskatchewan it is booked as ‘other’ travel. ",
"That why numbers are distorted,” Wallin said in a statement to the Star.",
"\n\nLoading... Loading... Loading... Loading... Loading... Loading...\n\nWallin suggested that Deloitte has not asked her to repay any money and that had she offered. ",
"But she did not respond to questions about whether she had already repaid money directly to the government.",
"\n\nIn the Commons, NDP ethics critic Charlie Angus raised questions about whether Wallin’s primary residence is actually in Saskatchewan, as required by Senate rules, or Toronto.",
"\n\n“The growing Senate scandal now includes Pamela Wallin, who racked up massive travel bills, often to Toronto, when she claims to live in a cabin at Fishing Lake, Saskatchewan,” Angus told MPs.",
"\n\n“I looked at the land title for that cabin and it lists as its owner Ms. Pamela Wallin of Palmerston Avenue in Toronto,” Angus told MPs. “",
"Is she the senator for Saskatchewan or for the Annex?”",
"\n\nThree other Senators are also being investigated by Deloitte for claiming housing expenses in the nation’s capital.",
"\n\nConservative Senator Mike Duffy, who represents Prince Edward Island, Independent Patrick Brazeau (Quebec) and Liberal Mac Harb (Ontario) have claimed their principal residence is outside the national capital region, entitling them to housing allowances of up to $22,000 a year.",
"\n\nNDP Leader Thomas Mulcair said Wednesday it’s time the RCMP looked at the questionable spending practices by a handful of senators.",
"\n\n“Any time there’s a question of breach of law, it’s to be left to the police, of course,” Mulcair said after his party’s weekly caucus meeting.",
"\n\n“We think that in the interest of all Canadians, we have to reassure the public that the law applies equally to everyone.”",
"\n\nHe said he doubts the public will “ever get a straight answer” from the Senate, another reason why what he called “a relic from another era” should scrapped altogether.",
"\n\nWith files from Tonda MacCharles\n\nRead more about:"
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.012875536480686695,
0.013793103448275862,
0.013605442176870748,
0,
0,
0.011976047904191617,
0.007246376811594203,
0.011560693641618497,
0,
0,
0.011904761904761904,
0.017241379310344827,
0.022222222222222223,
0.01098901098901099,
0,
0.008620689655172414,
0.0058823529411764705,
0,
0.007246376811594203,
0.008264462809917356,
0.017391304347826087,
0.006756756756756757,
0,
0,
0.027777777777777776,
0.006134969325153374,
0,
0.02824858757062147,
0.010309278350515464,
0.007142857142857143,
0.018518518518518517,
0.008547008547008548,
0.014285714285714285,
0.007518796992481203,
0.006896551724137931,
0,
0.0058823529411764705,
0.019230769230769232
] | 0.00916
| 5
|
[
"Consultants muscle into digital\n\n30 October 2013\n\nLONDON: Professional services firms such as Deloitte, Accenture and Booz & Co are diversifying into digital, threatening a business area that up until now has been the preserve of marketing and advertising agencies.",
"\n\nThese consultants have noted the roles of marketing and technology departments moving closer together, driven by factors like big data, social media and mobile. ",
"The calculation is that they can become a one-stop shop for their clients' needs in these fields.",
"\n\nThe most recent example of this development was Deloitte's purchase of a social media marketing agency in Seattle and a web developer in Brisbane. ",
"Prior to that Booz had launched a digital unit while Accenture had acquired a design consultancy in London.",
"\n\n\"You're seeing the role of chief marketing officer and chief information officer converging, and the emergence of a chief digital officer,\" Mike Brinker, US head of Deloitte Digital, told the Financial Times.",
"\n\nWhile the strategy may make sense for one part of a firm such as Deloitte, it also raises some potentially awkward questions in others, notably its traditional auditing function.",
"\n\nSir Martin Sorrell, chief executive of advertising and media group WPP, described Deloitte as a \"frenemy\" in the area of data and digital, but added it needed to be careful as the company also audited WPP's accounts \"It does raise the question from our point of view of who we're dealing with,\" he added.",
"\n\nBeyond such immediate practical issues, observers on both sides of the fence have noted that there are often wide cultural differences between the archetypal strait-laced consultant and laid back creative.",
"\n\n\"If you mix the DNA of a small creative company and the DNA of a big company, what you find is the creatives get frustrated and leave,\" said Alwin Magimay, head of digital and analytics at KPMG UK.",
"\n\nHis comments were echoed by Peter Stein, global chief executive of interactive agency Razorfish. \"",
"Their legacy processes, methodologies and culture are diametrically opposed to this [creative] way of working,\" he said.",
"\n\nBut Anatoly Roytman, managing director of Accenture's interactive unit in Europe, the Middle East and Africa, argued that digital was about customer experience. \"",
"It's not just about creative, but about technology and process,\" he stated, adding that Accenture would still work with agencies on complex design work, advertising and branding."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.007547169811320755,
0,
0,
0.006711409395973154,
0.018691588785046728,
0.014285714285714285,
0.005555555555555556,
0.013071895424836602,
0,
0.010050251256281407,
0.01,
0,
0.012195121951219513,
0
] | 0.007008
| 5
|
[
"To the Western World\n\nTo the Western World is a documentary film directed by Margy Kinmonth. ",
"Narrated by John Huston and starring Niall Tóibín, Patrick Laffan, Tom Hickey (actor) & Brendan Cauldwell, the film charts the journey of John Millington Synge and Irish artist Jack Butler Yeats through Connemara in 1905. ",
"The two men were sent by the Manchester Guardian to report on the 'Congested Districts', the most poverty-stricken and over populated parts of the West of Ireland. ",
"The film is the first dramatisation of the original articles, which disappeared for decades after their publication. ",
"On their journey they described the economic conditions, poverty, unemployment, dress and lie-stock. ",
"\n\nThe film has previously won the European Community Award and was nominated for the Fiction Award at the Cork Film Festival.",
"\n\nScreenings \n2009 Irish Film Institute and Dublin Theatre Festival’s “Unsung Synge”\n\nReferences\n\nExternal links \n \n\nCategory:1981 films"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.021505376344086023,
0.03153153153153153,
0.006097560975609756,
0,
0,
0.008,
0.014705882352941176
] | 0.011691
| 5
|
[
"/*******************************************************************************\n * * Copyright 2013 Impetus Infotech.",
"\n * *\n * * Licensed under the Apache License, Version 2.0 (the \"License\");\n * * you may not use this file except in compliance with the License.",
"\n * * You may obtain a copy of the License at\n * *\n * * http://www.apache.org/licenses/LICENSE-2.0\n * *\n * * Unless required by applicable law or agreed to in writing, software\n * * distributed under the License is distributed on an \"AS IS\" BASIS,\n * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.",
"\n * * See the License for the specific language governing permissions and\n * * limitations under the License.",
"\n ******************************************************************************/\npackage com.impetus.client.couchdb.datatypes.tests;\n\nimport java.math.",
"BigDecimal;\nimport java.util.",
"List;\n\nimport javax.persistence.",
"EntityManager;\nimport javax.persistence.",
"EntityManagerFactory;\nimport javax.persistence.",
"Persistence;\nimport javax.persistence.",
"Query;\n\nimport junit.framework.",
"Assert;\n\nimport org.junit.",
"After;\nimport org.junit.",
"Before;\nimport org.junit.",
"Test;\n\nimport com.impetus.client.couchdb.datatypes.entities.",
"StudentCouchDBBigDecimal;\nimport com.impetus.kundera.persistence.",
"EntityManagerFactoryImpl;\n\npublic class StudentCouchDBBigDecimalTest extends CouchDBBase\n{\n\n private EntityManagerFactory emf;\n\n @Before\n public void setUp() throws Exception\n {\n emf = Persistence.createEntityManagerFactory(pu);\n super.setUpBase(((EntityManagerFactoryImpl) emf).getKunderaMetadataInstance());\n }\n\n @After\n public void tearDown() throws Exception\n {\n emf.close();\n super.dropDatabase();\n\n }\n\n @Test\n public void testDummy()\n {\n\n }\n\n // @Test\n public void testExecuteUseSameEm()\n {\n testPersist(true);\n testFindById(true);\n testMerge(true);\n // testFindByQuery(true);\n // testNamedQueryUseSameEm(true);\n testDelete(true);\n }\n\n // @Test\n public void testExecute()\n {\n testPersist(false);\n testFindById(false);\n testMerge(false);\n // testFindByQuery(false);\n // testNamedQuery(false);\n testDelete(false);\n }\n\n public void testPersist(boolean useSameEm)\n {\n EntityManager em = emf.createEntityManager();\n\n // Insert max value of BigDecimal\n StudentCouchDBBigDecimal studentMax = new StudentCouchDBBigDecimal();\n studentMax.setAge((Short) getMaxValue(short.class));\n studentMax.setId((BigDecimal) getMaxValue(BigDecimal.class));\n studentMax.setName((String) getMaxValue(String.class));\n em.persist(studentMax);\n\n // Insert min value of BigDecimal\n StudentCouchDBBigDecimal studentMin = new StudentCouchDBBigDecimal();\n studentMin.setAge((Short) getMinValue(short.class));\n studentMin.setId((BigDecimal) getMinValue(BigDecimal.class));\n studentMin.setName((String) getMinValue(String.class));\n em.persist(studentMin);\n\n // Insert random value of BigDecimal\n StudentCouchDBBigDecimal student = new StudentCouchDBBigDecimal();\n student.setAge((Short) getRandomValue(short.class));\n student.setId((BigDecimal) getRandomValue(BigDecimal.class));\n student.setName((String) getRandomValue(String.class));\n em.persist(student);\n em.close();\n }\n\n public void testFindById(boolean useSameEm)\n {\n EntityManager em = emf.createEntityManager();\n\n StudentCouchDBBigDecimal studentMax = em.find(StudentCouchDBBigDecimal.class, getMaxValue(BigDecimal.class));\n Assert.assertNotNull(studentMax);\n Assert.assertEquals(getMaxValue(short.class), studentMax.getAge());\n Assert.assertEquals(getMaxValue(String.class), studentMax.getName());\n\n if (!",
"useSameEm)\n {\n em.close();\n em = emf.createEntityManager();\n }\n StudentCouchDBBigDecimal studentMin = em.find(StudentCouchDBBigDecimal.class, getMinValue(BigDecimal.class));\n Assert.assertNotNull(studentMin);\n Assert.assertEquals(getMinValue(short.class), studentMin.getAge());\n Assert.assertEquals(getMinValue(String.class), studentMin.getName());\n\n if (!",
"useSameEm)\n {\n em.close();\n em = emf.createEntityManager();\n }\n StudentCouchDBBigDecimal student = em.find(StudentCouchDBBigDecimal.class, getRandomValue(BigDecimal.class));\n Assert.assertNotNull(student);\n Assert.assertEquals(getRandomValue(short.class), student.getAge());\n Assert.assertEquals(getRandomValue(String.class), student.getName());\n em.close();\n }\n\n public void testMerge(boolean useSameEm)\n {\n EntityManager em = emf.createEntityManager();\n StudentCouchDBBigDecimal student = em.find(StudentCouchDBBigDecimal.class, getMaxValue(BigDecimal.class));\n Assert.assertNotNull(student);\n Assert.assertEquals(getMaxValue(short.class), student.getAge());\n Assert.assertEquals(getMaxValue(String.class), student.getName());\n\n student.setName(\"Kuldeep\");\n em.merge(student);\n if (!",
"useSameEm)\n {\n em.close();\n em = emf.createEntityManager();\n }\n StudentCouchDBBigDecimal newStudent = em.find(StudentCouchDBBigDecimal.class, getMaxValue(BigDecimal.class));\n Assert.assertNotNull(newStudent);\n Assert.assertEquals(getMaxValue(short.class), newStudent.getAge());\n Assert.assertEquals(\"Kuldeep\", newStudent.getName());\n }\n\n public void testFindByQuery(boolean useSameEm)\n {\n findAllQuery();\n findByName();\n findByAge();\n findByNameAndAgeGTAndLT();\n findByNameAndAgeGTEQAndLTEQ();\n findByNameAndAgeGTAndLTEQ();\n findByNameAndAgeWithOrClause();\n findByAgeAndNameGTAndLT();\n findByNameAndAGEBetween();\n // findByRange();\n }\n\n private void findByAgeAndNameGTAndLT()\n {\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n int count;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.age = \" + getMinValue(short.class)\n + \" and s.name > Amresh and s.name <= \" + getMaxValue(String.class);\n q = em.createQuery(query);\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(1, students.size());\n count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n Assert.assertEquals(getMinValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getMinValue(short.class), student.getAge());\n Assert.assertEquals(getMinValue(String.class), student.getName());\n count++;\n\n }\n Assert.assertEquals(1, count);\n em.close();\n\n }\n\n private void findByRange()\n {\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.id between ?",
"1 and ?",
"2\";\n q = em.createQuery(query);\n q.setParameter(1, getMinValue(BigDecimal.class));\n q.setParameter(2, getMaxValue(BigDecimal.class));\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(2, students.size());\n int count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n if (student.getId().equals(getMaxValue(BigDecimal.class)))\n {\n Assert.assertEquals(getMaxValue(short.class), student.getAge());\n Assert.assertEquals(\"Kuldeep\", student.getName());\n count++;\n }\n else if (student.getId().equals(getMinValue(BigDecimal.class)))\n {\n Assert.assertEquals(getMinValue(short.class), student.getAge());\n Assert.assertEquals(getMinValue(String.class), student.getName());\n count++;\n }\n }\n Assert.assertEquals(2, count);\n em.close();\n }\n\n private void findByNameAndAgeWithOrClause()\n {\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n int count;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.name = Kuldeep and s.age > \"\n + getMinValue(short.class);\n q = em.createQuery(query);\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(1, students.size());\n count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n Assert.assertEquals(getMaxValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getMaxValue(short.class), student.getAge());\n Assert.assertEquals(\"Kuldeep\", student.getName());\n count++;\n }\n Assert.assertEquals(1, count);\n em.close();\n }\n\n private void findByNameAndAgeGTAndLTEQ()\n {\n\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n int count;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.name = Kuldeep and s.age > \"\n + getMinValue(short.class) + \" and s.age <= \" + getMaxValue(short.class);\n q = em.createQuery(query);\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(1, students.size());\n count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n Assert.assertEquals(getMaxValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getMaxValue(short.class), student.getAge());\n Assert.assertEquals(\"Kuldeep\", student.getName());\n count++;\n }\n Assert.assertEquals(1, count);\n em.close();\n }\n\n public void testNamedQueryUseSameEm(boolean useSameEm)\n {\n updateNamed(true);\n deleteNamed(true);\n }\n\n public void testNamedQuery(boolean useSameEm)\n {\n updateNamed(false);\n deleteNamed(false);\n }\n\n public void testDelete(boolean useSameEm)\n {\n EntityManager em = emf.createEntityManager();\n\n StudentCouchDBBigDecimal studentMax = em.find(StudentCouchDBBigDecimal.class, getMaxValue(BigDecimal.class));\n Assert.assertNotNull(studentMax);\n Assert.assertEquals(getMaxValue(short.class), studentMax.getAge());\n Assert.assertEquals(\"Kuldeep\", studentMax.getName());\n em.remove(studentMax);\n if (!",
"useSameEm)\n {\n em.close();\n em = emf.createEntityManager();\n }\n studentMax = em.find(StudentCouchDBBigDecimal.class, getMaxValue(BigDecimal.class));\n Assert.assertNull(studentMax);\n em.close();\n }\n\n /**\n * \n */\n private void deleteNamed(boolean useSameEm)\n {\n\n String deleteQuery = \"Delete From StudentOracleNoSQLBigDecimal s where s.name=Vivek\";\n EntityManager em = emf.createEntityManager();\n Query q = em.createQuery(deleteQuery);\n q.executeUpdate();\n if (!",
"useSameEm)\n {\n em.close();\n em = emf.createEntityManager();\n }\n StudentCouchDBBigDecimal newStudent = em.find(StudentCouchDBBigDecimal.class, getRandomValue(BigDecimal.class));\n Assert.assertNull(newStudent);\n em.close();\n }\n\n /**\n * @return\n */\n private void updateNamed(boolean useSameEm)\n {\n EntityManager em = emf.createEntityManager();\n String updateQuery = \"Update StudentOracleNoSQLBigDecimal s SET s.name=Vivek where s.name=Amresh\";\n Query q = em.createQuery(updateQuery);\n q.executeUpdate();\n if (!",
"useSameEm)\n {\n em.close();\n em = emf.createEntityManager();\n }\n StudentCouchDBBigDecimal newStudent = em.find(StudentCouchDBBigDecimal.class, getRandomValue(BigDecimal.class));\n Assert.assertNotNull(newStudent);\n Assert.assertEquals(getRandomValue(short.class), newStudent.getAge());\n Assert.assertEquals(\"Vivek\", newStudent.getName());\n em.close();\n }\n\n private void findByNameAndAGEBetween()\n {\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n int count;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.name = Amresh and s.age between \"\n + getMinValue(short.class) + \" and \" + getMaxValue(short.class);\n q = em.createQuery(query);\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(1, students.size());\n count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n Assert.assertEquals(getRandomValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getRandomValue(short.class), student.getAge());\n Assert.assertEquals(getRandomValue(String.class), student.getName());\n count++;\n\n }\n Assert.assertEquals(1, count);\n em.close();\n }\n\n private void findByNameAndAgeGTAndLT()\n {\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n int count;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.name = Amresh and s.age > \"\n + getMinValue(short.class) + \" and s.age < \" + getMaxValue(short.class);\n q = em.createQuery(query);\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(1, students.size());\n count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n Assert.assertEquals(getRandomValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getRandomValue(short.class), student.getAge());\n Assert.assertEquals(getRandomValue(String.class), student.getName());\n count++;\n\n }\n Assert.assertEquals(1, count);\n em.close();\n\n }\n\n private void findByNameAndAgeGTEQAndLTEQ()\n {\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n int count;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.name = Kuldeep and s.age >= \"\n + getMinValue(short.class) + \" and s.age <= \" + getMaxValue(short.class);\n q = em.createQuery(query);\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(2, students.size());\n count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n if (student.getId().equals(getMaxValue(BigDecimal.class)))\n {\n Assert.assertEquals(getMaxValue(short.class), student.getAge());\n Assert.assertEquals(\"Kuldeep\", student.getName());\n count++;\n }\n else\n {\n Assert.assertEquals(getMinValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getMinValue(short.class), student.getAge());\n Assert.assertEquals(getMinValue(String.class), student.getName());\n count++;\n }\n\n }\n Assert.assertEquals(2, count);\n em.close();\n\n }\n\n private void findByAge()\n {\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n int count;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.age = \" + getRandomValue(short.class);\n q = em.createQuery(query);\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(1, students.size());\n count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n Assert.assertEquals(getRandomValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getRandomValue(short.class), student.getAge());\n Assert.assertEquals(getRandomValue(String.class), student.getName());\n count++;\n }\n Assert.assertEquals(1, count);\n em.close();\n }\n\n /**\n * \n */\n private void findByName()\n {\n EntityManager em;\n String query;\n Query q;\n List<StudentCouchDBBigDecimal> students;\n int count;\n em = emf.createEntityManager();\n query = \"Select s From StudentOracleNoSQLBigDecimal s where s.name = Kuldeep\";\n q = em.createQuery(query);\n students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(2, students.size());\n count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n if (student.getId().equals(getMaxValue(BigDecimal.class)))\n {\n Assert.assertEquals(getMaxValue(short.class), student.getAge());\n Assert.assertEquals(\"Kuldeep\", student.getName());\n count++;\n }\n else\n {\n Assert.assertEquals(getMinValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getMinValue(short.class), student.getAge());\n Assert.assertEquals(getMinValue(String.class), student.getName());\n count++;\n }\n }\n Assert.assertEquals(2, count);\n em.close();\n }\n\n /**\n * \n */\n private void findAllQuery()\n {\n EntityManager em = emf.createEntityManager();\n // Selet all query.",
"\n String query = \"Select s From StudentOracleNoSQLBigDecimal s \";\n Query q = em.createQuery(query);\n List<StudentCouchDBBigDecimal> students = q.getResultList();\n Assert.assertNotNull(students);\n Assert.assertEquals(3, students.size());\n int count = 0;\n for (StudentCouchDBBigDecimal student : students)\n {\n if (student.getId().equals(getMaxValue(BigDecimal.class)))\n {\n Assert.assertEquals(getMaxValue(short.class), student.getAge());\n Assert.assertEquals(\"Kuldeep\", student.getName());\n count++;\n }\n else if (student.getId().equals(getMinValue(BigDecimal.class)))\n {\n Assert.assertEquals(getMinValue(short.class), student.getAge());\n Assert.assertEquals(getMinValue(String.class), student.getName());\n count++;\n }\n else\n {\n Assert.assertEquals(getRandomValue(BigDecimal.class), student.getId());\n Assert.assertEquals(getRandomValue(short.class), student.getAge());\n Assert.assertEquals(getRandomValue(String.class), student.getName());\n count++;\n }\n }\n Assert.assertEquals(3, count);\n em.close();\n }\n\n}\n"
] |
{
"pile_set_name": "Github"
}
|
[
0,
0.013605442176870748,
0.005934718100890208,
0.009009009009009009,
0,
0.034482758620689655,
0,
0.025,
0.02127659574468085,
0.02631578947368421,
0.03225806451612903,
0.038461538461538464,
0,
0,
0,
0.015384615384615385,
0.005749329244921426,
0.00702576112412178,
0.004343105320304018,
0.0043859649122807015,
0,
0.004688361831218974,
0.006993006993006993,
0.006462035541195477,
0.004956220056170494,
0.005997001499250375
] | 0.010474
| 5
|
[
"Q:\n\nRemove the number of a specific section in TOC (revtex)\n\nHow can I remove the page number of a specific section in the TOC:\n\nthe mwe I'm using is:\n \\documentclass[12pt,a4paper]{revtex4-1}\n\\usepackage{graphicx}% Include figure files\n\\usepackage{bm}% bold math\n\\usepackage[usenames]{color}\n\\usepackage[all]{xy}\n\\usepackage{amsmath}\n\\usepackage{fixmath}\n\\usepackage{natbib}\n\\usepackage{placeins}\n\\usepackage{verbatim}\n\\usepackage[top=0.59in,bottom=0.59in,left=0.59in,right=0.59in]{geometry}\n%% packges not from aps\n\\usepackage{amssymb}\n\\usepackage{float}\n\\usepackage[nice]{nicefrac}\n\\usepackage{chemmacros}\n\\usepackage{hyperref}\n\\usepackage{xcolor}\n\\usepackage{multirow}\n\\hypersetup{\n colorlinks = true, %Colours links instead of ugly boxes\n urlcolor = red, %Colour for external hyperlinks\n linkcolor = black, %Colour of internal links\n citecolor = black %Colour of citations\n}\n\\setlength{\\parindent}{0pt}\n\\setlength{\\abovecaptionskip}{0pt plus 0pt minus 0pt}\n\\renewcommand\\thesection{\\arabic{section}}\n\\renewcommand\\thesubsection{\\alph{subsection}}\n\\def\\bibsection{\\section{\\refname}} \n\n\\begin{document}\n\\tableofcontents\n\\setcounter{page}{1}\n\\newpage\n\\section{section 1}\nbla bla bla\n\\newpage\n\\section{section 2}\nbla bla bla\n\\newpage\n\\section{section 3}\nbla bla bla\n\\newpage\n\\section{section 4}\nbla bla bla\n\\end{document}\n\nA:\n\nYou can use the following switches to change what is displayed in the ToC:\n\n\\droptocpage: Remove page references in ToC from this point onward;\n\\incltocpage: Restore page references in ToC from this point onward.",
"\n\n\\documentclass{revtex4-1}\n\n\\usepackage{hyperref}\n\n\\renewcommand{\\thesection}{\\arabic{section}}% Just for this example\n\n\\AtBeginDocument{\\let\\oldcontentsline\\contentsline}\n\\newcommand{\\notoccontentsline}[4]{\\oldcontentsline{#1}{#2}{}{#4}}\n\\newcommand{\\droptocpage}{\\addtocontents{toc}{\\let\\protect\\contentsline\\protect\\notoccontentsline}}\n\\newcommand{\\incltocpage}{\\addtocontents{toc}{\\let\\protect\\contentsline\\protect\\oldcontentsline}}\n\n\\begin{document}\n\n\\tableofcontents\n\n\\clearpage\n\\section{First section}\nbla bla bla\n\n\\clearpage\n\\section{Second section}\nbla bla bla\n\n\\clearpage\n\\droptocpage\n\\section{Third section}\nbla bla bla\n\n\\clearpage\n\\incltocpage\n\\section{Fourth section}\nbla bla bla\n\n\\end{document}\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0.006418485237483954,
0.0028129395218002813
] | 0.004616
| 5
|
[
"Q:\n\nSelecting div within anchor\n\nHow to select div tag inside an anchor tag. ",
"Consider the following HTML.",
"\n<a target=\"_new\" href=\"https://stackoverflow.com/12.mp4\"\n data-placement=\"top\" rel=\"tooltip\" \n title=\"Video (MP4)\" >\n <div class=\"hidden\">Interesting 12</div>\n </a>\n\nI have to select all anchor tags pointing to video resource. ",
"I am able to select the anchor tags. ",
"Now How do I select the division inside it and get the text?",
"\n$(\"a\").each(function() {\n var link = $(this).attr('href');\n if (typeof link == \"string\" && link.indexOf(\".mp4\") > 0) {\n alert(link);\n }\n})\n\nA:\n\nuse .find('div') or .find('.hidden') after your $('a')\nhttp://api.jquery.com/find/\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0,
0,
0.004016064257028112,
0,
0,
0.008130081300813009
] | 0.002024
| 5
|
[
"Animal Testing Could Soon Be a Thing of the Past\n\n\"It is showing the model we use, explaining how we go about making it and how these skin equivalents are used to guide and minimise the use of animals when we develop new wound healing therapies,\" Dr. Upton said.",
"\n\nTesting detergents and cosmetics on animals could soon be a thing of the past in Australia, thanks to work being done in Queensland University of Technology's Institute of Health and Biomedical Innovation (IHBI).",
"\n\nThree-dimensional models made up of skin cells to create a human skin equivalent could replace pig skin, which is often used to test new therapies, cosmetics, and chemical consumer products.",
"\n\nProfessor Zee Upton (pictured), a senior researcher at IHBI, said the human skin equivalent was originally developed for use in her research into wound healing but could be used to test new products.",
"\n\n\"Most people would go to rats and mice for lab testing, but when it comes to testing new wound therapies or products and cosmetics that go on human skin, pig skin is our closest alternative and is most often used,\" she said.",
"\n\n\"However, this is expensive, the test numbers are limited, and of course there are ethical problems to consider, so using a human skin equivalent will reduce this use and possibly give more accurate results.”",
"\n\n\"Obviously, the ultimate goal is to avoid labs having to use animals altogether eventually.\"",
"\n\nShe said it could also be a useful finding because new legislation coming next year states that any consumer products using animal products or tested on animals will not be allowed to be exported to the European Union.",
"\n\nShe said the human skin equivalent was a finalist in this year's Museum of Australia's Eureka Prize for \"Research that Contributes to Animal Protection.\"",
"\n\n\"It is showing the model we use, explaining how we go about making it, and how these skin equivalents are used to guide and minimize the use of animals when we develop new wound healing therapies,\" she said.",
"\n\n\"We collect skin donated by consenting patients who have had surgery resulting in a surgical off-cut, and the skin is then processed in our laboratory to isolate the cells; once they are growing healthily again, we can bring them back together and create the multi-component skin equivalent in the lab.”",
"\n\n\"So we deconstruct the skin and its cells and then reconstruct them - we cannot use the skin off-cuts themselves, as those cells are dying and we need to get the cells back to a state where they are growing healthily again.\"",
"\n\nShe said skin equivalents have been developed overseas, but cannot be imported to Australia due to transport logistics and quarantine restrictions."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.003816793893129771,
0.009345794392523364,
0.005208333333333333,
0.009950248756218905,
0,
0,
0,
0.004545454545454545,
0.01935483870967742,
0,
0,
0,
0
] | 0.004017
| 5
|
[
"## Datasets used to train Generative Query Networks (GQNs) in the ‘Neural Scene Representation and Rendering’ paper.",
"\n\n\nThe following version of the datasets are available:\n\n* __rooms_ring_camera__. ",
"Scenes of a variable number of random objects\n captured in a square room of size 7x7 units. ",
"Wall textures, floor textures\n as well as the shapes of the objects are randomly chosen within a fixed pool\n of discrete options. ",
"There are 5 possible wall textures (red, green, cerise,\n orange, yellow), 3 possible floor textures (yellow, white, blue) and 7\n possible object shapes (box, sphere, cylinder, capsule, cone, icosahedron\n and triangle). ",
"Each scene contains 1, 2 or 3 objects. ",
"In this simplified\n version of the dataset, the camera only moves on a fixed ring and always\n faces the center of the room. ",
"This is the ‘easiest’ version of the dataset,\n use version for fast training.",
"\n\n* __rooms_free_camera_no_object_rotations__. ",
"As in __rooom_ring_camera__,\n except the camera moves freely. ",
"However the objects themselves do not rotate\n around their axes, which makes the modeling task somewhat easier. ",
"This\n version is ‘medium’ difficulty.",
"\n\n* __rooms_free_camera_with_object_rotations__. ",
"As in\n __rooms_free_camera_no_object_rotations__, the camera moves freely, however\n objects can rotate around their vertical axes across scenes. ",
"This is the\n ‘hardest’ version of the dataset.",
"\n\n* __jaco__. ",
"a reproduction of the robotic Jaco arm is placed in the middle of\n the room along with one spherical target object. ",
"The arm has nine joints. ",
"As\n above, the appearance of the room is modified for each episode by randomly\n choosing a different texture for the walls and floor from a fixed pool of\n options. ",
"In addition, we modify both colour and position of the target\n randomly. ",
"Finally, the joint angles of the arm are also initialised at\n random within a range of physically sensible positions.",
"\n\n* __shepard_metzler_5_parts__. ",
"Each object is composed of 7 randomly coloured\n cubes that are positioned by a self-avoiding random walk in 3D grid. ",
"As\n above, the camera is parametrised by its position, yaw and pitch, however it\n is constrained to only move around the object at a fixed distance from its\n centre. ",
"This is the ‘easy’ version of the dataset, where each object is\n composed of only 5 parts.",
"\n\n* __shepard_metzler_7_parts__. ",
"This is the ‘hard’ version of the above\n dataset, where each object is composed of 7 parts.",
"\n\n* __mazes__. ",
"Random mazes that were created using an OpenGL-based [DeepMind\n Lab](https://github.com/deepmind/lab) game engine (Beattie et al., ",
"2016).",
"\n Each maze is constructed out of an underlying 7 by 7 grid, with walls\n falling on the boundaries of the grid locations. ",
"However, the agent can be\n positioned at any continuous position in the maze. ",
"The mazes contain 1 or 2\n rooms, with multiple connecting corridors. ",
"The walls and floor textures of\n each maze are determined by random uniform sampling from a predefined set of\n textures.",
"\n\n### Usage example\n\nTo select what dataset to load, instantiate a reader passing the correct\n`version` argument. ",
"Note that the constructor will set up all the queues used by\nthe reader. ",
"To get tensors call `read` on the data reader passing in the desired\nbatch size.",
"\n\n```python\n import tensorflow as tf\n\n root_path = 'path/to/datasets/root/folder'\n data_reader = DataReader(dataset='jaco', context_size=5, root=root_path)\n data = data_reader.read(batch_size=12)\n\n with tf.train.",
"SingularMonitoredSession() as sess:\n d = sess.run(data)\n```\n\n### Download\n\nRaw data files referred to in this document are available to download\n[here](https://console.cloud.google.com/storage/gqn-dataset). ",
"To download the\ndatasets you can use\nthe [`gsutil cp`](https://cloud.google.com/storage/docs/gsutil/commands/cp)\ncommand; see also the `gsutil` [installation instructions](https://cloud.google.com/storage/docs/gsutil_install).",
"\n\n\n### Notes\n\nThis is not an official Google product.",
"\n"
] |
{
"pile_set_name": "Github"
}
|
[
0.017241379310344827,
0,
0,
0,
0.008771929824561403,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.0625,
0.008403361344537815,
0,
0,
0,
0,
0,
0,
0.005714285714285714,
0,
0,
0,
0,
0.007462686567164179,
0,
0,
0,
0,
0,
0,
0,
0,
0.004608294930875576,
0.004761904761904762,
0.008849557522123894,
0.018867924528301886,
0
] | 0.003504
| 5
|
[
"Greg Canfield\n\nJohn Gregory Canfield (born July 12, 1960) is an American politician from the state of Alabama. ",
"He currently serves as the Secretary of Commerce for the State of Alabama.",
"\n\nCanfield was elected the Alabama House of Representatives in the 2006 elections. ",
"He was re-elected in 2010. ",
"Governor Robert J. Bentley appointed Canfield to the Alabama Development Office in July 2011, succeeding Seth Hammett.",
"\n\nReferences\n\nCategory:Living people\nCategory:Alabama Republicans\nCategory:Members of the Alabama House of Representatives\nCategory:1960 births"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.036036036036036036,
0.013513513513513514,
0.024096385542168676,
0,
0.03389830508474576,
0.006993006993006993
] | 0.01909
| 5
|
[
"Buy Article:\n\nAbstract:\n\nThe genus Ceratozamia contains more than 20 species distributed in eastern and southern Mexico, with extensions into Central America. ",
"Morphology, anatomy, and molecular (ITS) data allow resolution of some aspects of species relationships, provide correlations with ecology, and suggest phytogeographic hypotheses. ",
"Some species complexes, such as those centered around C. norstogii and C. miqueliana, are restricted to southernwest Mexico, in what are regarded as Pleistocene floristic refugia. ",
"The low level of divergence of ITS sequences among taxa to the north of the Trans-Mexican Neovolcanic mountain range suggests a pattern of recent, and perhaps rapid, speciation."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.012578616352201259,
0,
0.005555555555555556,
0.005649717514124294
] | 0.005946
| 5
|
[
"Rebalancing Europe: Comments on Bundesbank chief Jens Weidmann\n\n2012-03-30\n\nThis post is archived. ",
"Opinions expressed\nherein may no longer represent my current views. ",
"Links,\nimages and other media might not work as intended.",
"\nInformation may be out of date. ",
"For further questions contact me.",
"\n\nOn March 28, 2012 the chief of the Bundesbank, Jens Weidmann, delivered a speech at the Chatham House, in which he expanded on his ideas of approaching the economic crisis. ",
"What Mr Weidmann said is not at all a surprise to anyone familiar with the economic orthodoxy that permeates his institution and determines the approach the current German government has vis a vis the ongoing eurocrisis. ",
"He made reference to the macroeconomic imbalances that characterise the eurozone and the existence of excessive sovereign and public debt. ",
"Though many of his points are correct in principle, his analysis has loopholes and his approach is rather one-sided. ",
"I shall elaborate on Mr Weidmann’s views by presenting excerpts from his speech and then follow-up comments, to explain why and where I disagree or agree with him.",
"\n\nPoint one. ",
"Mr Weidmann says:\n\nWe face a crisis that is no longer confined to individual countries. ",
"Throughout Europe, it weighs heavily on people’s minds and challenges the viability of monetary union in its current form. ",
"It is obvious to all of us that the crisis has to be resolved and future crises must be prevented.",
"\nThe first step must be to contain the crisis, to prevent it from spreading. ",
"To this end, policymakers have surrounded the crisis with a “Wall of Money”, which has meanwhile reached a height of €500 billion. ",
"Ring-fencing is certainly a sensible approach, but just like the “Tower of Babel” the “Wall of Money” will never reach heaven. ",
"If we continue to make it higher and higher, we will, in fact, run into more worldly constraints – both financial and political ones.",
"\nAnd, whether we like it or not, we are also changing the rules of the game in monetary union and might set incentives that lead to new problems in the future.",
"\nIn any case, we must realise that all the money we put on the table will not buy us a lasting solution to the crisis. ",
"As Mervyn King frequently and rightly states: “all we can buy is time” – time that must be used to address the root causes of the crisis.</p>\nHe correctly points out the fact that the crisis is not confined to individual countries. ",
"In truth it never was, even though we tend to speak of a “Greek” crisis or a “PIIGS” crisis. ",
"Ever since day one of the crisis, we have been dealing with a systemic crisis that first manifested itself as a financial crisis that brought the need for direct bailouts to banks (and in Germany among others), then evolved into a sovereign debt crisis, ultimately damaging the real economy.",
"\n\nEver since day one of the crisis there have been negative feedback loops between quasi-bankrupt banks, stressed sovereigns and a stagnant real economy. ",
"Every single Eurozone country is involved in this since the very beginning. ",
"Others have suffered more, others less, yet the point remains that the crisis was never a localised issue or an amalgamation of national crises. ",
"It always was and still is a systemic crisis. ",
"After all in the modern capitalist system, where we practically have a symbiosis of states and banks it cannot be otherwise (unless you change the system). ",
"With that said it is at least encouraging to hear a Bundesbanker admitting that the crisis is not confined to individual countries.",
"\n\nThen he makes a very accurate remark about the “Wall of Money”, with which I agree (see my articles on LTRO and/or ECB among others). ",
"More money alone can only lead to more problems, if there is no clear-cut strategy of structural reforms or measures at the macroeconomic and most importantly the microeconomic level. ",
"Debt monetizations, free lunches to bankers and/or politicians, perverse incentives to individuals can only conceal the structural malignancies and set the foundations for more problems over the longer term. ",
"Money must be stable since it is above all a means of exchange – a yardstick – and we do not want that “yardstick” to change all the time (inflation), since that impedes the production and consumption of real goods and services.",
"\n\nPoint two. ",
"Mr Weidmann continues:\n\nIn a monetary union, however, this is obviously no longer an option. ",
"Spain no longer has a peseta to devalue; Germany no longer has a deutsche mark to revalue. ",
"Other things must therefore give instead: prices, wages, employment and output.",
"\nWhich brings me back to my original question: which countries have to adjust?",
"\nThe typical German position could be described as follows: the deficit countries must adjust. ",
"They must address their structural problems. ",
"They must reduce domestic demand. ",
"They must become more competitive and they must increase their exports.</p>\nIndeed a monetary union erodes the monetary sovereignty of states, as national currencies do not exist. ",
"Thus playing with the exchange rates is no longer possible. ",
"Therefore the diagnosis that structural reforms are necessary to address the imbalances is correct in principle. ",
"However structural reforms alone cannot do the trick and more so when they are carried out by “one side of the coin”, i.e. deficit countries.",
"\n\nYes, deficit countries need to reallocate resources from non-tradable to tradable areas – and many measures can be taken towards that direction, both public and private, that can facilitate this necessary readjustment. ",
"However what Mr Weidmann describes as the standard German position, is false as it assumes that Germany does not need structural reforms. ",
"Indeed much has to be done in the German internal market to “de-freeze” domestic consumption and aggregate demand. ",
"Of course this is easily said than done, since Germany is the dominant political and economic power in Europe and thus they largely determine the rules of the game.",
"\n\nIn addition, the problem is not only about the structural flaws at a national level, but also about the institutional setting of the supranational level, the EU and the Eurozone (EMU). ",
"In short the EU has a growing democratic deficit that needs to be addressed the soonest so that it can operate more effectively and in time; while the over-regulation and cumbersome bureaucracy need to be redesigned, as they now deny us much of our potential. ",
"As for the Eurozone, there ultimately needs to be a genuine fiscal union backing the monetary union and a unified banking system, in which credit imbalances such as those of TARGET2, will be periodically settled without any negative impact on the real economy.",
"\n\nIn a nutshell the crisis requires euro-wide measures, as one-sided adjustments in deficit countries are only part of the issue.",
"\n\nPoint three. ",
"Mr Weidmann says:\n\nAnother thing we should not forget is this: of course, surplus countries will eventually be affected as deficit countries adjust. ",
"Not every country on earth can run a current account surplus – unless we trade with “space aliens” as Paul Krugman recently suggested.",
"\nAs the deficit countries import less and become more competitive exporters, surplus countries will run lower surpluses. ",
"The key issue is whether this happens as a result of market processes or as a result of efforts to fine-tune aggregate demand in the euro area. ",
"I would welcome the former, but I object to the latter.</p>\nI could also welcome the former if of course there existed such a thing, given that the latter is practically unfeasible. ",
"The German growth model is clearly in favour of the export sector and many of the regulations that are in place are designed in such a way to contain domestic consumption. ",
"If we are to speak of free market adjustments we all need to play with the same rules as there is no free market wherever we have reverse protectionist measures. ",
"When we create a free single market that does not favour any country’s domestic sector we can speak again about the actual “national competitiveness” and the free-market adjustments.",
"\n\nAnd finally point four. ",
"Mr Weidmann concludes:\n\nThis brings me back to the beginning of my speech: we must not just contain the crisis, we must resolve it. ",
"To achieve this goal, we must address two central issues: the problem of excessive public debt and the problem of macroeconomic imbalances.",
"\nCountries with current account deficits and excessive public debt must act. ",
"They must implement structural reforms and they must consolidate their budgets to get back onto a stable growth path. ",
"Of course, adjustment is a huge challenge for the people in these countries but the status quo is clearly unsustainable, and doing nothing will lead to even sharper corrections. ",
"By contrast, taking up the challenge will open the doors to a more stable and more prosperous future.</p>\nWe do indeed need to address all asymmetries and reduce public and private debts. ",
"But as mentioned earlier is this not the exclusive task of deficit countries, since the crisis is much broader. ",
"Ultimately there will have to be reforms in all member-states, both deficit and surplus countries, while the very institutional structure of the monetary union and the EU as a whole, need to be redesigned.",
"\n\nMr Weidmann pointed out some issues which are correct, others which are inaccurate and a few that are misleading and false. ",
"The crisis is above all systemic and this implies system-wide solutions, not monolithic reforms in one part of Europe, something that Mr Weidmann neglects.",
"\n\nEnglish\n\nΕλληνικά\n\nCode\n\n(c) 2011-2019 Protesilaos\nStavrou. ",
"All original text or complementary media\non protesilaos.com is available under the\nCreative Commons Attribution-ShareAlike License,\nVersion 4.0 International. ",
"This applies to\nevery article in the politics blog, the coding blog,\nthe blog archive, the Greek language political\narticles as well as the ones on the mode of living,\nthe news section, any other standalone page, as well\nas all of the items in the books section. ",
"All\noriginal code presented herein is available for free\nuse under the terms of the GNU General Public\nLicense Version\n3 or later. ",
"License and\nresources."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.020202020202020204,
0,
0,
0,
0,
0.017142857142857144,
0.004524886877828055,
0,
0,
0.006134969325153374,
0,
0.011363636363636364,
0,
0,
0,
0,
0.007874015748031496,
0,
0,
0,
0.004310344827586207,
0,
0,
0,
0,
0,
0,
0,
0,
0.007352941176470588,
0,
0,
0,
0,
0.010752688172043012,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.007246376811594203,
0,
0,
0.0106951871657754,
0.0038461538461538464,
0.007692307692307693,
0,
0,
0.006711409395973154,
0.007462686567164179,
0,
0,
0,
0,
0,
0,
0,
0.007575757575757576,
0,
0,
0,
0,
0,
0,
0.004878048780487805,
0.007936507936507936,
0.0064516129032258064,
0,
0.006289308176100629,
0,
0,
0.045454545454545456
] | 0.002717
| 5
|
[
"[Reoperations after closure of perforative gastroduodenal ulcer].",
"\nResults of surgical treatment of 271 patients with malady recurrence after perforative gastroduodenal ulcer closure were adduced. ",
"Resectional methods of treatment were conducted in 118 patients, vagotomy combined with the stomach draining procedure--in 106, in combination with ulcer extraduodenization and duodenoplasty--in 47. ",
"Conduction of organpreserving operation with ulcer extraduodenization and duodenoplasty must be supposed mostly rational."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0,
0,
0,
0
] | 0
| 5
|
[
"Member Function Documentation\n\nHashes which derive from IteratedHashWithStaticTransform provide static member functions InitState and Transform. ",
"External classes, like SEAL and MDC, can initialize state with a user provided key and operate the hash on the data with the user supplied state.",
"\n\nTransform operates the hash on data. ",
"When the call is invoked digest holds initial state. ",
"Upon return digest holds the hash or updated state.",
"\n\nHashes which derive from IteratedHashWithStaticTransform provide static member functions InitState and Transform. ",
"External classes, like SEAL and MDC, can initialize state with a user provided key and operate the hash on the data with the user supplied state.",
"\n\nNote\n\nOn Intel platforms the state array and data must be 16-byte aligned for SSE2.",
"\n\nThe algorithm provider can be a name like \"C++\", \"SSE\", \"NEON\", \"AESNI\", \"ARMv8\" and \"Power8\". ",
"C++ is standard C++ code. ",
"Other labels, like SSE, usually indicate a specialized implementation using instructions from a higher instruction set architecture (ISA). ",
"Future labels may include external hardware like a hardware security module (HSM)."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.027586206896551724,
0.006896551724137931,
0,
0,
0,
0.02586206896551724,
0.006896551724137931,
0.023529411764705882,
0.010309278350515464,
0,
0.014388489208633094,
0.012195121951219513
] | 0.010639
| 5
|
[
"Antegrade continent enema procedures performed prior to starting school may improve functional stooling and quality of life.",
"\nA major research gap is determining the best age to perform an appendicostomy or cecostomy. ",
"This study hypothesizes that performance of appendicostomy/cecostomy prior to starting school (<6 years) would improve functional stooling and quality of life (QOL). ",
"Patients who underwent appendicostomy/cecostomy for bowel management between 2003 and 2013 were retrospectively identified. ",
"Families were prospectively surveyed regarding current stooling habits (17 items) and a (7 item) pediatric QOL survey. ",
"Lower stooling survey scores represent better bowel control. ",
"Higher QOL scores indicated better quality. ",
"The primary outcome was to correlate age of appendicostomy/cecostomy to QOL score. ",
"Statistics were performed using paired, unpaired t tests, and Chi-square. ",
"p Values ≤0.05 were considered significant. ",
"35 patients underwent placement of appendicostomy/cecostomy. ",
"Fourteen (40%) patients/families were prospectively contacted (<6, n = 6; >6, n = 8). ",
"Stooling scores (15.17 ± 1.35 vs. 22.25 ± 1.70; for <6 vs. >6 years old, p = 0.009) and continence scores (6.33 ± 1.45 vs. 11.13 ± 1.64; p = 0.06), at time of contacting families, were significantly better in those undergoing appendicostomy/cecostomy in the <6 group. ",
"Pre-procedure QOL scores for the two groups were similar (p = 0.89). ",
"Post-procedure QOL significantly increased to the good subcategory for both age groups; however improvement was significantly better in the <6 age group vs. ≥6 group: 6.33 ± 0.92 vs. 3.13 ± 0.91 points (p = 0.03). ",
"A secondary parent survey showed significantly more families wished an appendicostomy/cecostomy were done earlier in the >6 vs. <6 group (87.5 vs. 33%; p = 0.04). ",
"Early placement of cecostomy or appendicostomy as part of a bowel management program may contribute to improved QOL and functional stooling."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0.008064516129032258,
0,
0.006024096385542169,
0,
0.008403361344537815,
0,
0.022727272727272728,
0.012048192771084338,
0.013513513513513514,
0,
0,
0,
0,
0.014492753623188406,
0.004672897196261682,
0,
0.007142857142857143
] | 0.005711
| 5
|
[
"hadoop-yarn-issues mailing list archives\n\n[jira] [Commented] (YARN-252) Unmanaged AMs should not have to set the ContainerLaunchContext\n\nDate\n\nWed, 05 Dec 2012 23:15:58 GMT\n\n[ https://issues.apache.org/jira/browse/YARN-252?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13510887#comment-13510887\n]\nBikas Saha commented on YARN-252:\n---------------------------------\nI think it would be good to add the assert in the other places too. ",
"e.g. to catch a bug when\ncontext is set for the app but not in the attempt because of some new code bug.",
"\nThe other thing I am not sure I understand is the ACL's bit. ",
"What are the use cases for these\nACL's. ",
"If they are needed to be sent by the client to the RM then dont we need the submission\ncontext to pass the ACL's? ",
"From what I see the client passes ACL's to the RM via the app submission\ncontext, so that the RM can pass it onto the attempt during attempt registration. ",
"Now say\nwe are going to use unamanged AM for debugging. ",
"Ideally, the AM should have the same code\npath for receiving ACL's in managed and unmanaged mode, right? ",
"And that currently is getting\nACL's from the registerAM response. ",
"If we remove the context completely then how do we pass\nACL's around in the unmanaged case? ",
"If this is correct then perhaps instead of removing context\nfrom the launcher we might want to improve it to accept ACL's and add it to the context. ",
"In\ngeneral I am thinking of having 1 client allow users to launch apps, in managed or unmanaged\nmode. ",
"I may be missing something. ",
"So you might have to educate me here :P\nbq. ",
"and in fact requiring that one be set is very confusing for YARN application writers.",
"\nI am not clear why application writers would need to do this. ",
"Application writers need to\nthink about setting context for containers and not AM's themselves, dont they?",
"\n> Unmanaged AMs should not have to set the ContainerLaunchContext\n> ---------------------------------------------------------------\n>\n> Key: YARN-252\n> URL: https://issues.apache.org/jira/browse/YARN-252\n> Project: Hadoop YARN\n> Issue Type: Bug\n> Components: applications\n> Affects Versions: 2.0.2-alpha\n> Reporter: Tom White\n> Assignee: Tom White\n> Attachments: YARN-252.patch, YARN-252.patch\n>\n>\n> Not calling ApplicationSubmissionContext#setAMContainerSpec causes a NPE, even though\nthe container is not used (since the AM doesn't run in a managed YARN container).",
"\n--\nThis message is automatically generated by JIRA.",
"\nIf you think it was sent incorrectly, please contact your JIRA administrators\nFor more information on JIRA, see: http://www.atlassian.com/software/jira"
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.002109704641350211,
0,
0.016129032258064516,
0,
0.017543859649122806,
0.01935483870967742,
0,
0.009523809523809525,
0.015151515151515152,
0,
0.006711409395973154,
0,
0,
0,
0.011764705882352941,
0,
0,
0.01232394366197183,
0,
0.006578947368421052
] | 0.00586
| 5
|
[
"Adani Australia says the loan it is seeking from the Federal Government for its proposed Carmichael coal project could be less than half of the reported $1 billion.",
"\n\n\"It may be more than $500 million, it may be less than $500 million,\" company spokesman Ron Watson told 7.30.",
"\n\n\"It all depends on our financial arrangements, which we've yet to finalise.\"",
"\n\nAdani Australia applied for funding under the Federal Government's Northern Australia Infrastructure Facility (NAIF) in December, to help with the construction of a 380-kilometre railway line linking its proposed central Queensland coal mine to the coast.",
"\n\nIt was widely reported at the time that the then-minister for Northern Australia, Senator Matt Canavan, had confirmed the loan application was for $1 billion.",
"\n\nBut this was called into question in a recent interview Adani Australia's chief executive Jeyakumar Janakaraj gave to Queensland's Courier Mail.",
"\n\n\"Even I don't know the number,\" he was quoted as saying.",
"\n\n\"It could be anything.\"",
"\n\nAdani says it's awaiting decision on NAIF funding\n\nThe Indian-owned company also said there may be a three-month delay to finalising its finances.",
"\n\nAdani originally said it wanted to confirm all finances by the end of this year.",
"\n\nBut Mr Watson said that deadline might have had to be put back to the first quarter of 2018, while it awaited a decision on NAIF funding.",
"\n\n\"The timing is out of our hands,\" he said.",
"\n\n\"However we still believe we can meet our schedule of having the first shipment of coal in 2020.\"",
"\n\nNAIF confirmed last month that it had selected five projects out of 124 loan applications for due diligence, and the first loans should be finalised by the end of September.",
"\n\nNAIF did not release details of specific projects, citing commercial-in-confidence laws."
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.006097560975609756,
0.009009009009009009,
0,
0.007782101167315175,
0.0125,
0.02054794520547945,
0,
0,
0,
0,
0.007194244604316547,
0,
0,
0,
0
] | 0.004209
| 5
|
[
"The Most Controversial Films in Norway\n\nAlthough not as globally celebrated as Swedish or Danish cinema, Norwegian cinema has produced quite a few thought-provoking films — some of them touching upon issues that are still too sensitive to talk about in today’s society. ",
"What is more, Norway’s overeagerness to ban films in the past, has made sure that some very unlikely names are included in this list.",
"\n\nΕ.Τ\n\nWhat’s controversial about every child’s favorite alien, you may ask? ",
"Norwegians have a surprising answer to that question. ",
"Back in the day, Steven Spielberg’s classic made Norway (and Finland, and Sweden) very nervous, because it supposedly teaches children not to trust adults. ",
"If you recall, Elliot realises he can’t trust adult figures in his quest to help his alien friend go home — and Norway thought that this set a bad example for children and would create discord between generations. ",
"So E.T. was banned for all children under twelve years old. ",
"Sometimes, adults just don’t get it…\n\nE.T. The Extra-Terrestrial | Courtesy of Universal Studios\n\nThe Snowman\n\nNorwegians expected great things from The Snowman. ",
"After all, it’s a film adaptation of one of Jo Nesbø’s novels, portraying their beloved Harry Hole solving mysteries all around Oslo and Bergen. ",
"But when the movie starring Michael Fassbender came out, it left Norwegians rather cold (pun intended). ",
"The adaptation was considered clunky and uninspired worldwide, but the failure to deliver a thrilling pace that does justice to Jo Nesbø’s prose and plot was felt even more strongly in Norway. ",
"People couldn’t understand why their favourite character looked so one-dimensional, why his relationship with his colleague Katrine was so much different from the book and, most importantly, why the shots of their beloved Norway looked so chopped and awkward. ",
"At least to the latter, director Tomas Alfredson had a response: ‘We didn’t have enough time to do all the shots,’ he said.",
"\n\nStill from The Snowman | Courtesy of Universal Pictures\n\nUtøya 22. ",
"juli / U- July 22\n\nHow soon is too soon? ",
"When it comes to Anders Behring Breivik’s 2011 terrorist attack in Utøya which resulted in the murder of 69 people, maybe 7 years is way too soon. ",
"And yet, Norwegian director Erik Poppe’s film Utøya 22.juli (also known as U-July 22), just premiered at this year’s Berlin Film Festival — and it depicts, in a 72-minute single take, the teenagers of the Norwegian Labour Party Youth League camp and the desperate struggle for survival until the police finally came. ",
"People are furious about it. ",
"The director however stands by it, claiming that during this 7 years, the unrepentant Breivik has been monopolising the attention of the media and that it was time to show the other side.",
"\n\nElling\n\nOne of three Norwegian films to ever be nominated for an Academy Award, Petter Næss’ Elling is a very tender and good-natured film about a 40-year old autistic man who, after his mother who took care of him dies, ends up in a state institution and has to learn to be functional when he is released. ",
"The controversy here surrounds the depiction of the Norwegian welfare system: although to a non-local it would seem like the state is doing a great job, Norwegians can identify the system’s flaws, depicted (gently) in the movie. ",
"Nevertheless, they mostly loved it — if the fact that it was followed by a prequel and a sequel is any indication.",
"\n\nThe King of Devil’s Island\n\nNowadays, Bastøy island in the Oslo fjord is home to the world’s first ecological prison — with minimum security and the most humane conditions. ",
"But that wasn’t always the case. ",
"In the beginning of the century, it was a correctional facility for boys that faced really hard conditions; hard enough for them to revolt and many of them to die in the process. ",
"The King of Devil’s Island, with an exceptional as always Stellan Skarsgård as the governor who turns a blind eye to one of the boys being sexually assaulted, is controversial because it’s too real a reminder that Norway wasn’t always the human rights paradise it has now become.",
"\n\nStill from The King of Devil’s Island | Courtesy of Palace Films\n\nMax Manus Man of War\n\nMax Manus was a real life resistance fighter during WW2 and one of Norway’s biggest heroes. ",
"The biographical movie Max Manus Man of War focuses on keeping it real — so real, they had to fly a Swastika from Oslo’s actual Parliament while filming. ",
"And exactly because it’s supposed to be a biopic, many people were left wondering why Manu’s character looks so black and white, without any ambiguity. ",
"This ties to a larger conversation about how perhaps the film may be overplaying how effective Norway’s resistance movement actually was… but then again, don’t all war movies overplay the heroic aspect a bit?",
"\n\nMax Manus Man of War | Courtesy of Max Manus Filmen\n\nMonty Python’s The Life of Brian\n\nNowadays Monty Python’s The Life of Brian is considered a classic. ",
"A masterpiece. ",
"Pure comedy gold — but that wasn’t always the case. ",
"Due to its ruthless satire of religion, it was considered blasphemous in many countries back in the day. ",
"Surprisingly, the now famously secular Norway was one of them: The Life of Brian was banned in Norway for 28 years, with the ban finally being lifted in 2008. ",
"In a true Monty Pythonesque turn of events, Swedes decided to take advantage of their neighbours’ ban (and make fun of them in the process), by promoting the film in Sweden as ‘the film so funny that it was banned in Norway.’ ",
"Now that’s an always look at the bright side of life mentality.",
"\n\nStill from Life of Brian | Courtesy of the Official Monty Python Channel"
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0,
0,
0,
0,
0.00641025641025641,
0.004672897196261682,
0,
0.006172839506172839,
0.027586206896551724,
0.009615384615384616,
0.0051813471502590676,
0.0038461538461538464,
0.008130081300813009,
0.014492753623188406,
0.024390243902439025,
0.006802721088435374,
0.006309148264984227,
0,
0.0053475935828877,
0,
0,
0,
0.011428571428571429,
0,
0,
0.007168458781362007,
0.005494505494505495,
0.012987012987012988,
0.006578947368421052,
0,
0.00641025641025641,
0,
0,
0,
0,
0,
0,
0.013513513513513514
] | 0.005067
| 5
|
[
"Be an Election Worker! ",
"Election workers are essential to ensuring that elections are a success. ",
"With each election, millions of Americans dedicate themselves to sustaining the backbone of democracy - our election process. ",
"EAC encourages those interested in becoming election workers at the polls on election day to learn more about what is required and how to sign up to work with your local election official.",
"\n\nGet started and find out if you are eligible. ",
"Go to the State Compendium of Election Worker Laws and Statutes.",
"\n\nFind out if you must be a registered voter in the state. ",
"Find out if there is an age requirement. ",
"Find out if there is a residency requirement. ",
"Find out if a political party affiliation is required.",
"\n\nThen contact your local election office and sign up to be an Election Worker. ",
"They'd be happy to add you to the Election Day Team!"
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0,
0,
0,
0,
0,
0.015625,
0,
0,
0,
0,
0.0125,
0
] | 0.002344
| 5
|
[
"\"If you want to forget Kṛṣṇa, He'll give you opportunity of māyā that you can..., you'll never remember Kṛṣṇa. ",
"You'll forget for good. ",
"And that is His kindness. '",
"You want to forget Me? ",
"All right. ",
"I give you so much facility that you'll never be able to remember Me.' ",
"Therefore the staunch atheist, however you argue with him, however you defeat him... Matir na kṛṣṇe parato svato vā. ",
"They cannot. ",
"They will not. ",
"Because Kṛṣṇa is arranging within: 'Forget. ",
"Don't accept it. ",
"Don't accept it.'",
"\n\nSo this is going on. ",
"Sarvasya cāham hṛdi sanniviṣṭaḥ (BG 15.15). ",
"So for the nondevotees, He's giving facilities to forget. ",
"And for the devotees, who are sincerely seeking Kṛṣṇa's favor, Kṛṣṇa's service, He's giving memorization: 'Yes, you do like this. ",
"Do like this.' ",
"Why does He so? ",
"That is also explained, ye yathā māṁ prapadyante: (BG 15.15) 'As you want Me... If you want Me, to forget, I give you facility to forget. ",
"And if you want Me, to serve, I give you facility to serve.' ",
"That is neutrality. ",
"That is God. ",
"The rascal says, 'Why God has made one devotee and another nondevotee?' ",
"No. ",
"Not God has made. ",
"You wanted to become nondevotee? ",
"He has made you nondevotee: 'All right, you become rascal number one nondevotee.' ",
"And if you want to be devotee? '",
"All right, I'll make you first-class devotee.' ",
"That is God. ",
"Whatever you want, you get facility. ",
"So this is very nice. ",
"Simply if we have actually understood our relationship with Kṛṣṇa, and if we try to serve Him sincerely, then Kṛṣṇa will give you all facilities. ",
"He'll give you intelligence.\""
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.018018018018018018,
0,
0,
0,
0,
0,
0,
0,
0,
0.022727272727272728,
0,
0,
0,
0,
0,
0.015384615384615385,
0,
0,
0.007246376811594203,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.0136986301369863,
0
] | 0.002267
| 5
|
[
"Resolution of left atrial spontaneous echocardiographic contrast after percutaneous mitral valvuloplasty: implications for thromboembolic risk.",
"\nLeft atrial spontaneous echocardiographic contrast (SEC) is an important marker of increased thromboembolic risk in patients with mitral stenosis. ",
"To evaluate the effect of percutaneous transseptal mitral valvuloplasty (PTMV) on SEC, we performed transesophageal echocardiography 1 day before and 3 months after PTMV on 88 consecutive patients. ",
"SEC was present in 65 (74%) patients before PTMV and was associated with absence of moderate or severe mitral regurgitation (p = 0.01), a smaller valve area (p = 0.02), an older age (p = 0.04), and atrial fibrillation (p = 0.05). ",
"At 3 months, PTMV resulted in a mean absolute and relative increase in valve area of 0.54 +/- 0.36 cm2 and 53% +/- 43%, respectively. ",
"SEC resolved in 37 patients but persisted in 28 (32%) patients at the 3-month study. ",
"The absolute and relative increase of valve area and worsened mitral regurgitation after PTMV were predictors of resolution of SEC, with the relative increase in valve area being the only significant predictor on multivariate analysis. ",
"PTMV frequently results in resolution of SEC, which may have important implications in reducing the thromboembolic risk in these patients."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0,
0.006756756756756757,
0.005050505050505051,
0.004347826086956522,
0,
0.011764705882352941,
0.00423728813559322,
0.007246376811594203
] | 0.004925
| 5
|
[
"Save the date note would be great if you can do that. ",
" --Sally \n\n\n\n\n\"White, Cara\" <[email protected]> on 02/15/2001 10:36:29 AM\nTo: \"'[email protected]'\" <[email protected]>\ncc: \"'[email protected]'\" <[email protected]> \nSubject: RE: anniversary\n\n\nSally - HAPPY BIRTHDAY!!!!!!!!!!!!! ",
" Sorry I missed your call last night; I\nwas walking with another prego from the office.",
"\n\nYour payment offer is very generous; I\"m sure we can work it out. ",
" I have\nno problem putting it on my card for now. ",
" We have the go-ahead from Cindy,\ntoo - so I think I will go ahead and confirm with Jeffrey's this week. ",
" When\nyou come in next weekend, maybe we can all look at the sample menus, and get\nthat decided as well.",
"\n\nMaybe we should send a little \"save the date\" note to the cousins to let\nthem know? ",
" I would be glad to do that.",
"\n\nThanks for your input. ",
" I bet I will talk with you later today, on your\nspecial day! ",
" -cara\n\n> -----Original Message-----\n> From: [email protected] [SMTP:[email protected]]\n> Sent: Thursday, February 15, 2001 10:23 AM\n> To: [email protected]; [email protected]\n> Subject: RE: anniversary\n>\n>\n> I think that this looks pretty good, and don't know if we could better the\n> cost too much by looking around. ",
" Cara, would you like for me to hold the\n> reservation on my credit card? ",
" Don't know how much baby stuff may be\n> hitting yours, so I would be glad to do so.",
"\n>\n> I am real comfortable with sharing the costs of this dinner, but don't\n> necessarily feel that we have to split it in thirds. ",
" This is a good year\n> for me to cover a large portion of the cost - when we did the 40th\n> anniversary party, David and I were not in such good shape and I think\n> that Cindy and Richard covered a lot of the costs. ",
" Things ebb and flow -\n> 2000 was a good year at Enron and this would be a good time for me to put\n> some of my reward to good use. ",
" --Sally\n>\n>\n>\n>\n> \"Cindy White\" <[email protected]> on 02/14/2001 05:56:20 PM\n>\n> To: \"Sister\" <[email protected]>, \"White, Cara\"\n> <[email protected]>\n> cc:\n> Subject: RE: anniversary\n>\n>\n> Ok--being the one that probably doesn't really have the dollars to do this\n> I\n> would still say \"yes\"----will try to make room on a credit card for\n> this--have until June so I think it is ok.....\n>\n> Will call the picture lady tomorrow and see what the price would be for\n> that--will email you the results.",
"\n>\n> Sista Cindy\n>\n>\n> -----Original Message-----\n> From: White, Cara [mailto:[email protected]]\n> Sent: Wednesday, February 14, 2001 3:35 PM\n> To: '[email protected]'; '[email protected]'\n> Subject: anniversary\n>\n>\n> Hi, sistas-\n>\n> Here's the scoop on the Josephine House:\n>\n> We can reserve with just a credit card; no deposit required.",
"\n>\n> Parties under 20: $200 room fee. ",
" $50 valet parking fee.",
"\n>\n> I confirmed \"17\" with mom.",
"\n>\n> Heidi sent some sample menus. ",
" A 3-course menu (appetizer or salad,\n> entree,\n> dessert) is $45.",
"\n> A 4-course (same as 3-course plus hors d'oeuvres) sample menu is $52.",
"\n> Each menu could include a choice of three or four options per course. ",
" The\n> food sounds really good.",
"\n>\n> So, here's a guess at cost:\n> 17 people at $45 = $765\n> Beverages = $200\n> Gratuity = $193\n> Valet = $ 50\n> Room rental = $200\n> TOTAL $1408, or $469 per family if we divide it into\n> thirds\n>\n> What do you guys think? ",
" Should we explore other options - or just go\n> with\n> this? ",
" I think Chris and I would be fine with this sort of cost - but\n> probably couldn't go crazy with gift and decorations too. ",
" So, if we\n> really\n> want to do the photo(s) - do we have a cost for these yet?, ",
"we may want to\n> consider other options. ",
" Thoughts? ",
" -cara\n>\n> Cara White\n> Community Development Coordinator\n> USTA Texas Section\n> 1-888-883-6388\n> [email protected]\n>\n>\n>\n>\n>"
] |
{
"pile_set_name": "Enron Emails"
}
|
[
0,
0.028688524590163935,
0,
0,
0,
0.01904761904761905,
0,
0,
0,
0,
0,
0.012012012012012012,
0,
0,
0,
0.013824884792626729,
0.007575757575757576,
0.009633911368015413,
0.017241379310344827,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.008,
0,
0,
0,
0.03076923076923077
] | 0.004317
| 5
|
[
"Menu\n\nHRevolution-how this event is different\n\nSo, you’ve been to dozens of other HR, recruiting, and leadership type events. ",
"You have the “conference routine” down. ",
"You walk into a session, sit down, and zone out for an hour. ",
"When it’s over, you do it all over again until the event is over.",
"\n\nAnd then there’s HRevolution. ",
"You walk into a session and start talking. ",
"When the session’s over, it’s merely a pause in the conversation until you can pick up the thread later with some of the other attendees. ",
"And that’s just one of the pieces that makes this event different from the others. ",
"Check out the video below to learn more about how the event can make an impact on you.",
"\n\nLas Vegas is right around the corner (October 2, 2011), and I hope to see you there. ",
"If you’re ready to get your ticket, head over to the Eventbrite page and make it happen!"
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0
| 5
|
[
"Make sure you vote on the poll on my profile page about who you think should star in the next oneshot in the Last Spark AU.",
"\n\n\"My, my, my, has our little hero forgotten his sword?\"",
"\n\nJaune stood on his knees at the head of his bed his shirt on the floor letting his bare skin shine in the moon light.",
"\n\n\"I need not my sword to slay you foul creature.\" ",
"A grin on his face as a Beowolf mask peeked over the foot of the bed.",
"\n\n\"Oh? ",
"Surely a little human like you couldn't possibly think they could defeat me.\" ",
"The beowolf mask only went down to Ruby's cheeks and her smile hinted what she wanted.",
"\n\n\"I know I can, I still have my trusty 'spear.\" ",
"Ruby pulled herself onto the bed then proceeded to crawl toward him on her hands and knees.",
"\n\n\"So, our little hero thinks he can protect the village all by his lonesome?\" ",
"She mocked, crawling closer and closer.",
"\n\n\"Proceed only if you wish to impale yourself upon my 'shaft.' ",
"Monster.\"",
"\n\nRuby smiled as she finally reached him. ",
"Her hand reached up for his pant's zipper, before slowly bringing it down. ",
"Both shared a smile as her hand reached past the vale of fabric looking for the alleged spear he mentioned.",
"\n\n\"Dad!\"",
"\n\n\"...\"\n\n\"...\"\n\n\"She's calling for you.\" ",
"Ruby mocked, leaving Jaune to groan in annoyance as he zipped up his fly and proceeded to get out of bed. ",
"He grabbed the small cup of water on his night rest and quickly made his way to Summer's room. ",
"He gently cracked the door open and peeked inside to see Summer's silver eye shining in the moonlight back at him.",
"\n\n\"What's wrong?\" ",
"He asked, already knowing what it was.",
"\n\n\"I'm thirsty, and my throat hurts.\" ",
"she stated.",
"\n\nJaune presented the glass and walked over and took a seat on the mattress. ",
"Summer took the glass and gulped down the water, avoiding any spills before giving it back.",
"\n\n\"Thank you.\" ",
"she stated, handing back the glass.",
"\n\n\"Alright, get some sleep sweety, you have school tomorrow.\"",
"\n\n\"If I wake up on time can we go get ice cream again?\"",
"\n\n\"Sure, but only a large this time. ",
"Mom wants me to watch how many treats you get.\"",
"\n\nShe muttered a soft \"Ok,\" while Jaune gave her a kiss on the forehead, and a second on the lips.",
"\n\n\"I love you Summer, get some sleep.\"",
"\n\n\"I love you too.\" ",
"she stated while Jaune walked away and silently closed the door behind him.",
"\n\nHe returned to his room to a lovely sight. ",
"Ruby had stripped her body bare with only the beowolf mask still over the top half of her head. ",
"She laid sprawled out on their bed, giving him a lustful smile and made subtle movements to reroute his blood exactly where she wanted it.",
"\n\n\"Oh no, that poor village. ",
"What is our little hero going to do about it, hm?\" ",
"she teased causing Jaune to leap the two meters onto the bed so he was right on top of her.",
"\n\nLips meet as Jaune quickly placed the empty cup on the end table. ",
"His lips then started trailing down her chin to her neck and continued down her soft skin. ",
"He gave both of her large breast a quick peck, causing her to moan softly before moving toward her belly button. ",
"He went lower and lower before finally Ruby grabbed his head and pulled him back up so his body was over heres.",
"\n\n\"Stop teasing and just spear me already.\" ",
"she demanded.",
"\n\nJaune smiled more than happy to comply with her. ",
"Realizing she just gave him the power he decided to toy with her. ",
"Slowly he pulled down the zipper making Ruby gave a small groan of frustration. ",
"Ruby could feel the fire between her legs demanding he smother it. ",
"A huge smile spread across her face as he finished pulling down his zipper. ",
"He toyed with her for a second longer, taking his sweet time pulling out his-\n\n\"Dad!\"",
"\n\nBoth gave irritated groans over their daughter's repeat offence.",
"\n\n\"Who's idea was it to have kids again?\" ",
"He asked, but was clearly glaring at Ruby.",
"\n\n\"Hey! ",
"You were the one who resolved they wanted to be a father after you got me pregnant that first time.\" ",
"She argued back.",
"\n\n\"Dad!\"",
"\n\n\"Well go on, you're faster. ",
"And be quick about it, I need you to fuck me ASAP. ",
"If I get blue balls I'm going to makes yours turn actual blue!\" ",
"She demanded, letting him know it wasn't up for debate.",
"\n\nJaune rezipped himself before jumping back to the floor and running to Summer's door. ",
"He opened it, though a little less softly then last time. ",
"Summer was still in bed, but she had her blanket pulled up to her face and was was tucked away in the corner of the mattress.",
"\n\n\"What is it?\" ",
"Not recognizing her abnormal behavior.",
"\n\n\"I can't sleep.\" ",
"He figured it out and walked over to her bed before getting on his knees.",
"\n\n\"Is there a monster under your bed?\" ",
"He asked going ahead and looking underneath the bedframe.",
"\n\n\"No, I'm scared the evil lady will come back.\" ",
"He pulled himself upright and looked at her with great concern.",
"\n\n\"Don't worry Summer, she won't be back. ",
"Mommy took care of her.\"",
"\n\n\"But what if she does comeback?\"",
"\n\nHe took a breath, accepting the decision he was making and the pain that would come later. ",
"He pulled Summer's blanket away and scooped her up into his hands.",
"\n\n\"Don't worry, you can sleep with me and mom tonight.\" ",
"For anyone older, they would be able to recognize he was purposely saying it loud enough so everyone in the house could hear him. ",
"Summer through...\n\n\"Shh! ",
"You'll wake mom.\" ",
"Placing her finger to her lips, not realizing she was being almost just as loud.",
"\n\nJaune rolled his eyes, another gesture that went over her head, as he made his way back to his room, swaying the girl in his arms to help her relax. ",
"Ruby was already under the blanket with a longsleeve shirt on, and hopefully a pair of pajama pants underneath the covers.",
"\n\n\"See. ",
"You woke mom up.\" ",
"Summer commented seeing that Ruby was awake.",
"\n\n\"I'm sorry for waking you dear.\" ",
"Playing along with the good role model, part of being a parent.",
"\n\n\"Oh, it's alright. ",
"Here, you want to sleep next to me?\" ",
"Patting the center of the bed for Jaune to lay her down.",
"\n\nJaune set her down, and Summer immediately started to snuggle up next to Ruby while Jaune took his regular spot.",
"\n\nRuby pulled Summer even closer to her before softly whispering into her ear, \"You don't need to be afraid, I'll always be here to protect you.\" ",
"before finishing with a small peck on the forehead.",
"\n\nA minute later, a soft snore escaped Summer. ",
"Ruby looked up at Jaune who had a slightly annoyed glare as he looked back at her.",
"\n\n\"You know I love her with all my heart, but some days she seems to almost be purposely testing that love.\"",
"\n\n\"Wake up early and I'll meet you in the shower.\"",
"\n\nJaune grunted, before turning his gaze to the ceiling and waited for sleep to overtake him, quickly muttering \"Still haven't earned my forgiveness from last time yet either.\" ",
"While he still had the chance.",
"\n\nRuby smiled, he acted like it mattered to him, but in reality it didn't. ",
"She softly scooted Summer over to his side before pulling herself in. ",
"Jaune weaved a hand underneath the two and pulled his rose slightly closer.",
"\n\n\"I love you.\"",
"\n\n\"I love the sex too.\"",
"\n\n\"Ruby.\" ",
"Opening an eye to glare at her.",
"\n\n\"We've said it so many times, I don't think we need to tell each other anymore. ",
"I want to be happy about the other things we have.\"",
"\n\nSummer squirmed in her sleep, but settled down when Ruby gave her a kiss on the forehead. ",
"She looked up to see Jaune still glaring and gave a sigh in defeat.",
"\n\n\"I love you too.\" ",
"Craning her neck out to kiss him on the lips before closing her eyes to let sleep take her. ",
"Having her knight's arm wrapped around her, and Summer safe between them brought unparalleled peace to her mind as she slipped into her wonderland with a smile on her face.",
"\n\nAlright last chapter I said the story was done. ",
"This is the last thing, I planned this since chapter 2 because I wanted to go out on a happy note instead of what the finale was, show things are back to normal for the three so to say. ",
"Also \"The Low Road\" is now officially past its plot skeleton state. ",
"I can't promise when the first chapter will be up, but it is now officially in production.",
"\n\nReview+Fav; till next time cheers."
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0,
0,
0,
0,
0.014492753623188406,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.010526315789473684,
0.017543859649122806,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.02631578947368421,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.023809523809523808,
0,
0,
0,
0,
0,
0,
0,
0,
0.011363636363636364,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.041666666666666664,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.00684931506849315,
0,
0,
0.012195121951219513,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.03225806451612903,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | 0.001564
| 5
|
[
"Packet caching is one of the necessary key technologies in modern communication devices. ",
"The main purpose of the packet caching is to cache data packets in the event of data traffic congestion, so as to avoid or reduce data loss. ",
"With the continuous increase of the communication device speed, packet caching becomes harder and harder, and the main difficulty is in the combination of a large capacity and a high speed.",
"\nA basic requirement on high-end routers and other communication devices is to have a packet cache capable of absorbing wire-speed traffic of at least 200 ms. ",
"This means in the case of 100 Gbps port speed, the devices need be able to cache at least 20 GB of data. ",
"The packet cache also needs to provide a read and write bandwidth that matches the port speed. ",
"The port speed of up to 100 Gbps makes it rather difficult for a low-cost, large-capacity Dynamic Random-Access Memory (DRAM) to serve as the packet cache.",
"\nFor communication devices not requiring such a high caching capacity, like a Layer 2 switch, using an on-chip cache is a simple and low-cost method, where data packets are cached directly in memories inside a chip so as to avoid the extra cost for the use of off-chip memories. ",
"With the method, no off-chip memory device controller or connecting pins are needed, so that the complexity and cost of chip design are lower. ",
"Moreover, the on-chip cache also provides sufficient read and write bandwidth for such communication devices.",
"\nAnother method to increase packet caching capacity while providing the required read and write bandwidth is to use off-chip memories. ",
"High-speed Static Random-Access Memory (SRAM) or dedicated memories such as Reduced Latency Dynamic Random Access Memory (RLDRAM) are often adopted.",
"\nThe universal DRAM is cheap and widely used. ",
"It has over 1 GB of capacity per chip. ",
"The DRAM can provide a large packet cache capacity at a low-cost and with low risks.",
"\nDuring the implementation of the present invention, however, the inventor found that none of the above-described on-chip high-speed caching method, off-chip high-speed caching method and off-chip large-capacity caching method can realize large-capacity, high-speed and low-cost packet caching at the same time. ",
"For example, the on-chip caching method normally provides lower than 10 MB of cache capacity, which is not suitable for high-end routers and Layer 3 switches that require high caching capacities. ",
"SRAM is expensive and the capacity per chip is limited to below 72 MB. ",
"Dedicated memories are also expensive and subject to supply risks. ",
"The universal DRAM has a low read and write efficiency so that the effective bandwidth is restricted and hard to meet the wire speed storage requirement of the high-end communication devices."
] |
{
"pile_set_name": "USPTO Backgrounds"
}
|
[
0,
0,
0,
0,
0.009523809523809525,
0,
0.012903225806451613,
0,
0,
0,
0,
0.006756756756756757,
0,
0,
0,
0,
0,
0.014084507042253521,
0,
0
] | 0.002163
| 5
|
[
"Eventbrite, and certain approved third parties, use functional, analytical and tracking cookies (or similar technologies) to understand your event preferences and provide you with a customised experience. ",
"By closing this banner or by continuing to use Eventbrite, you agree. ",
"For more information please review our cookie policy.",
"\n\nRediscovering Justice: A Service of Hope on the 50th Anniversary of the dea...\n\nActions and Detail Panel\n\nRediscovering Justice: A Service of Hope on the 50th Anniversary of the dea...\n\nWed, 4 April 2018, 12:00 – 13:00 BST\n\nSales Ended\n\nSales Have Ended\n\nRegistrations are closed\n\nThis event is now oversubscribed, however you can register on the waiting list where new tickets will be released if and when they become available.",
"\nYou can also register to attend the Symposium at St Margaret St, London SW1P 3JX (next to the Abbey), where the issue \"What Justice Looks Like\" will be explored more fully. ",
"Visit http://mlk50sym.eventbrite.co.uk\nNote:\nFor the waiting list, you will need to register the name of each individual attendee. ",
"If you only register your name once or multiple times, you will only receive one ticket.",
"\n\nEvent Information\n\nShare this event\n\nDate and Time\n\nLocation\n\nSales Have Ended\n\nRegistrations are closed\n\nThis event is now oversubscribed, however you can register on the waiting list where new tickets will be released if and when they become available.",
"\nYou can also register to attend the Symposium at St Margaret St, London SW1P 3JX (next to the Abbey), where the issue \"What Justice Looks Like\" will be explored more fully. ",
"Visit http://mlk50sym.eventbrite.co.uk\nNote:\nFor the waiting list, you will need to register the name of each individual attendee. ",
"If you only register your name once or multiple times, you will only receive one ticket.",
"\n\nEvent description\n\nDescription\n\nRediscovering Justice Symposium will be held after the service. ",
"Click HERE for details and to register.",
"\n\nRediscovering Justice: A Service of Hope on the 50th Anniversary of the death of Dr Martin Luther King Jr will be held at Westminster Abbey at 12 Noon on Wednesday 4th April 2018.",
"\n\nMartin Luther King Jr was a Baptist minister who led the Civil Rights Movement in the United States from the mid-1950s until his assassination in 1968. ",
"Through his activism and inspirational speeches he played a pivotal role in ending the legal segregation of African-American citizens in the United States, as well as the creation of the Civil Rights Act of 1964 and the Voting Rights Act of 1965. ",
"He was awarded the Nobel Peace Prize in 1964. ",
"Almost three years later, on 4 April 1968, he was shot dead in Memphis. ",
"He was thirty-nine years old.",
"\n\nChristian Aid enjoyed a warm relationship with Dr King. ",
"On his occasional visits to the UK, he would prioritise visits to its offices. ",
"Moreover, alongside the former British Council of Churches, Christian Aid would make appointments for Dr King and helped with his press and media. ",
"We hope this moment would remind us all of the need to continue challenging injustice and inequality and even more - rediscovering and being agents of justice as a worthwhile and significant cause.",
"\n\nDr King is commemorated at the Abbey with a statue above the Great West Door - one of ten statues to 20th century martyrs which were dedicated in 1998.",
"\n\nThe service, held as a partnership between the Abbey with Christian Aid, will focus on three areas that distinguished Dr King’s fight for justice and equality:\n\nHis Motivation – exploring the role of faith in seeking justice\n\nHis Conviction – the passion emanating from the world and circumstances of the marginalised and disadvantaged communities\n\nHis Actions – exploring his approach and what he did to bring about transformation\n\nThe service will be followed by Rediscovering Justice Symposium: Exploring What Justice Looks Like at St Margaret's Church next to the Abbey from 15:00 - 18:00 ( 3:00-6:00pm) to explore these issues more fully. ",
"Tickets for the symposium need to be booked separately at http://mlk50sym.eventbrite.co.uk and the programme will be available in due course.",
"\n\nFAQs\n\nWhat is the entrance I should use to attend the Service ?",
"\n\nEnter via the Sanctuary and Great West Door of the Abbey please and you will be directed accordingly.",
"\n\nWhat are my transport/parking options for getting to and from the event?",
"\n\nAttendees should use public transportation as there is no parking at the Abbey except limited access for disabled parking. ",
"Anyone with special needs should either email : [email protected] or call Matthew Arnoldi on (020) 7654 4846.",
"\n\nThe nearest tube stations are Westminster (Jubilee, Circle and District Lines) and St James Station (Circle and District Line).",
"\n\nYes! ",
"Access will be limited to attendees with tickets. ",
"You may also use your mobile phone if you have downloaded your ticket onto your mobile. ",
"It is a good idea to bring with you a form of photo ID (passport, driver's licence, travel pass) in case you are asked to produce it. ",
"Allow time also for a possible bag search and keep baggage to a minimum.",
"\n\nWhat is the dress code?",
"\n\nFor gents, lounge suit or blazer and trousers, for ladies day dress or smart trousers may be worn. ",
"Hats are optional.",
"\n\nWhat time do the doors open?",
"\n\nBy 10.45 am.",
"\n\nCan I bring a guest?",
"\n\nYou can apply for up to three tickets and you will need to register in the attendees's name unless they are under 16 years of age.",
"\n\nHow long will the Service last?",
"\n\nThe service will last up to one hour.",
"\n\nCan I update my registration information ot transfer my ticket?",
"\n\nYes you may. ",
"Please note : Christian Aid would like to continue the dialogue with attendees, and send to attendees, invitation links to other events they may be interested in, therefore all adult attendees should register please in their own names."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0,
0,
0,
0.004640371229698376,
0.011494252873563218,
0.007633587786259542,
0,
0,
0.011494252873563218,
0.007633587786259542,
0,
0,
0,
0.011049723756906077,
0.012987012987012988,
0,
0,
0,
0,
0.017241379310344827,
0,
0.013605442176870748,
0,
0.006535947712418301,
0.009287925696594427,
0.0070921985815602835,
0.015384615384615385,
0.009708737864077669,
0,
0.008,
0.015625,
0.015503875968992248,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.030303030303030304,
0,
0,
0,
0
] | 0.004392
| 5
|
[
"As he runs for Senate in Utah, Romney’s comments jar with his harsh rebukes of Trump during 2016 campaign\n\nThis article is more than 1 year old\n\nThis article is more than 1 year old\n\nMitt Romney on Friday told reporters he has not been a leader of the “Never Trump” movement among Republicans, a statement that contradicted strongly critical remarks made on the 2016 campaign trail and in the years since.",
"\n\n'He'll be re-elected': Trump and allies tout the sweet smell of 2020 success Read more\n\nThe former Massachusetts governor and 2012 Republican presidential nominee is running for Senate in Utah. ",
"On Friday, he attended a rally in a suburb of Phoenix in support of the GOP senatorial candidate in Arizona, Martha McSally.",
"\n\nAsked, “You led the Never Trump movement, what happened with that?” ",
"a smiling Romney said: “I don’t think that was the case.",
"\n\n“President Trump was not the person I wanted to become the nominee of our party but he’s president now.",
"\n\n“The policies he’s promoted have been pretty effective and I support a lot of those policies. ",
"When there’s a place where I disagree I point that out.”",
"\n\nIn March 2016, Romney opened fire on the then Republican frontrunner when he told a crowd in Salt Lake City: “If we Republicans choose Donald Trump as our nominee, the prospects for a safe and prosperous future are greatly diminished.”",
"\n\nThat jarred with what he added on Friday night in Arizona: “Right now we’re in a place where we’re going to say, ‘Are we going to be guided by conservative principles or are we going to take a sharp turn left?’ ",
"And conservative principles work and that’s why I think people are going to get behind Martha McSally and Republicans across the country.”",
"\n\nAsked if he would support investigations into Trump if he reaches the Senate, Romney smiled and walked away.",
"\n\nTrump smiled and walked away from Romney during his presidential transition, when he dangled the role of secretary of state in front of his rival before choosing the oil executive Rex Tillerson in what many saw as a deliberate humiliation.",
"\n\nRomney subsequently criticised Trump over his equivocal response to the white nationalist protests in Charlottesville, Virginia, and his support for the far-right judge Roy Moore in the Alabama Senate election.",
"\n\nIn his Salt Lake City speech in March 2016, Romney also called Trump a “phony” and a “fraud” and questioned his business acumen. ",
"He kept up his opposition in the months that followed, saying Trump’s effect on the Republican party was “breaking my heart”.",
"\n\nIn response, Trump said Romney “choked like a dog” when running for the nomination in 2008 and the presidency in 2012. ",
"In the latter year, the billionaire said, Romney begged for his endorsement.",
"\n\nMitt Romney says Trump's 'third-grade theatrics' not worthy of presidency Read more\n\n“I could have said, ‘Mitt, drop to your knees’,” Trump said. “",
"He would have dropped to his knees.”",
"\n\nThis year, with Democrats favoured to take the House, Republicans hope a favourable set of Senate contests will help them keep control of the upper chamber.",
"\n\nUtah is a deep-red state which Trump won comfortably in 2016, although an independent anti-Trump conservative, Evan McMullin, won 21% of the vote. ",
"Romney has a clear lead this year, against the Democrat Jenny Wilson.",
"\n\nMcSally is in a much tighter contest, against Kyrsten Sinema. ",
"Neither she nor Romney mentioned Trump in their remarks to the Phoenix rally.",
"\n\nIn May, Romney revealed who he voted for in 2016. ",
"It wasn’t Trump. ",
"Nor was it Hillary Clinton. ",
"Instead, the former nominee cast a write-in vote for his wife, Ann."
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.007407407407407408,
0.00510204081632653,
0.016129032258064516,
0,
0.017857142857142856,
0.009523809523809525,
0,
0,
0.008438818565400843,
0,
0.007246376811594203,
0.02727272727272727,
0.008298755186721992,
0.018867924528301886,
0.015267175572519083,
0.016,
0.01652892561983471,
0.013157894736842105,
0.020134228187919462,
0,
0.012658227848101266,
0.013422818791946308,
0.028985507246376812,
0.015625,
0.025974025974025976,
0.019230769230769232,
0,
0.03571428571428571,
0
] | 0.012374
| 5
|
[
"Thermoanaerobacterales Family IV\n\nThermoanaerobacterales Family IV is a family of rod-shaped, motile bacteria in the order Thermoanaerobacterales of the phylum Firmicutes.",
"\n\nThese microorganisms are spore-forming, anaerobic and moderately thermophilic (growing at optimal temperatures about 50°C) and stain Gram-positive.",
"\n\nBecause of uncertainty in the taxonomic assignment of its members, this family is referred to as \"Incertae sedis\".",
"\n\nReferences \n\nCategory:Bacteria families\n*Thermoanaerobacterales Family IV. ",
"Incertae Sedis\nCategory:Thermophiles\nCategory:Anaerobes"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.005847953216374269,
0.006711409395973154,
0,
0.012987012987012988,
0.01818181818181818
] | 0.008746
| 5
|
[
"Q:\n\nPathfinder not acting correctly\n\nI've taken the A* Algorithm from this example XNA Pathfinder Example so that it will be able to plot a path for a moving goal.",
"\nThe issue I'm having is that it will go in the right general direction but it will keep going back and forth in a line. ",
"I've changed the method so that it calculates a new path every half a second, clear out the previous points from the list and adds the new points to and from what I have debugged I can't find any issue with the points being added to the queue, to be honest I don't have the foggiest idea what is going wrong :/\nThis is the field where the waypoints are being held for the character \nprivate Queue<Vector2> waypoints = new Queue<Vector2>();\n\nThis section is in the update loop and deals with the plotting a new path and laying out the new one onto the list mentioned above.",
"\n timer += gameTime.",
"ElapsedGameTime;\n\n if (timer.",
"Seconds >= 0.5)\n {\n timer = TimeSpan.",
"Zero;\n pathFinder.",
"NewPath(position);\n }\n\n if (pathFinder.",
"SearchStatus == SearchStatus.",
"PathFound)\n {\n waypoints.",
"Clear();\n foreach (Point point in pathFinder.",
"FinalPath())\n {\n Waypoints.",
"Enqueue(level.",
"MapToWorld(point, true));\n }\n moving = true;\n }\n\nThis section is where the waypoints are either taken off or used to set the new position of the character.",
"\n if (moving)\n {\n // If we have any waypoints, the first one on the list is where \n // we want to go\n if (waypoints.",
"Count >= 1)\n {\n destination = waypoints.",
"Peek();\n }\n\n // If we’re at the destination and there is at least one waypoint in \n // the list, get rid of the first one since we’re there now\n if (AtDestination && waypoints.",
"Count >= 1)\n {\n waypoints.",
"Dequeue();\n }\n if (!",
"AtDestination)\n {\n direction = -(position - destination);\n //This scales the vector to 1, we'll use move Speed and elapsed Time \n //to find the how far the tank moves\n direction.",
"Normalize();\n position = position + (direction * MoveSpeed * elapsedTime);\n } \n }\n\nA:\n\nNote: I happened upon this because \"Community\" bumped it and I see that my comment was helpful so I figured I'd post it as an answer.",
"\n\nIs it possible that when it recalculates the next best position, it thinks going \"forth\" is a good idea so it goes that way. ",
"Then, when it checks a half second later, it thinks \"back\" is a good idea and goes back that way since you're erasing the old path?",
"\nAs John McDonald described in the comments, to fix this you could weight the points already on the path so that it's more likely to follow the previous path but isn't necessarily stuck to it.",
"\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0.006134969325153374,
0,
0.0017482517482517483,
0,
0,
0,
0,
0,
0.06896551724137931,
0,
0,
0,
0,
0,
0,
0,
0.003968253968253968,
0,
0.017241379310344827,
0.0034602076124567475,
0.003389830508474576,
0,
0,
0.005208333333333333,
0
] | 0.004405
| 5
|
[
"\n17 Kan. App. ",
"2d 179 (1992)\n835 P.2d 1385\nIn re TWO (2) BOSE SPEAKERS, Serial No. ",
"121098; ONE (1) KENWOOD CASSETTE DECK, Model KX77CW, Serial No. ",
"80806820; ONE (1) KENWOOD TUNER, Model KT87, Serial No. ",
"80431074; and ONE (1) KENWOOD AMPLIFIER, Model KA127, Serial No. ",
"80431384, with remote.",
"\nNo. ",
"66,663\nCourt of Appeals of Kansas.",
"\nOpinion filed June 26, 1992.",
"\nGeary N. Gorup, of The Law Office of Geary N. Gorup, of Wichita, for appellant.",
"\nRachelle Worrall Smith, assistant district attorney, Nola Foulston, district attorney, and Robert T. Stephan, attorney general, for appellee State of Kansas.",
"\nBefore BRISCOE, C.J., RULON and Gernon, JJ.",
"\nPetition for review denied 251 Kan. 938 (1992).",
"\nGERNON, J.:\nThis is an appeal from a court order to return property, which was pawned but was later seized as evidence, to its original owner.",
"\nJerry King, d/b/a King's Pawn Shop, the appellant, took the property from a thief in exchange for a loan of $90. ",
"The pawn ticket indicates that King took the property from L.J.L.J. was never charged with any crime involving the theft of or possession of the property involved. ",
"The property was owned by Barbara Garnes, who reported it stolen. ",
"A police investigation found the property listed on King's pawn slip, where it was seized by the authorities after King signed a consent to search and a release for the property.",
"\nJurisdiction\nKing first challenges the jurisdiction of the district court to order the return of property to its owner when there is no criminal prosecution. ",
"King asserts that, under these circumstances, his interest in the property is superior to that of Garnes'.",
"\nKing argues the statute dealing with seized property requires that a prosecution take place as a condition for the return of property to its \"rightful owner.\" ",
"The statute in question, K.S.A. 22-2512, states in part:\n\"(1) ... Where seized property is no longer required as evidence in the prosecution of any indictment or information, the court which has jurisdiction of such property may transfer the same to the jurisdiction of any other court, including courts of another state or federal courts, where it is shown to the satisfaction of the court that such property is required as evidence in any prosecution in such other court.",
"\n\"(2) When property seized is no longer required as evidence, it shall be disposed of as follows:\n\n*181 \"(a) Property stolen, embezzled, obtained by false pretenses, or otherwise obtained unlawfully from the rightful owner thereof shall be restored to the owner.\"",
"\nKansas courts have addressed the issue of returning stolen property as part of a criminal proceeding, but we find no published case in which the issue was addressed where there was no criminal proceeding.",
"\nIn State v. Gunzelman, 200 Kan. 12, 13-14, 434 P.2d 543 (1967), the court reasoned:\n\"It has been held that property or money lawfully in the hands of law enforcement officials for use as evidence in a criminal proceeding is regarded as being in custodia legis [citations omitted] and subject to the court's order as to disposition thereof in the same proceeding, rather than in a separate action [citations omitted].\"",
"\nMore recently, this court, in State v. Antwine & McHenry, 6 Kan. App.2d 900, 904, 636 P.2d 208 (1981), rev. ",
"denied 230 Kan. 819 (1982), cited the language in Gunzelman referring to evidence in custodia legis (in legal custody). ",
"In Antwine & McHenry, the issue was the conflict between the accused's entitlement to use any exculpatory evidence and the rightful owner's right to the return of his property. ",
"Justice Holmes, sitting with this court, wrote in Antwine & McHenry:\n\"On the other hand, the plight of the victims and owners of physical evidence must also be given due consideration. ",
"It is tragedy enough that a person has been deprived of his property through some criminal act of another without such loss being compounded by any unnecessary delay in returning the property to its rightful owner. ",
"It is the duty of the prosecution and the court to see that a person criminally deprived of property has it restored to him, if possible, at the earliest opportunity consistent with the protection of the rights of both the State and the defendant.\" ",
"6 Kan. App.2d at 903.",
"\nThe property involved here is held in custodia legis. ",
"The question then becomes one of how and under what procedures it may be disposed of.",
"\nKansas courts have authority to hear both civil and criminal cases. ",
"Where no criminal action has been filed, the district court retains in rem jurisdiction over property held in custodia legis. ",
"This action to return property is not converted to a criminal action simply because it was brought by a district attorney. ",
"The language in Antwine & McHenry imposes a duty on the prosecution and *182 the court to restore property to its rightful owner at the \"earliest opportunity,\" consistent with certain due process protections. ",
"To hold otherwise here would allow a pawnshop to potentially receive good title from a thief, hardly a concept to be encouraged by judicial action.",
"\nDue Process\nThe proper disposition of property held in custodia legis is dependent upon certain minimum due process requirements having been met.",
"\n\"At a minimum the essential elements of due process in an action affecting a person's life, liberty or property are notice and an opportunity to be heard at a meaningful time and in a meaningful manner. [",
"Citation omitted.]\" ",
"State v. Durst, 235 Kan. 62, 66, 678 P.2d 1126 (1984).",
"\nThe United States Court of Appeals for the Tenth Circuit, in Wolfenbarger v. Williams, 774 F.2d 358 (10th Cir.1985), recognized that a pawnbroker's possessory interest was sufficient to require due process before the property is returned to its rightful owner.",
"\nHere, although the record does not show how King received notice of the hearing, the record does show that King appeared and had adequate notice to cite legal authorities to the court. ",
"He stated at the hearing that he had contacted an attorney, but that the attorney had a scheduling conflict.",
"\nDue process here requires that King have the opportunity to state his position. ",
"The record supports our conclusion that King had such an opportunity.",
"\nHolder in Due Course\nKing argues that he was a \"purchaser in good faith\" and has a possessory interest against the rest of the world, although he admits that \"a purchaser under defective title might not hold against the true owner.\" ",
"We agree with King on both counts. ",
"The important concept here is that the owner, not the rest of the world, was making the claim against the property.",
"\nEven though King is a good faith purchaser for value, he acquired possession from a thief who had void title, not voidable title, and who had no power to divest the original owner of the property. ",
"See 3 Anderson on the Uniform Commercial Code, *183 §§ 2-401:61 and 2-403:26 (3d ed. ",
"1983); and 63A Am.",
"Jur.2d, Property § 44.",
"\nThe regulations governing pawnbrokers also support the conclusion that a pawnbroker cannot acquire title through a thief. ",
"The Code of the City of Wichita, Charter Ordinance No. ",
"134, § 18 (1991), provides:\n\"When converted or stolen property has been pawned or purchased by a pawnbroker, secondhand dealer, or precious metal dealer and the pawnbroker, secondhand dealer, or precious metal dealer refuses to redeliver such property to the rightful owner upon demand and presentation of a bill of sale or other proper indicia of ownership by the owner, and legal action by the rightful owner to recover the property becomes necessary, the court may assess the pawnbroker, if the court finds that the pawnbroker or secondhand dealer wrongfully withheld the converted or stolen property.\"",
"\nSection 11 requires pawnbrokers to keep detailed records of each transaction and provide a daily report listing all property received to the police department. ",
"Code of the City of Wichita, Charter Ordinance 134, § 11 (1991).",
"\nBecause the pawnbroker is the one who deals with the thief, he or she should bear the risk of accepting stolen property. ",
"The pawnbroker's remedy in this case is to find the thief and recover against the thief for breach of the warranty of title in K.S.A. 84-2-312.",
"\nKing argues that his rights are superior to Garnes' rights in the property because Garnes has been compensated by her insurance company and has signed a release. ",
"There is no evidence in the record, other than King's accusation, to support a conclusion that Garnes assigned her interest in the property to her insurer. ",
"The relationship between Garnes and her insurance company is a matter of contract. ",
"See State v. Houck, 240 Kan. 130, 135, 727 P.2d 460 (1986). ",
"Therefore, any interest the insurer may have in the property is governed by the contract of insurance. ",
"King, who is neither a party to that contract nor an intended third-party beneficiary, cannot enforce the insurer's rights. ",
"See, e.g., Gillespie v. Seymour, 14 Kan. App.2d 563, 796 P.2d 1060 (1990).",
"\nIf the insurer is entitled to subrogation because it has paid Garnes' claim, it is entitled to stand in the shoes of its insured, Western Motor Co. v. Koehn, 242 Kan. 402, 405, 748 P.2d 851 *184 (1988), and assert Garnes' superior rights in the property in question. ",
"It is clear that King's right to possess the property is inferior to that of either Garnes or her insurer, regardless of which party has the ability to assert those rights against King. ",
"After the property is returned to Garnes, her insurer will have the opportunity to assert its subrogation rights against her.",
"\nAffirmed.",
"\n"
] |
{
"pile_set_name": "FreeLaw"
}
|
[
0,
0,
0.015625,
0,
0,
0,
0,
0.029411764705882353,
0,
0.025,
0.0189873417721519,
0.022727272727272728,
0,
0.006993006993006993,
0.008771929824561403,
0.006097560975609756,
0.015151515151515152,
0.011235955056179775,
0,
0.009433962264150943,
0,
0,
0,
0,
0.004784688995215311,
0.01834862385321101,
0.008333333333333333,
0.005649717514124294,
0.010810810810810811,
0,
0.004016064257028112,
0.047619047619047616,
0,
0,
0,
0,
0,
0.004784688995215311,
0,
0,
0,
0,
0,
0.011494252873563218,
0.005376344086021506,
0,
0,
0.014492753623188406,
0.004273504273504274,
0,
0,
0.005050505050505051,
0.023529411764705882,
0,
0,
0,
0.01818181818181818,
0,
0,
0,
0,
0,
0.012269938650306749,
0.01282051282051282,
0.012048192771084338,
0,
0,
0,
0.02702702702702703,
0.011194029850746268,
0.010752688172043012,
0,
0,
0
] | 0.005977
| 5
|
[
"Q:\n\nSql Server 2008 FullText not indexing in background\n\nIs there any way of doing an incremental population not in background? ",
"I want to create a job that will do a incremental population and when it is finished, the job will set a \"end date\" in a table. ",
"For now I need to have 2 jobs, one that actually stats the population and another one that will check if the population is done every X minutes.",
"\n\nA:\n\nI guess there is no way of doing that. ",
"I just talked to a msdn guy about that. ",
"I will implement that verification in my application.",
"\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0,
0,
0,
0,
0,
0,
0
] | 0
| 5
|
[
"---\nabstract: 'We propose a simple yet powerful framework for modeling integer-valued data, such as counts, scores, and rounded data. ",
"The data-generating process is defined by Simultaneously Transforming and Rounding ([<span style=\"font-variant:small-caps;\">star</span>]{}) a continuous-valued process, which produces a flexible family of integer-valued distributions capable of modeling zero-inflation, bounded or censored data, and over- or underdispersion. ",
"The transformation is modeled as unknown for greater distributional flexibility, while the rounding operation ensures a coherent integer-valued data-generating process. ",
"An efficient MCMC algorithm is developed for posterior inference and provides a mechanism for adaptation of successful Bayesian models and algorithms for continuous data to the integer-valued data setting. ",
"Using the [<span style=\"font-variant:small-caps;\">star</span> ]{}framework, we design a new Bayesian Additive Regression Tree ([<span style=\"font-variant:small-caps;\">bart</span>]{}) model for integer-valued data, which demonstrates impressive predictive distribution accuracy for both synthetic data and a large healthcare utilization dataset. ",
"For interpretable regression-based inference, we develop a [<span style=\"font-variant:small-caps;\">star</span> ]{}additive model, which offers greater flexibility and scalability than existing integer-valued models. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}additive model is applied to study the recent decline in Amazon river dolphins.'",
"\nauthor:\n- 'Daniel R. Kowal[^1] and Antonio Canale[^2]'\nbibliography:\n- 'refs.bib'\ntitle: 'Simultaneous Transformation and Rounding (STAR) Models for Integer-Valued Data'\n---\n\n[**KEYWORDS: additive models, BART, count data, nonparametric regression**]{}\n\nIntroduction\n============\n\nA challenging scenario for prediction and inference occurs when the outcome variables are integer-valued, such as counts, (test) scores, or rounded data. ",
"Integer-valued data are ubiquitous in many fields, including epidemiology [@osthus2018dynamic; @kowal2019measles], ecology [@dorazio2005improving], and insurance [@bening2012generalized], among many others [@cameron2013regression]. ",
"Counts often serve as an indicator of demand, such as the demand for medical services [@deb1997demand], emergency medical services [@matteson2011forecasting], and call center access [@shen2008interday]. ",
"Integer-valued data are discrete data, and exhibit a variety of complex distributional features including zero-inflation, skewness, over- or underdispersion, and in some cases may be bounded or censored. ",
"Consequently, prediction and modeling of integer-valued data—in the presence of predictors, over time intervals, and across spatial locations—remains a significant challenge.",
"\n\nThe most widely-used models for integer-valued data build upon the Poisson distribution. ",
"However, the limitations of the Poisson distribution are well-known: the distribution is not sufficiently flexible in practice and cannot account for zero-inflation or over- and underdispersion. ",
"A common strategy is to generalize the Poisson model by introducing additional parameters, such as the quasi-Poisson [@mccullagh1989generalized], negative-binomial [@hilbe2011negative], zero-inflated Poisson or negative-binomial [@cameron2013regression; @neelon2019bayesian], lognormal Poisson [@zhou2012lognormal], restricted generalized Poisson [@famoye1993restricted], and Conway-Maxwell Poisson models [@shmueli2005useful; @lord2008application; @sellers2010flexible]. ",
"A fundamental limitation of these approaches is that the additional parameters can introduce formidable challenges for estimation and computational scalability, especially in conjunction with regression, temporal, or spatial models.",
"\n\nIn practice, however, it is exceedingly common for the discrete nature of the data to be ignored. ",
"Practitioners often log- or square-root-transform the observed integer-valued data and subsequently apply methods designed for continuous or Gaussian data. ",
"However, transformations to Gaussianity are ineffective for small counts [@warton2018you], while log-transformations introduce difficulties in the presence of zeros [@o2010not]. ",
"More broadly, these approaches are not well-defined for integer-valued data: the data-generating process for a (transformed) Gaussian model cannot produce discrete data, which immediately amplifies model misspecification, limits interpretability, and undermines the reliability of inference and predictive distributions.",
"\n\nTo address these challenges, we propose a coherent modeling framework for integer-valued data. ",
"The process is defined by *simultaneously transforming and rounding* ([<span style=\"font-variant:small-caps;\">star</span>]{}) a continuous-valued process. ",
"First, a *continuous-valued process* is specified to model the dependence between (latent) variables. ",
"We focus on conditionally Gaussian regression models, but the [<span style=\"font-variant:small-caps;\">star</span> ]{}framework applies more broadly. ",
"Second, the latent variables are *transformed* for greater distributional flexibility. ",
"While the transformation may be specified in advance, such as logarithmic or square-root, we develop both parametric and nonparametric approaches to learn the transformation from the data, which improves predictive accuracy. ",
"Lastly, the transformed latent variables are filtered through a *rounding operator* mapping them to the (nonnegative) integers. ",
"This construction is inspired by the popular approach of transforming count data and applying Gaussian models, yet produces a mathematically consistent and well-defined integer-valued process. ",
"Importantly, we show that [<span style=\"font-variant:small-caps;\">star</span> ]{}processes are not merely *valid* integer-valued distributions, but also *flexible* integer-valued distributions, and can account for zero-inflation, bounded or censored data, and over- or underdispersion.",
"\n\nAnother major benefit of [<span style=\"font-variant:small-caps;\">star</span> ]{}is its computational modularity: using a simple and efficient data augmentation technique, existing computational tools for Bayesian inference under continuous data models can be used for Bayesian inference under [<span style=\"font-variant:small-caps;\">star</span> ]{}models. ",
"As a result, [<span style=\"font-variant:small-caps;\">star</span> ]{}provides a cohesive framework for seamlessly adapting state-of-the-art continuous data models and algorithms to the integer-valued data setting. ",
"Using the [<span style=\"font-variant:small-caps;\">star</span> ]{}framework, we design—among others—a new Bayesian Additive Regression Tree ([<span style=\"font-variant:small-caps;\">bart</span>]{}) model for integer-valued data. ",
"The resulting [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model combines the integer-valued distributional flexibility provided by [<span style=\"font-variant:small-caps;\">star</span> ]{}with the predictive and computational advantages inherent to [<span style=\"font-variant:small-caps;\">bart</span>]{}. ",
"For synthetic data and a large healthcare utilization dataset (Section \\[sims\\]-\\[sec-dolphins\\]), the predictive performance of [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}far exceeds that of competing methods which do not include *both* transformation and rounding in terms of out-of-sample predictive accuracy, model adequacy, and computational scalability. ",
"We also apply [<span style=\"font-variant:small-caps;\">star</span> ]{}to study the recent decline in the tucuxi dolphin population, which inhabit the Amazon River. ",
"Using field survey data conducted by [@da2018both] from 1994 to 2017, we develop a [<span style=\"font-variant:small-caps;\">star</span> ]{}additive model for the number of observed tucuxi dolphins, which includes a smooth regression term for important predictor variables such as the year, day-of-year, and water level. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}additive model is interpretable yet flexible, and demonstrates favorable performance in model fit and computational efficiency relative to existing integer-valued models.",
"\n\nThe remainder of the paper is organized as follows. ",
"Section \\[star\\] introduces the [<span style=\"font-variant:small-caps;\">star</span> ]{}framework, develops models for the unknown transformation, describes important properties, and discusses computational details for posterior inference. ",
"Section \\[model-ex\\] provides example [<span style=\"font-variant:small-caps;\">star</span> ]{}models, which are applied to simulated data in Section \\[sims\\] and real data in Sections \\[sec-nmes\\] and \\[sec-dolphins\\]. ",
"Section \\[discuss\\] concludes. ",
"Additional simulation results and empirical comparisons are in the Appendix. ",
"Methods are implemented in the `R` package `rstar` available on GitHub.",
"\n\nSimultaneously transforming and rounding {#star}\n========================================\n\nConsider a count-valued stochastic process $y\\!:\\mathcal{X}\\to \\mathcal{N}$, where $\\mathcal{X}$ may correspond to predictors, times, or spatial locations and $\\mathcal{N} = \\{0,\\ldots,\\infty\\}$. Although we focus on the nonnegative integers, our procedure may be trivially modified for integer-valued data and rounded data. ",
"Our goal is to construct a joint probability distribution for $y$ that simultaneously builds upon successful approaches for continuous stochastic processes (observed on $\\mathbb{R}$ or $\\mathbb{R}^+$), yet produced a flexible and well-defined distribution on $\\mathcal{N}$.\n\nTo this end, we first introduce continuous-valued process $y^*\\!:\\mathcal{X}\\to\\mathcal{T}$, $\\mathcal{T} \\subseteq \\mathbb{R}$ related to the observed count-valued data $y$ via $$\\label{round}\ny = h(y^*), $$ where $h\\!: ",
"\\mathcal{T}\\to \\mathcal{N}$ is a *rounding* operator that sets $y(x) = j$ when $y^*(x) \\in \\mathcal{A}_j$ and $\\{\\mathcal{A}_j\\}_{j=0}^\\infty$ is a known partition of $\\mathcal{T}$. For example, we may use the floor function defined by $\\mathcal{A}_j = [a_j, a_{j+1}) = [j, j+1)$ for $j \\in \\mathcal{N}$; modifications are available for zero-inflated, bounded, or censored data (Section \\[sec-properties\\]). ",
"The process $y^*$ operates as a continuous proxy for the observed counts $y$, which is more convenient for modeling, yet has a simple mapping to the observable data in . ",
"Naturally, the properties of the count-valued process $y$ will be determined by the rounding operator $h$ and the distribution of the continuous-valued process $y^*$.\n\nWe propose to induce a distribution on $y^*$ by *transforming* $y^*$ and specifying a distribution $\\Pi_\\theta$ on the transformed scale: $$\\label{transform}\ng(y^*) = z^*, \\quad z^* \\sim \\Pi_\\theta,$$ where $g\\!:\\mathcal{T} \\to \\mathbb{R}$ is a strictly monotone function. ",
"Model is inspired by the common practice of transforming count data prior to application of continuous (Gaussian) models. ",
"However, the [<span style=\"font-variant:small-caps;\">star</span> ]{}framework of - defines an integer-valued process for $y$, in which the transformation $g$ may be modeled as unknown for greater distributional flexibility.",
"\n\nWhile [<span style=\"font-variant:small-caps;\">star</span> ]{}is sufficiently general to incorporate any continuous family of stochastic process $\\Pi_\\theta$ for the latent $z^*$, an important special case of is the conditionally Gaussian regression model: $$\\label{simpleGP}\nz^*(x) = \\mu(x) + \\epsilon(x), \\quad \\epsilon(x) \\stackrel{indep}{\\sim} N(0, \\sigma^2(x)),$$ where $\\mu(x)$ is the conditional expectation of $z^*(x)$ and the errors $\\epsilon(x)$ are independent but possibly heteroscedastic, conditional on $x \\in \\mathcal{X}$. Examples of include linear and additive models (Section \\[sec-am\\]) and [<span style=\"font-variant:small-caps;\">bart</span> ]{}(Section \\[sec-bart\\]), with extensions for mixed effects models, spatio-temporal models, dynamic linear models, and factor models, among others.",
"\n\nRounding of a continuous process has appeared previously in the literature [@canale2011bayesian; @canale2013nonparametric]. ",
"Our key innovation is the coupling of the *transformation* with the regression model . ",
"The transformation $g$, which we model as unknown, endows the integer-valued process $y$ with greater distributional flexibility, yet leaves model unchanged. ",
"This construction allows seamless integration of Bayesian models *and* algorithms for continuous data of the common form into the integer-valued [<span style=\"font-variant:small-caps;\">star</span> ]{}framework, with efficient posterior inference available via a general MCMC algorithm (Section \\[mcmc\\]). ",
"As demonstrated extensively in the simulations and applications (Sections \\[sims\\]-\\[sec-dolphins\\]), models that fail to include *both* rounding and transformation cannot match the predictive performance of [<span style=\"font-variant:small-caps;\">star</span> ]{}models.",
"\n\nThe distribution of $y$ is completely determined by the rounding operator $h$, the transformation $g$, and the distribution $\\Pi_\\theta$. Specifically, the probability mass associated to $y(x) = j$ for each integer $j\\in \\mathcal N$ is $$\\label{pmf}\n\\mathbb{P}\\{y(x) = j\\} = \\mathbb{P}\\left\\{y^*(x) \\in \\mathcal{A}_j\\right\\} = \\mathbb{P}\\left\\{z^*(x) \\in g(\\mathcal{A}_j)\\right\\}.$$ The distribution of $z^*$ is given by $\\Pi_\\theta$, while $g(\\mathcal{A}_j)$ is determined by the transformation $g$ and the rounding operator $h$. For model and $\\mathcal{A}_j = [a_j, a_{j+1})$, simplifies to $$\\label{simpleDist}\n\\mathbb{P}\\{y(x) = j\\} = \\Phi\\left( \\frac{g(a_{j+1}) - \\mu(x)}{\\sigma(x)}\\right) - \\Phi\\left( \\frac{g(a_{j}) - \\mu(x)}{\\sigma(x)}\\right).$$\n\nThe distribution in is related to, yet distinct from, ordinal regression [@mccullagh1980regression]. ",
"In ordinal regression, each term $g(a_j)$ in is replaced by an unknown latent threshold, say $\\omega_j$, with an ordering constraint $\\omega_j \\le \\omega_{j+1}$ for all $j$. However, the latent thresholds $\\omega_j$ are based only on the *ranks* of the observed data, and therefore ignore the information contained in the numeric values of the observed counts. ",
"Furthermore, since each threshold $\\omega_j$ is unknown, ordinal regression introduces a new parameter for each unique data value, and therefore produces a heavily-parametrized model that is challenging to estimate. ",
"By comparison, [<span style=\"font-variant:small-caps;\">star</span> ]{}is substantially more parsimonious: if $g$ is known, no new parameters are needed, while if $g$ is unknown, only a small number of parameters are needed (see Section \\[sec-transform\\]).",
"\n\n[<span style=\"font-variant:small-caps;\">star</span> ]{}is fundamentally different from simply rounding the predictions from a continuous data model $\\Pi_\\theta$. *Post hoc* rounding ignores the discrete nature of the data in model-fitting, and consequently introduces a disconnect between the *fitted model* and the model used for *prediction*. [",
"<span style=\"font-variant:small-caps;\">star</span> ]{}clearly avoids this issue, and maintains the benefits of using well-known models for continuous data while producing a coherent integer-valued predictive distribution.",
"\n\nThe transformation $g$ {#sec-transform}\n----------------------\n\nThe transformation $g$ is a crucial component of [<span style=\"font-variant:small-caps;\">star</span>]{}. ",
"When $g(t) = t$ and $z^*$ is a draw from a Gaussian process, [<span style=\"font-variant:small-caps;\">star</span> ]{}simplifies to [@canale2013nonparametric]. ",
"However, the identity transformation is suboptimal in many cases (see Sections \\[sec-nmes\\] and \\[sec-dolphins\\]). ",
"The popularity of log-linear models for count data, especially Poisson and negative-binomial models, suggests that regression effects $\\mu(x)$ are often multiplicative for count data, and that the log-transformation $g(t) = \\log(t)$ may be preferable for many applications. ",
"Similarly, the square-root transformation $g(t) = \\sqrt{t}$ is the variance-stabilizing transformation of the Poisson distribution, and therefore is a common choice in applications of Gaussian methods to transformed count data. ",
"Empirically, the simulation studies and real data analyses in Sections \\[sims\\]-\\[sec-dolphins\\] demonstrate that the transformation $g$ provides substantial improvements in modeling flexibility and accuracy relative to an untransformed approach.",
"\n\nWhen $g$ is fixed and known, the only unknowns are the parameters $\\theta$ in the distribution $\\Pi_\\theta$ of the latent data $z^*$ in . ",
"Relative to the analogous transformed continuous-valued model, say $g(y) \\sim \\Pi_\\theta$, the number of parameters is the same, yet [<span style=\"font-variant:small-caps;\">star</span> ]{}produces a coherent integer-valued process. ",
"A fixed transformation $g$ shares some characteristics with the link function of a generalized linear model (GLM) [@mccullagh1989generalized]. ",
"For GLMs, the link function maps the expectation of an exponential family distribution to $\\mathbb{R}$, which is modeled using a linear predictor. ",
"By comparison, [<span style=\"font-variant:small-caps;\">star</span> ]{}maps the continuous-valued $y^*$ to [$\\mathbb{R}$ ]{}and under models $\\mathbb{E}[g\\{y^*(x)\\} | x] = \\mathbb{E}\\{z^*(x) | x\\} = \\mu(x)$.\n\nFor general application of [<span style=\"font-variant:small-caps;\">star</span>]{}, pre-specification of a transformation $g$ is restrictive. ",
"By allowing the data to inform $g$, the implied distribution for $y$ becomes more flexible, and the risk of model misspecification is lessened. ",
"For GLMs, [@mallick1994generalized] similarly relax the assumption of a known link function, adopting a nonparametric approach. ",
"For [<span style=\"font-variant:small-caps;\">star</span>]{}, we require that the functions $g$ satisfy the following properties: (i) *monotonicity*, which preserves the ordering of the observed integers in the transformed latent space; (ii) *smoothness*, which provides regularization by encouraging information-sharing among nearby values; and (iii) *shrinkage* toward a pre-specified transformation, such as log or square-root.",
"\n\nA natural parametric specification for $g$ satisfying the aforementioned criteria is the (signed) *Box-Cox* transformation [@box1964analysis]: $$\\label{box-cox}\ng(t ; \\lambda) = \n\\{\\mbox{sgn}(t)|t|^\\lambda - 1\\}/\\lambda, \\quad \\lambda > 0 $$ with $g(t; \\lambda =0) = \\log(t)$. Box-Cox functions are a popular choice for transforming continuous data towards Gaussianity, which in the present setting is similar to when $\\Pi_\\theta$ is Gaussian. ",
"Important special cases of include the (shifted) identity transformation $g(t; \\lambda = 1) = t-1$, the (shifted and scaled) square-root transformation $g(t; \\lambda = 1/2) = 2\\sqrt{|t|} - 2$, and the log-transformation. ",
"To learn the shape of the transformation, we place a prior on $\\lambda$: we recommend $\\lambda \\sim N(1/2, 1)$ truncated to $[0,3]$, which shrinks $g$ toward the (shifted and scaled) square-root transformation.",
"\n\nFor additional flexibility, we also consider fully nonparametric specification for $g$. Consider an I-spline basis expansion [@ramsay1988monotone] for $g$:$$\\label{nonparag}\ng(t) = b_I'(t) \\gamma,$$ where $ b_I$ is an $L$-dimensional vector of I-spline basis functions and $ \\gamma$ are the unknown basis coefficients. ",
"Since each I-spline basis function is monotone increasing, we ensure monotonicity of $g$ by restricting the elements of $\\gamma$ to be positive. ",
"We propose a prior for $\\gamma$ in that simultaneously enforces monotonicity, smoothness, and shrinkage toward a pre-specified transformation. ",
"However, care must be taken to ensure identifiability of the [<span style=\"font-variant:small-caps;\">star</span> ]{}model and retain interpretability of the parameters $\\theta$ in $\\Pi_\\theta$. For model , arbitrary shifting and scaling of $g$ can be matched by shifting and scaling of $\\mu$ and $\\sigma$. The parametric transformation preserves identifiability: $g(1, \\lambda) = 0$ for all $\\lambda$ (shift constraint) and the prior on $\\lambda$ is weakly informative (scale constraint). ",
"For nonparametric $g$ in , we resolve the identifiability issue by fixing $g(0) = 0$ (shift constraint), which is satisfied automatically due to the I-spline construction, and $\\lim_{t\\rightarrow\\infty} g(t) = 1$ (scale constraint), which is enforced by constraining $\\sum_{\\ell=1}^L \\gamma_\\ell = 1$. Specifically, let $$\\label{prior-gamma}\n \\gamma_\\ell = \\tilde \\gamma_\\ell/\\sum_{k = 1}^L \\tilde \\gamma_k, \\quad \\tilde\\gamma_\\ell \\stackrel{indep}{\\sim}N_+(\\mu_{\\gamma_\\ell}, \\sigma_\\gamma^2), \\quad \\ell = 1,\\ldots,L,$$ where $N_+$ is the half-normal distribution. ",
"Clearly, $\\gamma_\\ell > 0$ for each $\\ell$ and $\\sum_{\\ell=1}^L \\gamma_\\ell = 1$, which guarantees monotonicity of $g$ and preserves identifiability of model . ",
"We select the prior mean $ \\mu_\\gamma = (\\mu_{\\gamma_1},\\ldots, \\mu_{\\gamma_L})'$ such that $g(t)$ is *a priori* centered around a parametric function of interest, such as with fixed $\\lambda = \\lambda_0$, and model $\\sigma_{\\gamma}^2$ with an inverse-Gamma prior to allow the data to determine the amount of shrinkage toward the parametric function of interest. ",
"Let $\\bm t_g = (0,1,\\ldots, a_{\\max y_i + 1}\\})'$ and let $ B_I$ be the I-spline basis evaluated at $\\bm t_g$, so $g(\\bm t_g) = B_I \\gamma$. We solve $ \\tilde\\mu_\\gamma = \\arg\\min_{ \\mu_\\gamma} || g(\\bm t_g; \\lambda_0) - B_I \\mu_\\gamma||^2$ subject to $\\tilde\\mu_{\\gamma_\\ell} > 0$ for $\\ell=1,\\ldots,L$, which is a one-time cost, and normalize $\\mu_{\\gamma_\\ell} = \\tilde\\mu_{\\gamma_\\ell}/\\sum_{k=1}^L \\tilde\\mu_{\\gamma_k}$. In the simulations and applications of Sections \\[sims\\]-\\[sec-dolphins\\], we fix $\\lambda_0 = 1/2$ and model $\\sigma_{\\gamma}^{-2} \\sim\\mbox{Gamma}(0.001, 0.001)$.\n\nWe use quadratic I-splines with $L = 2 + \\min\\{(\\mbox{\\# unique } y_i)/4, 10\\}$ knots, implemented using the `splines2` package in `R` [@splines2]. ",
"Boundary knots are placed at zero and $\\max \\{y_i\\}$, while the $L-2$ interior knots selected using the sample quantiles of $\\{y_i\\}$ excluding zero, one, and $\\max \\{y_i\\}$, with an interior knot placed at one to improve distributional flexibility near zero. ",
"Since [@ramsay1988monotone] use $L=3$ or $L=5$ in all monotone spline examples, a small number of knots may be adequate in many cases.",
"\n\nModel properties {#sec-properties}\n----------------\n\nBy design, [<span style=\"font-variant:small-caps;\">star</span> ]{}builds upon models for continuous data, such as those in Section \\[model-ex\\], and adapts them for integer-valued data. ",
"Yet [<span style=\"font-variant:small-caps;\">star</span> ]{}is not merely a mechanism for producing valid integer-valued processes: [<span style=\"font-variant:small-caps;\">star</span> ]{}also provides important distributional properties for modeling integer-valued data in practice. ",
"By careful selection of the rounding operator $h$ and the transformation $g$, [<span style=\"font-variant:small-caps;\">star</span> ]{}provides the capability to model zero-inflation, bounded or censored data, and over- or underdispersion.",
"\n\nIn applications with count data, it is common to observe an abundance of zeros, $y(x) = 0$. [<span style=\"font-variant:small-caps;\">star</span> ]{}can be parametrized such that zero counts occur whenever $z^*(x)$ is negative:\n\n\\[lem:zeroinflation\\] For any [<span style=\"font-variant:small-caps;\">star</span> ]{}model with $g(\\mathcal{A}_0) = (-\\infty, 0)$, we have (i) $y(x) = 0$ if and only if $z^*(x) < 0$ and (ii) $\\mathbb{P}\\{y(x) = 0\\} = \\mathbb{P}\\{z^*(x) \\leq 0\\}.$\n\nLemma \\[lem:zeroinflation\\] is valid for known or unknown transformations, and is easily satisfied for letting $\\mathcal{A}_0 = (a_0, a_1) = (-\\infty, 1)$ for $\\lambda \\ne 0$ and $\\mathcal{A}_0 = (a_0, a_1) = (0, 1)$ for $\\lambda = 0$. For model , $\\Pi_\\theta$ is conditionally Gaussian, which may place substantial prior mass on $z^*(x) < 0$ and thus $y(x) = 0$. Therefore, [<span style=\"font-variant:small-caps;\">star</span> ]{}has a built-in and interpretable mechanism for handling zero counts, and does not require the addition of an artificial constant to the transformation, such as $\\log(y+1)$. Furthermore, dependence among zero values is implicit in the model: $\\mathbb{P}\\{y(x) = 0, y(x') = 0\\} = \\mathbb{P}\\{z^*(x) < 0, z^*(x') < 0\\}$ depends on the joint distribution of $(z^*(x), z^*(x'))$, which is modeled by $\\Pi_\\theta$.\n\nAnother common characteristic of count-valued data is a deterministic upper bound $K$. For instance, if $y$ counts the number of days on which an event occurred in a given year, then $y(x) \\in \\{0,1,\\ldots,K\\}$ and $K = 365$. [<span style=\"font-variant:small-caps;\">star</span> ]{}can easily incorporate this information into the distribution for $y$ as formalized in the next lemma.",
"\n\n\\[bounded\\] For any [<span style=\"font-variant:small-caps;\">star</span> ]{}model, letting $g(\\mathcal{A}_K) = [g(a_K), \\infty)$ implies $\\mathbb{P}\\{y(x) \\le K\\} = 1$.\n\nThe boundedness constraints in Lemma \\[bounded\\] are compatible with any choice of (unconstrained) continuous-valued model and do not require modification of the algorithms for estimation and inference in Section \\[mcmc\\]. ",
"Similar to the case of zero values in Lemma \\[lem:zeroinflation\\], [<span style=\"font-variant:small-caps;\">star</span> ]{}allows for dependence among $y$ values that attain the upper bound: $\\mathbb{P}\\{y(x) = K, y(x') = K\\} = \\mathbb{P}\\{z^*(x) \\ge g(a_K), z^*(x') \\ge g(a_K)\\}$, which again is modeled by or . ",
"When $K=1$, the [<span style=\"font-variant:small-caps;\">star</span> ]{}model with $\\mu(x) = x'\\beta$ and $\\sigma^2(x) = 1$ simplifies to probit regression.",
"\n\nInterestingly, the construction in Lemma \\[bounded\\] is coherent under right-censoring, which occurs when an observed count value of $K$ implies that $y(x) \\ge K$. Right-censoring is common in surveys, where large values are often grouped together. ",
"The following lemma formalizes the properties of [<span style=\"font-variant:small-caps;\">star</span> ]{}subject to right-censoring of the observations.",
"\n\n\\[censor\\] Let ${\\textsc{star} }(h, g, \\Pi_\\theta)$ denote model - with rounding operator $h$, transformation $g$, and latent distribution $\\Pi_\\theta$. For right-censored observations $y_c(x) = \\min\\{y(x), K\\}$ with $y \\sim {\\textsc{star} }(h, g, \\Pi_\\theta)$ and $y_c \\sim {\\textsc{star} }(h', g, \\Pi_\\theta)$ such that $h$ and $h'$ satisfy $a_K = a'_K$ and $\\mathcal{A}'_K = [a_K, \\infty)$, we have $\\mathbb{P}\\{y(x) \\ge K\\} = \\mathbb{P}\\{z^*(x) \\ge g(a_K)\\} = \\mathbb{P}\\{y_c(x) = K\\}$.\n\nFor right-censored data, the likelihood includes terms of the form $\\mathbb{P}\\{y(x) \\ge K\\}$ for censored observations. ",
"Lemma \\[censor\\] shows that the censored likelihood terms under a [<span style=\"font-variant:small-caps;\">star</span> ]{}model for $y$ are equivalent to the non-censored likelihood terms $\\mathbb{P}\\{y_c(x) = K\\}$ under a [<span style=\"font-variant:small-caps;\">star</span> ]{}model for $y_c = \\min\\{y(x), K\\}$ with $\\mathcal{A}'_K = [a_K, \\infty)$. Remarkably, [<span style=\"font-variant:small-caps;\">star</span> ]{}preserves the correct right-censored likelihood for $y$ by directly modeling the observed counts $y_c$ and setting $\\mathcal{A}_K' = [a_K, \\infty)$, with no further modifications needed for the model specification or estimation procedure. ",
"By comparison, common parametric approaches for modeling count data, such as the Poisson model and its generalizations, require careful modifications of the likelihood and tailored algorithms for estimation and inference in the case of right-censoring. ",
"Naturally, a similar approach is available for left-censoring.",
"\n\nLastly, we show that [<span style=\"font-variant:small-caps;\">star</span> ]{}processes are capable of modeling over- or underdispersion. ",
"In Figure \\[fig:star-summary-sqrt\\], we illustrate the relationships among the expectation $\\mathbb{E}[y]$, the variance $\\mbox{Var}(y)$, and the probability of zeros $\\mathbb{P}(y=0)$ for a [<span style=\"font-variant:small-caps;\">star</span> ]{}process defined by $z^* \\sim N(\\mu,\\sigma^2)$ and transformation with $\\lambda = 1/2$. For different values of the parameters the [<span style=\"font-variant:small-caps;\">star</span> ]{}process exhibits different features, including overdispersion, underdispersion, and zero-inflation.",
"\n\n![",
"$\\mathbb{E}[y]$ and $\\mbox{Var}(y)$ (top) and $\\mathbb{P}(y=0)$ (bottom) for a [<span style=\"font-variant:small-caps;\">star</span> ]{}process defined by $z^* \\sim N(\\mu, \\sigma^2)$ and transformation with $\\lambda = 1/2$ for various $(\\mu, \\sigma)$ pairings. ",
"The dashed gray lines corresponds to $\\mathbb{E}[y]=\\mbox{Var}(y)$ (top) and $\\mathbb{P}(y=0) = 0$ (bottom). [",
"<span style=\"font-variant:small-caps;\">star</span> ]{}processes may include underdispersion (top left), overdispersion (top right), and zero-inflation (bottom). ",
"\\[fig:star-summary-sqrt\\]](summary_sqrt.pdf){width=\"100.00000%\"}\n\nPosterior inference {#mcmc}\n-------------------\n\nWe develop a general Markov Chain Monte Carlo (MCMC) algorithm for Bayesian inference under [<span style=\"font-variant:small-caps;\">star</span>]{}. ",
"The hierarchical construction of [<span style=\"font-variant:small-caps;\">star</span> ]{}in - is accompanied by a computationally convenient data augmentation strategy, which we leverage to incorporate existing sampling techniques for the unknown parameters $\\theta$ in . ",
"To emphasize the modularity of the proposed approach, we omit model-specific details for sampling $\\theta$ until Section \\[model-ex\\].",
"\n\nLet $\\mathcal{D} = \\{x_i, y_i\\}_{i=1}^n$ denote the observed pairs of points $x_i \\in \\mathcal{X}$ and integer-valued data $y_i = y(x_i)$. Consider a Bayesian specification of with suitable prior on $\\theta$ and an algorithm $\\mathbb{A}$ which draws from the posterior distribution of $\\theta$ given the (continuous) data. ",
"The sampling algorithm $\\mathbb{A}$ is designed for continuous data, such as (Gaussian) additive models or [<span style=\"font-variant:small-caps;\">bart</span>]{}, depending on the different choices for $\\Pi_\\theta$ (see Section \\[model-ex\\] for details). ",
"The posterior sampling algorithm for [<span style=\"font-variant:small-caps;\">star</span> ]{}defines a Gibbs sampler by combining a data augmentation step with algorithm $\\mathbb{A}$ as follows:\n\n1. ",
" Sample $\\left[z^*(x_i) \\mid \\mathcal{D}, \\theta\\right]$ from $\\Pi_\\theta$ truncated to $z^*(x_i) \\in g(\\mathcal{A}_{y_i})$ for $i =1, \\dots n$;\n\n2. ",
" Sample $\\left[\\theta \\mid \\bm z^* \\right]$ using algorithm $\\mathbb{A}$ conditioning on $\\bm z^* = (z^*(x_1),\\ldots, z^*(x_n))'$.\n\nIn the case of model , the data augmentation step may be computed efficiently using a standard univariate truncated normal sampler. ",
"Specifically, for $\\mathcal{A}_j = [a_j, a_{j+1})$, the full conditional distribution of the latent data is $\\left[z^*(x_i) \\mid \\mathcal{D}, \\theta\\right] \\sim N(\\mu(x_i), \\sigma^2(x_i))$ truncated to $[g(a_{y_i}), g(a_{y_i + 1}))$. While the process $y^*$ is useful for interpretability of the [<span style=\"font-variant:small-caps;\">star</span> ]{}model, it is not necessary for inference or sampling.",
"\n\nWhen the transformation $g$ is unknown, an additional sampling step is required. ",
"For the parametric Box-Cox case this translates to sampling the parameter $\\lambda$ from its full conditional posterior distribution, for which we use a slice sampler [@neal2003slice]. ",
"For the nonparametric model with prior , we sample $\\xi_\\gamma = \\log(\\tilde \\gamma)$ using Metropolis-Hastings and $\\big[\\sigma_\\gamma^{-2} \\mid - \\big] \\sim \\mbox{Gamma}\\{0.001 + L/2, 0.001 + \\sum_{\\ell=1}^L (\\tilde \\gamma_{\\ell} - \\mu_{\\gamma_\\ell})^2\\}$, and set $g(t) = b_I'(t)\\gamma$ as defined in -. ",
"The sampler for $\\xi_\\gamma$ uses a Gaussian random walk proposal with covariance matrix tuned using the robust adaptive Metropolis (RAM) algorithm of [@vihola2012robust] during a preliminary burn-in period. ",
"Within the RAM algorithm we set a target acceptance rate of 30% with an adaptation rate of 0.75; see [@vihola2012robust] for details. ",
"We adapt the proposal covariance only during the first 50% of the burn-in period, so the MCMC draws we save for inference are generated from a (non-adaptive) Metropolis-within-Gibbs sampling algorithm.",
"\n\nTo simulate from the posterior predictive distribution $[\\tilde y(x) | \\mathcal{D}]$, we additionally sample $\\left[\\tilde z^*(x) \\mid \\theta\\right]$ from $\\Pi_\\theta$ using the current draw of $\\theta$ and set $\\tilde y(x) =h\\left[g^{-1}\\left\\{\\tilde{z}^*(x)\\right\\}\\right]$ for each $x$. This step is extremely simple, yet provides inference for integer-valued predictions, model-based imputation of missing data at $x \\in \\mathcal{X}$, and useful model diagnostics. ",
"For parametric $g$ in , the functions $g^{-1}(s; \\lambda)$ are known, while for nonparametric $g$ we approximate $g^{-1}(s) \\approx \\arg\\min_t | s - b_I'(t) \\gamma|$, where the minimum $t$ is computed over a grid of values.",
"\n\nThe proposed framework for MCMC balances modularity and flexibility: it combines existing algorithms for continuous data models with a transformation to provide distributional flexibility for integer-valued data. ",
"The importance of modularity has been demonstrated recently for the negative-binomial distribution, for which [@polson2013bayesian] developed a P[ó]{}lya-Gamma data augmentation scheme for Gibbs sampling. ",
"This approach has allowed a variety of Gaussian models to be extended for negative-binomial data, including linear regression [@zhou2012lognormal], factor models [@klami2015polya], and functional time series models [@kowal2019measles], yet faces two important limitations: first, it is restricted to the negative-binomial distribution, and second, the resulting MCMC sampler is often inefficient [@duan2018scaling]. ",
"As demonstrated in Section \\[sec-dolphins\\] and Appendix \\[app:dolphins\\], the proposed [<span style=\"font-variant:small-caps;\">star</span> ]{}algorithm provides excellent MCMC efficiency, even for nonlinear versions of model .",
"\n\nRegression modeling with STAR {#model-ex}\n=============================\n\nFor inference and prediction of integer-valued data $y$ observed with predictors $x$, we apply the [<span style=\"font-variant:small-caps;\">star</span> ]{}modeling framework to develop additive (Section \\[sec-am\\]) and [<span style=\"font-variant:small-caps;\">bart</span> ]{}(Section \\[sec-bart\\]) regression models. ",
"Each model may be combined with a known or unknown transformation, and posterior inference proceeds using the general approach from Section \\[mcmc\\]. ",
"The additive and [<span style=\"font-variant:small-caps;\">bart</span> ]{}[<span style=\"font-variant:small-caps;\">star</span> ]{}models are evaluated for synthetic data in Section \\[sims\\] and real data in Sections \\[sec-nmes\\] and \\[sec-dolphins\\], with additional model comparisons and diagnostics in the Appendix.",
"\n\nLinear regression {#sec-lm}\n-----------------\n\nThe simplest and most common special case of is linear regression, where $\\sigma^2(x) = \\sigma^2$ and $ \\mu(x) = x'\\beta$ for $x$ a $p$-dimensional vector of predictors. ",
"Let $X$ denote the $n \\times p$ matrix of predictors, and consider the (independent) priors $[\\beta] \\sim N(0, \\Sigma_\\beta)$ and $[\\sigma^{-2}] \\sim \\mbox{Gamma}(a_\\sigma, b_\\sigma)$, where $\\Sigma_\\beta$ is the prior covariance for the regression coefficients. ",
"We focus on the ridge prior $[\\beta_j | \\sigma_\\beta] \\stackrel{iid}{\\sim}N(0, \\sigma_\\beta^2)$ for illustration, with $[\\sigma_\\beta] \\sim \\mbox{Uniform}(0, A)$, but extensions for other shrinkage priors are available [@carvalho2010horseshoe]. ",
"The Gibbs sampler for the [<span style=\"font-variant:small-caps;\">star</span> ]{}linear model is given by the following steps:\n\n1. ",
" Sample $[z^*(x_i) \\mid -] \\sim N(x_i'\\beta, \\sigma^2) $ truncated to $z^*(x_i) \\in g(\\mathcal{A}_{y_i})$ for $i =1, \\dots n$;\n\n2. ",
" Sample $[\\beta \\mid -] \\sim N\\big(Q_\\beta^{-1} \\ell_\\beta, Q_\\beta^{-1}\\big)$ where $Q_\\beta = \\sigma^{-2} X'X + \\Sigma_\\beta^{-1}$ and $\\ell_\\beta = \\sigma^{-2} X'\\bm z^*$;\n\n3. ",
" Sample $[\\sigma^{-2} \\mid - ] \\sim \\mbox{Gamma}\\big[a_\\sigma + n/2, b_\\sigma + \\sum_{i=1}^n \\big\\{z^*(x_i) - x_i'\\beta\\big\\}^2/2\\big]$;\n\n4. ",
" Sample $[\\sigma_\\beta^{-2} \\mid - ] \\sim \\mbox{Gamma}\\{(p-1)/2, \\sum_{j=1}^p \\beta_j^2\\}$ truncated to $[1/A^2, 0)$ and set $\\Sigma_\\beta = \\sigma_\\beta^2 I_p$.\n\nFor other conditionally Gaussian shrinkage priors, only the sampler for $[\\Sigma_\\beta | -]$ in the final step must be modified. ",
"Note that we include a diffuse prior on the intercept, $\\beta_0 \\sim N(0, 10^6)$, and select the hyperparameters $a_\\sigma = b_\\sigma = 0.001$ and $A = 10^4$ for Sections \\[sims\\]-\\[sec-dolphins\\].",
"\n\nComputational scalability of the [<span style=\"font-variant:small-caps;\">star</span> ]{}linear model is primarily determined by the sampler for the regression coefficients $\\beta$, which depends on both the sample size $n$ and the number of predictors $p$. Importantly, computationally efficient samplers for $[\\beta \\mid \\bm z^*, \\sigma^2]$ exist for $p<n$ [@rue2001fast] and $p\\gg n$ [@bhattacharya2016fast] for conditionally Gaussian priors. ",
"By design, the [<span style=\"font-variant:small-caps;\">star</span> ]{}MCMC algorithm leverages these existing priors and algorithms for Gaussian data to provide efficient and scalable posterior inference for integer-valued data.",
"\n\nAdditive models {#sec-am}\n---------------\n\nSuppose the $p$ predictors are partitioned as $x' = (u', v')$ for linear predictors $u$ and nonlinear predictors $v$. The [<span style=\"font-variant:small-caps;\">star</span> ]{}additive model is given by with conditional mean $$\\label{am}\n\\mu(x) = u'\\beta + \\sum_j f_j(v_j),$$ where $f_j \\!:\\mathcal{X}_j\\to \\mathbb{R}$ is an unknown function of $v_j \\in \\mathcal{X}_j$. The unknown $f_j$ are typically modeled as smooth nonparametric functions, and may capture nonlinearities in each $v_j$. The [<span style=\"font-variant:small-caps;\">star</span> ]{}linear model is a special case of with $\\mu(x) = x'\\beta$. For the conditional variance of $z^*$ in , we use the conditionally conjugate prior $\\sigma^{-2} \\sim \\mbox{Gamma}(0.001, 0.001)$.\n\nWithin the [<span style=\"font-variant:small-caps;\">star</span> ]{}framework, we apply flexible and computationally efficient parametrizations of that have been well-developed for Gaussian and exponential family models. ",
"The linear regression coefficients are assigned conditionally Gaussian priors, $\\beta \\sim N(0, \\Sigma_\\beta)$, including the ridge prior $\\Sigma_\\beta = \\sigma_\\beta^2 I$ and other shrinkage priors [@carvalho2010horseshoe] as special cases. ",
"The nonlinear functions in are modeled smoothly using a basis expansion $f_j(v_j) = b_j'(v_j) \\alpha_j$, where $ b_j$ is an $L_j$-dimensional vector of known basis functions and $\\alpha_j$ is a vector of unknown coefficients. ",
"We select a cubic P-spline basis with second-order difference penalty on the coefficients, which may be reparametrized such that $\\alpha_j \\sim N(0, \\sigma_{\\alpha_j}^2 I)$ is the smoothing prior and $B_j'B_j$ is diagonal, where $B_j = (b_j(v_{1,j}), \\ldots, b_j(v_{n,j}))'$ is the basis matrix [@scheipl2012spike]. ",
"The nonlinear terms are constrained such that $\\sum_{i=1}^n f_j(v_{i,j}) = 0$ for identifiability, which is enforced in the reparametrization of the basis $b_j$. We let $\\sigma_{\\alpha_j}^{-2} \\sim \\mbox{Gamma}(0.1, 0.1)$, which allows the smoothness of each $f_j$ to be learned from the data.",
"\n\nFor observed predictors $x_i' = (u_i', v_i')$, let $U$ denote the matrix of linear predictors and let $\\bm f_j = B_j \\alpha_j$. The Gibbs sampler for the [<span style=\"font-variant:small-caps;\">star</span> ]{}additive model iterates the following full conditional distributions:\n\n1. ",
" Sample $[z^*(x_i) \\mid -] \\sim N(u_i'\\beta + \\sum_j f_j(v_{i,j}), \\sigma^2) $ truncated to $z^*(x_i) \\in g(\\mathcal{A}_{y_i})$;\n\n2. ",
" Sample $[\\beta \\mid -] \\sim N\\big(Q_\\beta^{-1} \\ell_\\beta, Q_\\beta^{-1}\\big)$ where $Q_\\beta = \\sigma^{-2} U'U + \\Sigma_\\beta^{-1}$ and $\\ell_\\beta = \\sigma^{-2} U'(\\bm z^* - \\sum_j \\bm f_j)$;\n\n3. ",
" For each $j$, sample $[ \\alpha_j \\mid -] \\sim N\\big(Q_{\\alpha_j}^{-1} \\ell_{\\alpha_j}, Q_{\\alpha_j}^{-1}\\big)$ where $Q_{\\alpha_j} = \\sigma^{-2} B_j'B_j + \\sigma_{\\alpha_j}^{-2}I$ and $\\ell_{\\alpha_j} = \\sigma^{-2} B_j'(\\bm z^* - U\\beta - \n \\sum_{k \\ne j} \\bm f_k)$ and set $\\bm f_j = B_j \\alpha_j$;\n\n4. ",
" Sample $[\\sigma^{-2} \\mid - ] \\sim \\mbox{Gamma}\\big(0.001 + n/2, \n 0.001 + ||\\bm z^* - U \\beta - \\sum_j \\bm f_j||^2/2\\big)$;\n\n5. ",
" For each $j$, sample $[\\sigma_{\\alpha_j}^{-2} \\mid -] \\sim \\mbox{Gamma}\\big(0.1 + L_j/2, 0.1 + \\sum_{\\ell=1}^{L_j} \\alpha_j^2/2\\big)$.\n\nThe MCMC sampling algorithm for the [<span style=\"font-variant:small-caps;\">star</span> ]{}additive model is efficient, with empirical support provided in Section \\[sec-dolphins\\]. ",
"The computational complexity for the nonlinear basis coefficients $\\{\\alpha_j\\}$ is $\\mathcal{O}(\\sum_j L_j)$ due to the diagonality of $B_j'B_j$, while the linear coefficients $\\beta$ also may be sampled efficiently [@rue2001fast; @bhattacharya2016fast]. ",
"Additional sampling steps for $\\Sigma_\\beta$ depend on the model specification, but are often available in closed form.",
"\n\nBayesian Additive Regression Trees {#sec-bart}\n----------------------------------\n\nWhile additive models are effective at capturing nonlinear marginal effects, they are often inadequate for modeling interactions among predictors. ",
"Specific pairwise or higher order interactions may be specified in advance, but including all possible interactions in an additive model requires a massive number of parameters. ",
"As a remedy, [@chipman2010bart] proposed [<span style=\"font-variant:small-caps;\">bart</span>]{}, which is a “sum-of-trees\" model within a fully Bayesian framework. ",
"Tree-based regression models, such as [@chipman1998bayesian], are designed to model complex interactions among predictors. ",
"Notably, [<span style=\"font-variant:small-caps;\">bart</span> ]{}utilizes many trees, where each individual tree is constrained via the prior to be a weak learner. ",
"As a result, [<span style=\"font-variant:small-caps;\">bart</span> ]{}provides the capability to capture nonlinear interactions yet features built-in mechanisms to guard against overfitting. ",
"For continuous and binary data, the predictive performance of [<span style=\"font-variant:small-caps;\">bart</span> ]{}is highly competitive with state-of-the-art statistical and machine learning models.",
"\n\nFor integer-valued data, [<span style=\"font-variant:small-caps;\">bart</span> ]{}has been relatively underutilized. ",
"Adaptations of [<span style=\"font-variant:small-caps;\">bart</span> ]{}for negative-binomial data are feasible via P[ó]{}lya-Gamma augmentation [@polson2013bayesian], similar to the probit implementation in [@chipman2010bart] for binary data. ",
"However, this approach is limited in distributional flexibility, and the MCMC inefficiencies of P[ó]{}lya-Gamma augmentation are unlikely to be ameliorated given the complexity of the (Gaussian) [<span style=\"font-variant:small-caps;\">bart</span> ]{}sampling algorithm. ",
"Recently, [@murray2017log] proposed a log-linear [<span style=\"font-variant:small-caps;\">bart</span> ]{}model for count-valued and categorical data using a parameter expansion valid for certain likelihoods in log-linear models, in particular (zero-inflated) negative-binomial and Poisson. ",
"However, extensions to more flexible count distributions may require alternative computational strategies and appropriately modified prior distributions.",
"\n\nWithin the [<span style=\"font-variant:small-caps;\">star</span> ]{}framework, we parametrize the [<span style=\"font-variant:small-caps;\">bart</span> ]{}model ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}) as in [@chipman2010bart] and specifically $$\\label{BART}\n\\mu(x) = \\sum_{k=1}^m f(x; T_k, M_k),$$ where $T_k$ is a binary tree comprised of interior splitting rules and terminal nodes and $M_k = \\{\\eta_{1,k},\\ldots, \\eta_{b_k,k}\\}$ is the value at each of $b_k$ terminal nodes for tree $T_k$. For a given predictor $x$, each tree $T_k$ in assigns a value $\\eta_{\\ell,k} \\in M_k$, and these values are summed across all trees $k=1,\\ldots,m$. [@chipman2010bart] propose prior distributions that constrain each $T_k$ to be shallow, thereby limiting the order of interactions, and constrain each $\\eta_{\\ell,k}$ to be small, thereby limiting the contribution of each tree. ",
"Both mechanisms guard against overfitting, and in combination produce a sum of weak learners. ",
"The joint prior distribution is specified as a prior for the tree, $p(T_k)$, which follows [@chipman1998bayesian], and a prior for the terminal values given the tree, $p(\\eta_{\\ell,k} | T_k)$, which is Gaussian. ",
"A key feature of [<span style=\"font-variant:small-caps;\">star</span> ]{}is that, by transforming to Gaussianity, we inherit the same framework as the original [<span style=\"font-variant:small-caps;\">bart</span>]{}, and therefore may directly incorporate the well-studied priors and hyperparameters from [@chipman2010bart]. ",
"More careful consideration is required for the prior distribution of $\\sigma^2$ in . [",
"@chipman2010bart] emphasize that an informative prior distribution is important to balance between overly aggressive and overly conservative model fits, and parametrize the prior for $\\sigma^2$ as an inverse chi-square distribution calibrated using a data-based overestimate $\\hat \\sigma$ of $\\sigma$. However, any statistics calculated from the data $y$ are likely inappropriate for [<span style=\"font-variant:small-caps;\">star</span>]{}, since the transformation $g$ impacts the scale of $z^*$. As a remedy, we compute $\\hat \\sigma$ as the posterior median of $\\sigma$ from the [<span style=\"font-variant:small-caps;\">star</span> ]{}linear model , where the transformation in the linear model is chosen to match the transformation in [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}. ",
"Given $\\hat \\sigma$, which indeed is a data-based overestimate of $\\sigma$, we adopt the default hyperparameter suggestions of [@chipman2010bart].",
"\n\nFor posterior inference under [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}, we combine a data augmentation step for $z^*(x_i)$ similar to Section \\[sec-am\\] with a sweep from the original [@chipman2010bart] algorithm to draw the [<span style=\"font-variant:small-caps;\">bart</span> ]{}parameters in using $\\bm z^*$ as data. ",
"The [@chipman2010bart] [<span style=\"font-variant:small-caps;\">bart</span> ]{}sampler proceeds using backfitting: draws for the $k$th tree $[(T_k, M_k) | \\bm z^*, \\{(T_{k'}, M_{k'})\\}_{k \\ne k'}, \\sigma]$ are generated using [@chipman1998bayesian] and $\\sigma^2$ is sampled from an inverse-Gamma distribution. ",
"Incorporating these sampling steps into the larger Gibbs sampler in Section \\[mcmc\\] is straightforward using the `dbarts` package [@dbarts].",
"\n\nSimulation studies {#sims}\n==================\n\nThe proposed [<span style=\"font-variant:small-caps;\">star</span> ]{}modeling framework is evaluated using simulated data and compared to existing methods for Poisson, negative-binomial, and Gaussian data. ",
"Synthetic data $y_i$ for $i = 1, \\dots n$ and $n=100$ are simulated from a negative-binomial distribution parametrized by conditional mean $\\mathbb{E}\\{y_i(x) | \\lambda_i^*\\} = \\lambda_i^*(x)$ and variance $\\mbox{Var}\\{y_i(x) | \\lambda_i^*, r^*\\} = \\lambda_i^*(x)\\left\\{1 + \\lambda_i^*(x)/r^*\\right\\}$ with dispersion parameter $r^* > 0$. As $r^*$ decreases to zero, the variance increasingly dominates the mean while as $r^*\\rightarrow \\infty$, the distribution converges to a Poisson distribution with parameter $\\lambda_i^*(x)$. We select $r^*=1$ to simulate negative-binomial data with large overdispersion and $r^*=1000$ to simulate approximate Poisson data. ",
"We consider linear (Section \\[sim:lm\\]) and nonlinear (Section \\[sim:bart\\]) parametrizations for the log-mean $\\log \\lambda_i^*(x)$. We emphasize that in all cases, the simulated datasets are *not* generated under the proposed [<span style=\"font-variant:small-caps;\">star</span> ]{}model: they are simulated from negative-binomial and (approximate) Poisson distributions.",
"\n\nCompeting models are compared using the Watanabe-Akaike/widely-applicable information criteria (WAIC) [@watanabe2010asymptotic]. ",
"WAIC estimates out-of-sample predictive accuracy using a single model fit requiring only minimal additional computations, and is asymptotically equivalent to cross-validation. ",
"The WAIC for a model $\\mathcal M$ is defined as $\n\\mbox{WAIC}_{\\mathcal M} = -2\\left(\\mbox{lpd}_{\\mathcal M} - d_{\\mathcal M} \\right)$, where $d_{\\mathcal M}$ is the effective number of parameters for model ${\\mathcal M}$ and $\\mbox{lpd}_{\\mathcal M}$ is the log-predictive pointwise density defined by $$\\mbox{lpd}_{\\mathcal M}(y) = \\sum_{i=1}^n \\log \\left( \\frac{1}{S} \\sum_{s=1}^S p_{\\mathcal M}(y_i \\mid \\theta^s) \\right)$$ for $\\theta^s$ drawn from its posterior distribution. ",
"For [<span style=\"font-variant:small-caps;\">star</span> ]{}models, we simply have $$\\label{star-lppd}\n\\mbox{lpd}_{{\\textsc{star}}}(y) = \\sum_{i=1}^n \\log \\left( \\frac{1}{S} \\sum_{s=1}^S \n\\Phi\\left\\{ \\frac{g^s(a_{y_i+1}) - \\mu^s(x_i)}{\\sigma^s(x_i)}\\right\\} - \n\\Phi\\left\\{ \\frac{g^s(a_{y_i}) - \\mu^s(x_i)}{\\sigma^s(x_i)}\\right\\} \n\\right).$$ For the effective number of parameters, we follow the recommendation of [@gelman2014understanding] and use the sample variance of the pointwise log-likelihoods across MCMC simulations: $d_{\\mathcal M} = \\sum_{i=1}^n \\mbox{Var}\\left( \\log p(y_i \\mid \\theta^s)\\right)$. The pointwise log-likelihood of [<span style=\"font-variant:small-caps;\">star</span> ]{}is simple and efficient to compute, and is sufficient for computing WAIC as well as other information criteria.",
"\n\nWAIC is used in Sections \\[sim:lm\\] and \\[sim:bart\\] for synthetic data, but exact out-of-sample metrics are provided for the real data in Section \\[sec-nmes\\]. ",
"Appendix \\[app:sims\\] also provides root mean square errors for estimating the conditional expectation $\\lambda_i^*(x)$ to evaluate point estimation accuracy.",
"\n\nLinear mean functions {#sim:lm}\n---------------------\n\nWe first consider a linear log-mean, $\\log \\lambda_i^*(x) = \\beta_0 + \\sum_{j=1}^p x_{i,j} \\beta_j$, where the $p=6$ predictors are drawn independently from $x_{i,j} \\sim N(0,1)$ and the coefficients are $\\beta_0 = \\log(1.5)$, $\\beta_1 = \\beta_2 =\\beta_3 = \\log(2.0)$, and $\\beta_4=\\beta_5=\\beta_6 = 0$. Under this specification, the expected counts at $x_{i,j} = 0$ is 1.5, while each nonzero coefficient $\\beta_j$ for $j=1,2,3$ increases the expected counts by a factor of 2 per one unit change in each $x_j$.\n\nFor comparison, we consider a variety of Bayesian linear regression models. ",
"Among [<span style=\"font-variant:small-caps;\">star</span> ]{}models, we use the linear model with prior $[\\beta_j | \\sigma_\\beta] \\sim N(0, \\sigma_\\beta^2)$ and $[\\sigma_\\beta] \\sim \\mbox{Uniform}(0, 10^4)$, and the following transformations: known transformation with $\\lambda = 0$ (<span style=\"font-variant:small-caps;\">lm-star</span>-log), $\\lambda = 1/2$ (<span style=\"font-variant:small-caps;\">lm-star</span>-sqrt), and $\\lambda = 1$ (<span style=\"font-variant:small-caps;\">lm-star</span>-id); unknown parametric transformation (<span style=\"font-variant:small-caps;\">lm-star</span>-bc); and unknown nonparametric transformation (<span style=\"font-variant:small-caps;\">lm-star</span>-np). ",
"We also include the same linear model, but instead with the Gaussian model applied directly to the counts $y$ (<span style=\"font-variant:small-caps;\">lm</span>) and the log-transformed counts $\\log(y + 1)$ (<span style=\"font-variant:small-caps;\">lm</span>-log). ",
"These models are natural competitors to [<span style=\"font-variant:small-caps;\">star</span>]{}, since they incorporate the same model for $\\mu(x)$ but omit the rounding step in and therefore do not produce an integer-valued distribution. ",
"Lastly, we include Poisson (<span style=\"font-variant:small-caps;\">lm</span>-Pois) and negative-binomial (<span style=\"font-variant:small-caps;\">lm</span>-NegBin) linear regression models with a log-link, implemented using the `rstanarm` package [@rstanarm]. ",
"<span style=\"font-variant:small-caps;\">lm</span>-Pois and <span style=\"font-variant:small-caps;\">lm</span>-NegBin are widely used for modeling count data, and here correspond to the true data-generating process.",
"\n\nIn Figure \\[fig:sim-lm-waic\\], we plot the relative WAICs across simulated datasets, defined as the ratio between the WAIC of the generic model over the WAIC for a baseline method, for which we select <span style=\"font-variant:small-caps;\">lm</span>-log. ",
"Relative WAIC standardizes model performance across simulated datasets: methods with a relative WAIC less than one demonstrate improvement relative to the baseline method. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models, particularly those with unknown transformations (<span style=\"font-variant:small-caps;\">lm-star</span>-bc and <span style=\"font-variant:small-caps;\">lm-star</span>-np), offer substantial improvements relative to <span style=\"font-variant:small-caps;\">lm</span>-log, and are highly competitive with the true models <span style=\"font-variant:small-caps;\">lm</span>-Pois and <span style=\"font-variant:small-caps;\">lm</span>-NegBin. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}model improvements relative to the Gaussian models and the identity transformation <span style=\"font-variant:small-caps;\">lm-star</span>-id definitively demonstrate the importance of both rounding and transformation.",
"\n\n![",
"Relative WAIC for negative-binomial (left) and Poisson (right) data with linear mean functions. ",
"Preferred models have smaller values, and models with values less than one are preferred to <span style=\"font-variant:small-caps;\">lm</span>-log. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models outperform the Gaussian models and are highly competitive with the true models <span style=\"font-variant:small-caps;\">lm</span>-Pois and <span style=\"font-variant:small-caps;\">lm</span>-NegBin. ",
"\\[fig:sim-lm-waic\\]](lm_nb_relWAIC \"fig:\"){width=\"49.00000%\"} ![",
"Relative WAIC for negative-binomial (left) and Poisson (right) data with linear mean functions. ",
"Preferred models have smaller values, and models with values less than one are preferred to <span style=\"font-variant:small-caps;\">lm</span>-log. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models outperform the Gaussian models and are highly competitive with the true models <span style=\"font-variant:small-caps;\">lm</span>-Pois and <span style=\"font-variant:small-caps;\">lm</span>-NegBin. ",
"\\[fig:sim-lm-waic\\]](lm_pois_relWAIC \"fig:\"){width=\"49.00000%\"}\n\nNonlinear mean functions {#sim:bart}\n------------------------\n\nTo evaluate <span style=\"font-variant:small-caps;\">bart-star</span>, we specify a nonlinear form for the log-mean, $\\log \\lambda_i^*(x) = \\beta_0 + \\beta_1 \\tilde f(x)$, where $\\tilde f(x)$ is the centered and scaled Friedman function [@friedman1991multivariate] $$\\label{friedman}\nf(x) = 10 \\sin(\\pi x_1 x_2) + 20(x_3 - 0.5)^2 + 10x_4 + 5x_5$$ featured in the original [<span style=\"font-variant:small-caps;\">bart</span> ]{}simulations [@chipman2010bart]. ",
"As in [@chipman2010bart], we select $p=10$ and simulate $x_{i,j} \\stackrel{iid}{\\sim}\\mbox{Uniform}(0,1)$. We fix the parameters $\\beta_0 = \\log(1.5)$ and $\\beta_1 =\\log(5.0)$, which again corresponds to low counts with a moderate signal.",
"\n\nWe combine the [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model of Section \\[sec-bart\\] with known transformation for $\\lambda = 0$ (<span style=\"font-variant:small-caps;\">bart-star</span>-log), $\\lambda = 1/2$ (<span style=\"font-variant:small-caps;\">bart-star</span>-sqrt), and $\\lambda = 1$ (<span style=\"font-variant:small-caps;\">bart-star</span>-id); unknown parametric transformation (<span style=\"font-variant:small-caps;\">bart-star</span>-bc); and unknown nonparametric transformation (<span style=\"font-variant:small-caps;\">bart-star</span>-np). ",
"For competitors, we include the Gaussian [<span style=\"font-variant:small-caps;\">bart</span> ]{}model ([<span style=\"font-variant:small-caps;\">bart</span>]{}-id) of [@chipman2010bart] and a Gaussian [<span style=\"font-variant:small-caps;\">bart</span> ]{}model on the log-transformed counts $\\log(y+1)$ ([<span style=\"font-variant:small-caps;\">bart</span>]{}-log). ",
"Lastly, we include the linear models <span style=\"font-variant:small-caps;\">lm-star</span>-bc and <span style=\"font-variant:small-caps;\">lm</span>-log from Section \\[sim:lm\\].",
"\n\nThe relative WAICs are plotted in Figure \\[fig:sim-bart-waic\\], where again we use the log-transformed Gaussian model ([<span style=\"font-variant:small-caps;\">bart</span>]{}-log) as the baseline. ",
"Both <span style=\"font-variant:small-caps;\">bart-star</span>-id and <span style=\"font-variant:small-caps;\">bart</span>-id are omitted as noncompetitive, and indicates the importance of an appropriate transformation. [",
"<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}provides substantial improvements relative to [<span style=\"font-variant:small-caps;\">bart</span> ]{}and linear Gaussian models, with especially strong performance from the unknown transformation models (<span style=\"font-variant:small-caps;\">bart-star</span>-bc and <span style=\"font-variant:small-caps;\">bart-star</span>-np). ",
"Perhaps surprisingly, the [<span style=\"font-variant:small-caps;\">star</span> ]{}linear model <span style=\"font-variant:small-caps;\">lm-star</span>-bc outperforms [<span style=\"font-variant:small-caps;\">bart</span>]{}-log for negative-binomial data, despite the nonlinearity in . ",
"By comparison, <span style=\"font-variant:small-caps;\">bart-star</span>-bc consistently outperforms <span style=\"font-variant:small-caps;\">lm-star</span>-bc, which suggests that the proposed [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model is capable of detecting the nonlinear features in .",
"\n\n![ ",
"Relative WAIC for negative-binomial (left) and Poisson (right) data with nonlinear mean functions. ",
"Preferred models have smaller values, and models with values less than one are preferred to [<span style=\"font-variant:small-caps;\">bart</span>]{}-log. ",
"The identity models ([<span style=\"font-variant:small-caps;\">bart</span>]{}-id, [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id) are omitted since they are noncompetitive, with relative WAICs above 1.6. ",
"The [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}models are clearly superior. ",
"\\[fig:sim-bart-waic\\]](bart_nb_relWAIC \"fig:\"){width=\"49.00000%\"} ![ ",
"Relative WAIC for negative-binomial (left) and Poisson (right) data with nonlinear mean functions. ",
"Preferred models have smaller values, and models with values less than one are preferred to [<span style=\"font-variant:small-caps;\">bart</span>]{}-log. ",
"The identity models ([<span style=\"font-variant:small-caps;\">bart</span>]{}-id, [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id) are omitted since they are noncompetitive, with relative WAICs above 1.6. ",
"The [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}models are clearly superior. ",
"\\[fig:sim-bart-waic\\]](bart_pois_relWAIC \"fig:\"){width=\"49.00000%\"}\n\nPredicting the demand for healthcare utilization {#sec-nmes}\n================================================\n\nIndividualized prediction of healthcare utilization is critical both for assessing the health risks of an individual and for monitoring the aggregate stress on the healthcare system. ",
"By providing more accurate *predictive distributions* of individual healthcare utilization, it is possible to obtain uncertainty quantification for various measures of individual and aggregate demand, and consequently achieve more efficient allocation of medical resources and more informed patients. ",
"To assess the predictive ability of [<span style=\"font-variant:small-caps;\">star</span> ]{}models for this task, we use data from the National Medical Expenditure Survey (NMES) available in the `AER` package in `R` [@aer]. ",
"Multiple measures of healthcare utilization are available, including physician office visits (`visits`), non-physician office visits (`nvisits`), physician hospital outpatient visits (`ovisits`), and non-physician hospital outpatient visits (`novisits`). ",
"Individualized predictors are also provided, including health measures, socioeconomic and demographic variables, and indicators of each patient’s type of insurance. ",
"We consider a subset of $n = 4406$ elderly adults (aged 66 and older) covered by Medicare, which was previously analyzed by [@deb1997demand] and [@cameron2013regression].",
"\n\nThe NMES data provides a unique opportunity for insightful out-of-sample prediction comparisons. ",
"Each measure of healthcare utilization (`visits`, `nvisits`, `ovisits`, and `novisits`) is count-valued with distinct characteristics: the probability mass functions in Figure \\[fig:nmes\\] illustrate the differences in the marginal distributions, most notably the proportion of zeros and the degree of overdispersion. ",
"An adequate prediction of individual healthcare utilization may require prediction of one or more of these response variables, each of which presents unique count-valued distributional features, and which share a common set of $p=17$ individual predictor variables.",
"\n\n![",
"Probability mass functions for each measure of medical care demand. ",
"Zero-inflation and overdispersion are present in each case to varying degrees. ",
"\\[fig:nmes\\]](nmes_summary){width=\"100.00000%\"}\n\nWe consider out-of-sample predictive distribution accuracy for each response variable in Figure \\[fig:nmes\\]. ",
"In all cases, we select $n_{train} = 3525$ (80%) individuals randomly for training and evaluate the predictive accuracy for the remaining $n_{test} = 881$ test individuals, and repeat this exercise for 100 iterations. ",
"Posterior predictive distributions were computed for each model in Section \\[sim:bart\\]; for conciseness, we report results for [<span style=\"font-variant:small-caps;\">bart</span>]{}-log, [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id, [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-log, and [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc. ",
"The (untransformed) [<span style=\"font-variant:small-caps;\">bart</span> ]{}model of [@chipman2010bart] was noncompetitive and is omitted from the subsequent results.",
"\n\nTo evaluate the aggregate predictive distribution accuracy, we compute the log-predictive density score for the test data $\\{ \\tilde y_i\\}_{i=1}^{n_{test}}$ for each model $\\mathcal{M}$: $$\\label{lpd}\n\\mbox{lpd}_\\mathcal{M}(\\tilde y) = \\frac{1}{n_{test}}\\sum_{i=1}^{n_{test}} \\log p_\\mathcal{M}(\\tilde y_i | y) \\approx \\frac{1}{n_{test}}\\sum_{i=1}^{n_{test}} \\log \\left\\{ \\frac{1}{S} \\sum_{s=1}^S p_{\\mathcal M}(\\tilde y_i \\mid \\theta^s) \\right\\}$$ where $\\theta^s \\sim p_\\mathcal{M}(\\theta | y)$ is a draw from the posterior under model $\\mathcal{M}$. For [<span style=\"font-variant:small-caps;\">star</span> ]{}with model , we have $p_{\\mathcal M}(\\tilde y_i \\mid \\theta^s) = \\Phi\\left[ \\{g^s(a_{\\tilde y_i +1}) - \\mu^s(x_i)]\\}/\\sigma^s(x_i)\\right] - \\Phi\\left[ \\{g^s(a_{\\tilde y_i}) - \\mu^s(x_i)\\}/\\sigma^s(x_i)\\right]$ similar to . ",
"The results for each response variable are in Figure \\[fig:NMES-lpd\\]; larger values indicate more accurate predictive distributions. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}model with unknown transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc) performs best in all cases, closely followed by the [<span style=\"font-variant:small-caps;\">star</span> ]{}model with known transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-log). ",
"Omitting the transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id), similar to [@canale2013nonparametric], leads to substantial deterioration in predictive accuracy. ",
"Furthermore, the untransformed [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id model produced infinite scores for some test points $\\tilde y_i$; these points were excluded for computing , but imply that [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id performs even worse than indicated.",
"\n\n![",
"Log-predictive density (LPD) score for the test data across 100 randomly selected test sets (20% of data). ",
"Large LPD score indicates better performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models that include transformations—known ([<span style=\"font-variant:small-caps;\">star</span>]{}-log) or unknown ([<span style=\"font-variant:small-caps;\">star</span>]{}-bc)—are decisively favored. ",
"\\[fig:NMES-lpd\\]](nmes_lpd_visits \"fig:\"){width=\"49.00000%\"} ![",
"Log-predictive density (LPD) score for the test data across 100 randomly selected test sets (20% of data). ",
"Large LPD score indicates better performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models that include transformations—known ([<span style=\"font-variant:small-caps;\">star</span>]{}-log) or unknown ([<span style=\"font-variant:small-caps;\">star</span>]{}-bc)—are decisively favored. ",
"\\[fig:NMES-lpd\\]](nmes_lpd_nvisits \"fig:\"){width=\"49.00000%\"} ![",
"Log-predictive density (LPD) score for the test data across 100 randomly selected test sets (20% of data). ",
"Large LPD score indicates better performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models that include transformations—known ([<span style=\"font-variant:small-caps;\">star</span>]{}-log) or unknown ([<span style=\"font-variant:small-caps;\">star</span>]{}-bc)—are decisively favored. ",
"\\[fig:NMES-lpd\\]](nmes_lpd_ovisits \"fig:\"){width=\"49.00000%\"} ![",
"Log-predictive density (LPD) score for the test data across 100 randomly selected test sets (20% of data). ",
"Large LPD score indicates better performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models that include transformations—known ([<span style=\"font-variant:small-caps;\">star</span>]{}-log) or unknown ([<span style=\"font-variant:small-caps;\">star</span>]{}-bc)—are decisively favored. ",
"\\[fig:NMES-lpd\\]](nmes_lpd_novisits \"fig:\"){width=\"49.00000%\"}\n\nFor a more targeted assessment of the predictive distributions, we compare the precision and coverage of the 90% prediction intervals for each method. ",
"Interval precision is measured by the mean prediction interval width (MPIW) computed across all $\\{\\tilde y_i\\}_{i=1}^{n_{test}}$: smaller intervals that provide the correct coverage are preferable. ",
"The MPIWs with empirical coverages are displayed in Figure \\[fig:NMES-mpiw\\]. ",
"Across all responses, the [<span style=\"font-variant:small-caps;\">star</span> ]{}model with unknown transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc) provides the most precise prediction intervals with correct coverage. ",
"For the responses with greater zero-inflation and overdispersion (`nvisits`, `ovisits`, and `novisits`), [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc reduces MPIWs by a median of 45%, 50%, and 59%, respectively, relative to [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id, which indicates a substantial gain in predictive precision offered by the (unknown) transformation.",
"\n\n![",
"Mean prediction interval widths and empirical coverage for the test data across 100 test sets. ",
"Preferred methods provide the narrowest intervals while maintaining the nominal (90%) coverage. ",
"The [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model with unknown transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc) is consistently competitive, followed by the [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model with known log transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-log). ",
"The methods that do not including rounding ([<span style=\"font-variant:small-caps;\">bart</span>]{}-log) or include rounding *without* transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id; [@canale2013nonparametric]) are decisively inferior. ",
"\\[fig:NMES-mpiw\\]](nmes_mpiw_visits \"fig:\"){width=\"49.00000%\"} ![",
"Mean prediction interval widths and empirical coverage for the test data across 100 test sets. ",
"Preferred methods provide the narrowest intervals while maintaining the nominal (90%) coverage. ",
"The [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model with unknown transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc) is consistently competitive, followed by the [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model with known log transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-log). ",
"The methods that do not including rounding ([<span style=\"font-variant:small-caps;\">bart</span>]{}-log) or include rounding *without* transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id; [@canale2013nonparametric]) are decisively inferior. ",
"\\[fig:NMES-mpiw\\]](nmes_mpiw_nvisits \"fig:\"){width=\"49.00000%\"} ![",
"Mean prediction interval widths and empirical coverage for the test data across 100 test sets. ",
"Preferred methods provide the narrowest intervals while maintaining the nominal (90%) coverage. ",
"The [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model with unknown transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc) is consistently competitive, followed by the [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model with known log transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-log). ",
"The methods that do not including rounding ([<span style=\"font-variant:small-caps;\">bart</span>]{}-log) or include rounding *without* transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id; [@canale2013nonparametric]) are decisively inferior. ",
"\\[fig:NMES-mpiw\\]](nmes_mpiw_ovisits \"fig:\"){width=\"49.00000%\"} ![",
"Mean prediction interval widths and empirical coverage for the test data across 100 test sets. ",
"Preferred methods provide the narrowest intervals while maintaining the nominal (90%) coverage. ",
"The [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model with unknown transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc) is consistently competitive, followed by the [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}model with known log transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-log). ",
"The methods that do not including rounding ([<span style=\"font-variant:small-caps;\">bart</span>]{}-log) or include rounding *without* transformation ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-id; [@canale2013nonparametric]) are decisively inferior. ",
"\\[fig:NMES-mpiw\\]](nmes_mpiw_novisits \"fig:\"){width=\"49.00000%\"}\n\nLastly, we consider a specific prediction task of interest: estimating the probability that an individual will utilize the healthcare system, $\\mathbb{P}(\\tilde y_i > 0 | y)$. We evaluate each method using logarithmic scoring on the event $\\{\\tilde y_i > 0\\}$, which is a proper scoring rule for binary outcomes [@gneiting2007strictly]. ",
"The results are in Figure \\[fig:NMES-logarithmic\\], where larger values indicate superior predictive accuracy. ",
"The [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}models which include both transformation and rounding ([<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-log and [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc) decisively outperform the competitors, especially the continuous-valued model ([<span style=\"font-variant:small-caps;\">bart</span>]{}-log).",
"\n\n![",
"Logarithmic scoring for estimation of $\\mathbb{P}(\\tilde y_i > 0 | y)$ across 100 test sets. ",
"Large scores indicate better performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models are clearly superior relative to [<span style=\"font-variant:small-caps;\">bart</span>]{}-log, with transformed [<span style=\"font-variant:small-caps;\">star</span> ]{}models ([<span style=\"font-variant:small-caps;\">star</span>]{}-log and [<span style=\"font-variant:small-caps;\">star</span>]{}-bc) offering the best performance overall. ",
"\\[fig:NMES-logarithmic\\]](nmes_logscore_visits \"fig:\"){width=\"49.00000%\"} ![",
"Logarithmic scoring for estimation of $\\mathbb{P}(\\tilde y_i > 0 | y)$ across 100 test sets. ",
"Large scores indicate better performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models are clearly superior relative to [<span style=\"font-variant:small-caps;\">bart</span>]{}-log, with transformed [<span style=\"font-variant:small-caps;\">star</span> ]{}models ([<span style=\"font-variant:small-caps;\">star</span>]{}-log and [<span style=\"font-variant:small-caps;\">star</span>]{}-bc) offering the best performance overall. ",
"\\[fig:NMES-logarithmic\\]](nmes_logscore_nvisits \"fig:\"){width=\"49.00000%\"} ![",
"Logarithmic scoring for estimation of $\\mathbb{P}(\\tilde y_i > 0 | y)$ across 100 test sets. ",
"Large scores indicate better performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models are clearly superior relative to [<span style=\"font-variant:small-caps;\">bart</span>]{}-log, with transformed [<span style=\"font-variant:small-caps;\">star</span> ]{}models ([<span style=\"font-variant:small-caps;\">star</span>]{}-log and [<span style=\"font-variant:small-caps;\">star</span>]{}-bc) offering the best performance overall. ",
"\\[fig:NMES-logarithmic\\]](nmes_logscore_ovisits \"fig:\"){width=\"49.00000%\"} ![",
"Logarithmic scoring for estimation of $\\mathbb{P}(\\tilde y_i > 0 | y)$ across 100 test sets. ",
"Large scores indicate better performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models are clearly superior relative to [<span style=\"font-variant:small-caps;\">bart</span>]{}-log, with transformed [<span style=\"font-variant:small-caps;\">star</span> ]{}models ([<span style=\"font-variant:small-caps;\">star</span>]{}-log and [<span style=\"font-variant:small-caps;\">star</span>]{}-bc) offering the best performance overall. ",
"\\[fig:NMES-logarithmic\\]](nmes_logscore_novisits \"fig:\"){width=\"49.00000%\"}\n\nBased on multiple measures of predictive accuracy for each of four count-valued measures of healthcare utilization, the results from our out-of-sample comparison provide definitive confirmation of the predictive capabilities of [<span style=\"font-variant:small-caps;\">star</span> ]{}models, and in particular [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}models which include *both* transformation and rounding.",
"\n\nModeling the decline in Amazon river dolphins {#sec-dolphins}\n=============================================\n\nThe tucuxi dolphin (*sotalia fluviatilis*) is a small river dolphin that inhabits the Amazon River. ",
"While the tucuxi dolphin population was once stable, the progression of habitat degradation, dolphin fishing, and other human interference has to led to increased concerns of population decline. ",
"To assess the validity of these concerns, [@da2018both] gathered data from 1994 to 2017 using multiple observers to search for tucuxi dolphins along a particular segment of the Amazon River. ",
"In addition to the number of tucuxi dolphins observed, the data include the water level (in meters), the number of observers present, and the date for each of $n=312$ surveys. ",
"While [@da2018both] fit a linear model to the logarithm of dolphin counts, we propose to leverage the [<span style=\"font-variant:small-caps;\">star</span> ]{}modeling framework to investigate nonlinear effects and provide greater integer-valued distributional flexibility.",
"\n\nWe use additive models to study the yearly evolution of tucuxi dolphin counts, which may be nonlinear, while adjusting for seasonal, water level, and observer effects. ",
"Specifically, for each survey we include the year (`year`), day-of-year (`doy`), and water level (`water`) as nonlinear predictors and the number of observers (`obs`) as a linear predictor. ",
"For comparisons, we implement a variety of Bayesian additive models: Gaussian additive models for the raw (<span style=\"font-variant:small-caps;\">am</span>-id) and $\\log(y+1)$ transformed data (<span style=\"font-variant:small-caps;\">am</span>-log); [<span style=\"font-variant:small-caps;\">star</span> ]{}models with identity (<span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-id), unknown parametric (<span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc), and unknown nonparametric (<span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np) transformations; and Poisson (<span style=\"font-variant:small-caps;\">am</span>-Pois) and negative-binomial (<span style=\"font-variant:small-caps;\">am</span>-NB) additive models (using `rstanarm`). ",
"For each method, we jointly evaluate the model performance and the computational efficiency: performance is measured using WAIC, while efficiency is reported as seconds per 10000 effective samples. ",
"In particular, we compute multivariate effective sample sizes [@vats2019multivariate] for 10 randomly sampled points from the posterior predictive distribution using the `mcmcse` package in `R` [@mcmcse]. ",
"The results are in Table \\[table:tux-comp\\]. ",
"According to WAIC, the [<span style=\"font-variant:small-caps;\">star</span> ]{}models with unknown transformation (<span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc and <span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np) are strongly preferred, while <span style=\"font-variant:small-caps;\">am</span>-NB is the closest competitor. ",
"However, the existing integer-valued additive models (<span style=\"font-variant:small-caps;\">am</span>-Pois and <span style=\"font-variant:small-caps;\">am</span>-NB) are noncompetitive in computational efficiency.",
"\n\nMultivariate effective sample sizes are computed for 10 randomly selected points from the posterior predictive distribution. ",
"Both transformation *and* rounding via [<span style=\"font-variant:small-caps;\">star</span> ]{}are essential to achieve competitive performance. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}MCMC performance is strong, especially relative to the Poisson and negative-binomial models (using `rstanarm`).",
"\n\nProceeding with <span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np, which is selected by WAIC, we plot posterior expectations and credible intervals for each $f_j$ in Figure \\[fig:am-tux\\]. ",
"MCMC diagnostics for $f_j$ show exceptional mixing with no lack of convergence (see Appendix \\[app:dolphins\\]). ",
"The `doy` plot suggests a seasonal pattern, while the `water` plot exhibits an approximately quadratic effect. ",
"Most importantly, the `year` plot shows a near linear decline in tuxucis dolphins from 1994-2017, which interestingly has leveled off since 2013. ",
"These findings are partially consistent with the results of @da2018both which, assuming only a linear model, also report a significant decrement of dolphins since 1994. ",
"Posterior predictive diagnostics are in Appendix \\[app:dolphins\\], and indicate clear improvements in fit for <span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np relative to models that exclude transformation (<span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-id) or rounding (<span style=\"font-variant:small-caps;\">am</span>-log).",
"\n\n![",
"Posterior expectation and 95% pointwise credible intervals for each $f_j(v_j)$ under <span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np for the dolphins data. ",
"The tick marks indicate the observation points for each predictor. ",
"\\[fig:am-tux\\]](am_doy_tucuxis \"fig:\"){width=\".32\\textwidth\"} ![",
"Posterior expectation and 95% pointwise credible intervals for each $f_j(v_j)$ under <span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np for the dolphins data. ",
"The tick marks indicate the observation points for each predictor. ",
"\\[fig:am-tux\\]](am_water_tucuxis \"fig:\"){width=\".32\\textwidth\"} ![",
"Posterior expectation and 95% pointwise credible intervals for each $f_j(v_j)$ under <span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np for the dolphins data. ",
"The tick marks indicate the observation points for each predictor. ",
"\\[fig:am-tux\\]](am_year_tucuxis \"fig:\"){width=\".32\\textwidth\"}\n\nDiscussion {#discuss}\n==========\n\n[<span style=\"font-variant:small-caps;\">star</span> ]{}processes provide a mathematically elegant and empirically successful framework to model count and integer-valued data. ",
"The approach seamlessly adapts state-of-the-art continuous data models and algorithms to the integer-valued data setting, and thus it offers remarkable modularity both in terms of model specification and computation, while providing ease of implementation and interpretability for practitioners. ",
"By incorporating known, unknown parametric, and unknown nonparametric transformations, [<span style=\"font-variant:small-caps;\">star</span> ]{}processes provide varying degrees of distributional flexibility, and are able to account for important distributional features such as zero-inflation, bounded or censored data, and over- or underdispersion. ",
"Empirically, [<span style=\"font-variant:small-caps;\">star</span> ]{}processes demonstrate goodness-of-fit, out-of-sample point and interval predictive accuracy, reliable inference, and computational scalability. ",
"In addition to the healthcare utilization and animal abundance datasets considered here, we provide further empirical comparisons on three additional datasets in Appendix \\[app:emp\\]. ",
"Among [<span style=\"font-variant:small-caps;\">star</span>]{}, Gaussian, Poisson, and negative-binomial models, the [<span style=\"font-variant:small-caps;\">star</span> ]{}additive and [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}models with unknown transformations consistently provide the best performance according to WAIC.",
"\n\nA variety of promising extensions exist for [<span style=\"font-variant:small-caps;\">star</span>]{}. ",
"The modeling and computational modularity of [<span style=\"font-variant:small-caps;\">star</span> ]{}suggest that new multivariate, functional, and time series models may be developed for integer-valued data. ",
"Furthermore, [<span style=\"font-variant:small-caps;\">star</span> ]{}is capable of modeling rounded data, which is ubiquitous in practice yet rarely considered in modern statistical and machine learning methods. ",
"Lastly, the [<span style=\"font-variant:small-caps;\">star</span> ]{}model - does not strictly require a Bayesian modeling approach, and may be adapted for classical estimation and inference.",
"\n\nSupplemental results\n====================\n\nEvaluating point accuracy for synthetic data {#app:sims}\n--------------------------------------------\n\nTo accompany the WAIC comparisons from the main paper, we evaluate each method for point estimation accuracy. ",
"Specifically, we are interested in estimating the conditional expectation of the observed data, $\\lambda_i^*(x)$. For an estimator $\\hat y_i(x)$, we compute the root mean squared error $\\mbox{RMSE} = \\sqrt{\\sum_{i=1}^n \\big\\{\\lambda_i^*(x) - \\hat y_i(x)\\big\\}^2}$. The fitted values for [<span style=\"font-variant:small-caps;\">star</span> ]{}are computed using the conditional expectation of $y$ at $x \\in \\mathcal{X}$, that is $$\\label{cond-exp}\n \\mathbb{E}\\{y(x)\\} = \\sum_{j=0}^\\infty j \\mathbb{P}\\{y(x) = j\\} \\approx \\sum_{j=1}^{J(x)} j \\mathbb{P}\\{y(x) = j\\},$$ where $\\mathbb{P}\\{y(x) = j\\}$ is the [<span style=\"font-variant:small-caps;\">star</span> ]{}probability mass function and $J(x)$ is a finite truncation. ",
"Since $\\mathbb{P}\\{y(x) = j\\}$ depend on the parameters $\\theta$ in $\\Pi_\\theta$, the posterior distribution of may be computed by evaluating for each draw of $\\theta$ in the MCMC algorithm. ",
"Conservatively, we select $J(x)$ to be the 99.99th quantile of the distribution of $y(x)$ pointwise for each $x$, which is easily computable as $h\\left[g^{-1}\\left\\{z_q^*(x)\\right\\}\\right]$ where $z_q^*(x)$ is the $q$th quantile of $\\Pi_\\theta$. The point estimate is computed as the posterior expectation of .",
"\n\nFigures \\[fig:sim-lm-rmse\\] and \\[fig:sim-bart-rmse\\] depict the relative RMSEs across simulated data sets for the linear and nonlinear simulation designs in Sections 4.1 and 4.2, respectively, defined as the ratio between the RMSE of the generic model over the RMSE for a baseline method, and specifically the <span style=\"font-variant:small-caps;\">lm</span>-log method which represents the common approach of modeling (log-) transformed counts using Gaussian models. ",
"Relative RMSE standardizes model performance across simulated datasets: methods with a relative RMSE less than 1.0 demonstrate superior point estimation relative to the baseline method. ",
"As in Section 4, we find that [<span style=\"font-variant:small-caps;\">star</span>]{}-log and [<span style=\"font-variant:small-caps;\">star</span>]{}-bc are consistently competitive and outperform other methods. ",
"Interestingly, [<span style=\"font-variant:small-caps;\">star</span>]{}-np is much less competitive in RMSE than in WAIC, which suggests that the additional distributional flexibility acquired by modeling $g$ nonparametrically does not necessarily imply more accurate point estimation.",
"\n\n![",
"Relative RMSE under various distributions. ",
"Preferred models have smaller values, and models with values less than 1.0 are preferred to <span style=\"font-variant:small-caps;\">lm</span>-log. ",
"As expected, the <span style=\"font-variant:small-caps;\">lm</span>-NegBin performs well, since it closely matches the data-generating process. ",
"Notably, the [<span style=\"font-variant:small-caps;\">star</span> ]{}models are highly competitive, and clearly superior to the Gaussian models, especially <span style=\"font-variant:small-caps;\">lm</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc and <span style=\"font-variant:small-caps;\">lm</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-log. ",
"\\[fig:sim-lm-rmse\\]](lm_nb_relRMSE \"fig:\"){width=\"49.00000%\"} ![",
"Relative RMSE under various distributions. ",
"Preferred models have smaller values, and models with values less than 1.0 are preferred to <span style=\"font-variant:small-caps;\">lm</span>-log. ",
"As expected, the <span style=\"font-variant:small-caps;\">lm</span>-NegBin performs well, since it closely matches the data-generating process. ",
"Notably, the [<span style=\"font-variant:small-caps;\">star</span> ]{}models are highly competitive, and clearly superior to the Gaussian models, especially <span style=\"font-variant:small-caps;\">lm</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-bc and <span style=\"font-variant:small-caps;\">lm</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-log. ",
"\\[fig:sim-lm-rmse\\]](lm_pois_relRMSE \"fig:\"){width=\"49.00000%\"}\n\n![",
"Relative RMSE under various distributions. ",
"Preferred models have smaller values, and models with values less than 1.0 are preferred to [<span style=\"font-variant:small-caps;\">bart</span>]{}-log. ",
"\\[fig:sim-bart-rmse\\]](bart_nb_relRMSE \"fig:\"){width=\"49.00000%\"} ![",
"Relative RMSE under various distributions. ",
"Preferred models have smaller values, and models with values less than 1.0 are preferred to [<span style=\"font-variant:small-caps;\">bart</span>]{}-log. ",
"\\[fig:sim-bart-rmse\\]](bart_pois_relRMSE \"fig:\"){width=\"49.00000%\"}\n\nModel and MCMC diagnostics for the dolphins data {#app:dolphins}\n------------------------------------------------\n\nPosterior predictive diagnostics for additive models fit to the tucuxis dolphins data are in Figure \\[fig:postpred-am-tux\\]. ",
"The additive [<span style=\"font-variant:small-caps;\">star</span>]{}-np model is adequate for the data, while the models which lack either rounding or transformation are incapable of capturing distributional features, including the variability and the proportion of zeros.",
"\n\nThe MCMC convergence of the additive [<span style=\"font-variant:small-caps;\">star</span>]{}-np model is assessed via traceplots in Figure \\[fig:trace-dolphins\\]. ",
"The traceplots indicate no lack of convergence and demonstrate exceptional mixing: effective sample sizes for all $f_j(v_j)$ exceed 2000.",
"\n\n![",
"Posterior predictive diagnostics for <span style=\"font-variant:small-caps;\">am</span>-log (top row), <span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-id (middle row), and <span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np (bottom row). ",
"The mean (left), standard deviation (center), and proportion of zeros (right) were computed for each posterior predictive simulated dataset (histograms) and the observed data $y$ (vertical lines). ",
"Only the model including both transformation *and* rounding (<span style=\"font-variant:small-caps;\">am</span>-[<span style=\"font-variant:small-caps;\">star</span>]{}-np) is adequate by these measures for the dolphins data. ",
"\\[fig:postpred-am-tux\\]](compare_tucuxis){width=\"100.00000%\"}\n\n![",
"Traceplots for $f_j(v_j)$ and $\\sigma$ under the additive [<span style=\"font-variant:small-caps;\">star</span>]{}-np model for the dolphin data, where the functions $f_j$ are evaluated at the 25th, 50th, and 75th sample quantiles of each $\\{v_{i,j}\\}_{i=1}^n$. The MCMC chain consisted of 5000 iterations (after discarding a burn-in of 5000 and retaining every 3rd sample). ",
"Effective sample sizes for all $f_j(v_j)$ exceeded 2000. ",
"\\[fig:trace-dolphins\\]](trace_dolphins.pdf){width=\"100.00000%\"}\n\nSupplemental empirical examples {#app:emp}\n-------------------------------\n\nFor further models comparisons, we apply the linear, additive, and [<span style=\"font-variant:small-caps;\">bart</span> ]{}models to several additional datasets, and again consider [<span style=\"font-variant:small-caps;\">star</span>]{}, Gaussian, Poisson, and negative-binomial distributions. ",
"For the additive models, each continuous variable (i.e., variables with at least 10 unique observation points) is modeled nonlinearly.",
"\n\n### Ships Data {#ships-data .unnumbered}\n\nThe `ships` data, available in the `MASS` package in `R`, provides the number of damage incidents due to waves for $n = 34$ cargo-carrying vessels, as well as ship type (A-E), year of construction (1960-1964, 1965-1969, 1970-1974, or 1975-1979), the period of construction (1960-1974 or 1975-1979), and the aggregated months of service (ranging from 0 to 44882). ",
"We model the ship type, year of construction, and period of construction as factors, and center and scale the service variable. ",
"The data were analyzed in [@mccullagh1989generalized] using a quasi-Poisson regression model to account for observed overdispersion, and subsequently re-analyzed in [@mallick1994generalized] using a Poisson regression model with unknown link function, which suggests that additional distributional flexibility in the regression model may be important.",
"\n\n### Roaches Data {#roaches-data .unnumbered}\n\n[@gelman2006data] consider a study of pest management for eliminating cockroaches in city apartments. ",
"The response variable, $y_i$, is the number of roaches caught in traps in apartment $i$, with $i=1,\\ldots, n = 262$. A pest management treatment was applied to a subset of 158 apartments, with the remaining 104 apartments receiving a control. ",
"Additional data are available on the pre-treatment number of roaches, whether the apartment building is restricted to elderly residents, and the number of days for which the traps were exposed. ",
"A notable feature of the data is zero-inflation: $y_i = 0$ for 94 (36%) of the apartments.",
"\n\n### Highway Data {#highway-data .unnumbered}\n\nThe `Highway` data, available in the `carData` package in `R`, consists of the 1973 accident rate per million vehicle miles on $n =39$ large sections of Minnesota highway. ",
"Important predictors include the number of access points per mile, the speed limit, the width of the outer shoulder on the roadway (in feet), and the number of signals per mile of roadway, among others. ",
"We consider the accident rate per 10,000 miles, which is the smallest rate for which the observations $y_i$ are integer-valued. ",
"A notable feature of these data are that, despite being (scaled) accident counts, no two observations $y_i$ and $y_j$ are equal, and the counts themselves are large, ranging from 161 to 923. ",
"Therefore, it is unclear *a priori* whether an integer-valued model is necessary or advantageous.",
"\n\n### Results {#results .unnumbered}\n\nThe WAICs for the supplementary datasets are reported in Table \\[table:allApps\\]. ",
"The [<span style=\"font-variant:small-caps;\">star</span> ]{}models consistently perform well across all datasets, and in particular [<span style=\"font-variant:small-caps;\">star</span>]{}-bc and [<span style=\"font-variant:small-caps;\">star</span>]{}-np. ",
"Notably, [<span style=\"font-variant:small-caps;\">star</span> ]{}provides the best linear, additive, and [<span style=\"font-variant:small-caps;\">bart</span> ]{}models for all datasets with the exception of the `Highway` data, for which all [<span style=\"font-variant:small-caps;\">bart</span> ]{}models perform similarly. ",
"Interestingly, additive [<span style=\"font-variant:small-caps;\">star</span> ]{}models are preferred for both the `ships` data and the `Highway` data, while [<span style=\"font-variant:small-caps;\">bart</span>]{}-[<span style=\"font-variant:small-caps;\">star</span> ]{}is slightly preferred to the additive [<span style=\"font-variant:small-caps;\">star</span> ]{}model for the `roaches` data.",
"\n\n[^1]: Assistant Professor, Department of Statistics, Rice University, Houston, TX ([email protected]).",
"\n\n[^2]: Assistant Professor, Department of Statistical Sciences, University of Padova, Padova, Italy.",
"\n"
] |
{
"pile_set_name": "ArXiv"
}
|
[
0,
0.003067484662576687,
0,
0,
0.002898550724637681,
0,
0.007194244604316547,
0.006864988558352402,
0,
0.0049261083743842365,
0,
0,
0.01098901098901099,
0.005128205128205128,
0.01059322033898305,
0,
0,
0,
0.011235955056179775,
0,
0,
0,
0,
0.006711409395973154,
0,
0,
0,
0,
0,
0,
0,
0.004405286343612335,
0,
0,
0,
0.003134796238244514,
0,
0,
0,
0,
0,
0,
0.014084507042253521,
0.0023923444976076554,
0,
0.004901960784313725,
0,
0,
0,
0,
0.0012330456226880395,
0,
0,
0,
0,
0,
0.0034924330616996507,
0,
0,
0,
0,
0,
0.005847953216374269,
0,
0.008695652173913044,
0.0072992700729927005,
0.008771929824561403,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.008968609865470852,
0.00904977375565611,
0.004761904761904762,
0,
0,
0,
0.002044989775051125,
0.001763668430335097,
0.00625,
0.0027548209366391185,
0.006711409395973154,
0,
0,
0.004149377593360996,
0,
0,
0.0035294117647058825,
0,
0.00641025641025641,
0,
0,
0,
0.0016260162601626016,
0.003048780487804878,
0,
0,
0,
0,
0,
0.003861003861003861,
0,
0,
0.0038022813688212928,
0,
0,
0,
0,
0.005050505050505051,
0,
0,
0.0049504950495049506,
0,
0.005405405405405406,
0.003257328990228013,
0.004807692307692308,
0.007462686567164179,
0,
0.004246284501061571,
0.008849557522123894,
0,
0.004878048780487805,
0.007211538461538462,
0,
0.002564102564102564,
0,
0,
0.0045662100456621,
0,
0.00816326530612245,
0.007633587786259542,
0,
0.0055248618784530384,
0,
0,
0,
0.0044742729306487695,
0,
0.002982107355864811,
0,
0,
0.0031645569620253164,
0.0034129692832764505,
0.003484320557491289,
0,
0.01,
0.00967741935483871,
0,
0,
0.00390625,
0,
0.004310344827586207,
0,
0.006097560975609756,
0,
0,
0,
0,
0,
0.004132231404958678,
0.003703703703703704,
0.006920415224913495,
0,
0.005324813631522897,
0,
0.0047169811320754715,
0.006191950464396285,
0,
0.0011806375442739079,
0.00684931506849315,
0.002564102564102564,
0.006430868167202572,
0.014184397163120567,
0.003937007874015748,
0.0030120481927710845,
0.002688172043010753,
0.015267175572519083,
0.005681818181818182,
0.01037344398340249,
0.0049504950495049506,
0.006134969325153374,
0,
0.0030959752321981426,
0.0014388489208633094,
0,
0,
0.007722007722007722,
0,
0.007782101167315175,
0.011627906976744186,
0,
0,
0,
0.020833333333333332,
0,
0,
0,
0.020833333333333332,
0,
0,
0.0017094017094017094,
0.008403361344537815,
0.0032102728731942215,
0.005494505494505495,
0,
0,
0,
0.002288329519450801,
0,
0,
0,
0.020202020202020204,
0,
0,
0,
0,
0.020202020202020204,
0,
0,
0,
0.0027548209366391185,
0,
0.013452914798206279,
0,
0,
0.011764705882352941,
0.010101010101010102,
0.0031446540880503146,
0,
0,
0,
0,
0,
0,
0,
0.006060606060606061,
0.003575685339690107,
0.007462686567164179,
0,
0,
0,
0,
0.009345794392523364,
0.021739130434782608,
0,
0,
0.009345794392523364,
0.021739130434782608,
0,
0,
0.009345794392523364,
0.021739130434782608,
0,
0,
0.009345794392523364,
0.021739130434782608,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.009009009009009009,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.014218009478672985,
0,
0.005235602094240838,
0,
0.0036900369003690036,
0,
0,
0.0011160714285714285,
0.005050505050505051,
0.004878048780487805,
0.044444444444444446,
0.0022624434389140274,
0,
0,
0,
0.0058823529411764705,
0.004032258064516129,
0.008928571428571428,
0,
0,
0.005917159763313609,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.007712082262210797,
0,
0,
0,
0,
0.003875968992248062,
0.004166666666666667,
0.005235602094240838,
0,
0.0021231422505307855,
0,
0,
0.007067137809187279,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.004618937644341801,
0,
0.002457002457002457,
0,
0.002849002849002849,
0.013333333333333334,
0,
0,
0,
0.004545454545454545,
0,
0,
0,
0,
0.008333333333333333,
0,
0,
0.002577319587628866,
0.037037037037037035,
0.019801980198019802,
0
] | 0.002502
| 5
|
[
"package dataflattentable\n\nimport (\n\t\"context\"\n\t\"path/filepath\"\n\t\"strings\"\n\n\t\"github.com/go-kit/kit/log\"\n\t\"github.com/go-kit/kit/log/level\"\n\t\"github.com/kolide/launcher/pkg/dataflatten\"\n\t\"github.com/kolide/launcher/pkg/osquery/tables/tablehelpers\"\n\t\"github.com/kolide/osquery-go\"\n\t\"github.com/kolide/osquery-go/plugin/table\"\n\t\"github.com/pkg/errors\"\n)\n\ntype DataSourceType int\n\nconst (\n\tPlistType DataSourceType = iota + 1\n\tJsonType\n\tExecType\n\tXmlType\n\tIniType\n)\n\ntype Table struct {\n\tclient *osquery.",
"ExtensionManagerClient\n\tlogger log.",
"Logger\n\ttableName string\n\n\tdataFunc func(string, ...dataflatten.",
"FlattenOpts) ([]dataflatten.",
"Row, error)\n\n\texecDataFunc func([]byte, ...dataflatten.",
"FlattenOpts) ([]dataflatten.",
"Row, error)\n\texecArgs []string\n}\n\nfunc TablePlugin(client *osquery.",
"ExtensionManagerClient, logger log.",
"Logger, dataSourceType DataSourceType) *table.",
"Plugin {\n\n\tcolumns := []table.",
"ColumnDefinition{\n\t\ttable.",
"TextColumn(\"path\"),\n\t\ttable.",
"TextColumn(\"fullkey\"),\n\t\ttable.",
"TextColumn(\"parent\"),\n\t\ttable.",
"TextColumn(\"key\"),\n\t\ttable.",
"TextColumn(\"value\"),\n\t\ttable.",
"TextColumn(\"query\"),\n\t}\n\n\tt := &Table{\n\t\tclient: client,\n\t\tlogger: logger,\n\t}\n\n\tswitch dataSourceType {\n\tcase PlistType:\n\t\tt.dataFunc = dataflatten.",
"PlistFile\n\t\tt.tableName = \"kolide_plist\"\n\tcase JsonType:\n\t\tt.dataFunc = dataflatten.",
"JsonFile\n\t\tt.tableName = \"kolide_json\"\n\tcase XmlType:\n\t\tt.dataFunc = dataflatten.",
"XmlFile\n\t\tt.tableName = \"kolide_xml\"\n\tcase IniType:\n\t\tt.dataFunc = dataflatten.",
"IniFile\n\t\tt.tableName = \"kolide_ini\"\n\tdefault:\n\t\tpanic(\"Unknown data source type\")\n\t}\n\n\treturn table.",
"NewPlugin(t.tableName, columns, t.generate)\n\n}\n\nfunc (t *Table) generate(ctx context.",
"Context, queryContext table.",
"QueryContext) ([]map[string]string, error) {\n\tvar results []map[string]string\n\n\trequestedPaths := tablehelpers.",
"GetConstraints(queryContext, \"path\")\n\tif len(requestedPaths) == 0 {\n\t\treturn results, errors.",
"Errorf(\"The %s table requires that you specify a single constraint for path\", t.tableName)\n\t}\n\n\tfor _, requestedPath := range requestedPaths {\n\n\t\t// We take globs in via the sql %, but glob needs *. ",
"So convert.",
"\n\t\tfilePaths, err := filepath.",
"Glob(strings.",
"ReplaceAll(requestedPath, `%`, `*`))\n\t\tif err !",
"= nil {\n\t\t\treturn results, errors.",
"Wrap(err, \"bad glob\")\n\t\t}\n\n\t\tfor _, filePath := range filePaths {\n\t\t\tfor _, dataQuery := range tablehelpers.",
"GetConstraints(queryContext, \"query\", tablehelpers.",
"WithDefaults(\"\")) {\n\t\t\t\tsubresults, err := t.generatePath(filePath, dataQuery)\n\t\t\t\tif err !",
"= nil {\n\t\t\t\t\treturn results, errors.",
"Wrapf(err, \"generating for path %s with query\", filePath)\n\t\t\t\t}\n\n\t\t\t\tresults = append(results, subresults...)\n\t\t\t}\n\t\t}\n\t}\n\treturn results, nil\n}\n\nfunc (t *Table) generatePath(filePath string, dataQuery string) ([]map[string]string, error) {\n\tflattenOpts := []dataflatten.",
"FlattenOpts{\n\t\tdataflatten.",
"WithNestedPlist(),\n\t}\n\n\tif t.logger !",
"= nil {\n\t\t// dataflatten is noisy, so unless we're not debugging it, filter it to info\n\t\tflattenOpts = append(flattenOpts, dataflatten.",
"WithLogger(level.",
"NewFilter(t.logger, level.",
"AllowInfo())))\n\t}\n\n\tif dataQuery !",
"= \"\" {\n\t\tflattenOpts = append(flattenOpts, dataflatten.",
"WithQuery(strings.",
"Split(dataQuery, \"/\")))\n\t}\n\n\tvar results []map[string]string\n\n\tdata, err := t.dataFunc(filePath, flattenOpts...)\n\tif err !",
"= nil {\n\t\tlevel.",
"Info(t.logger).Log(\"msg\", \"failure parsing file\", \"file\", filePath)\n\t\treturn results, errors.",
"Wrap(err, \"parsing data\")\n\t}\n\n\tfor _, row := range data {\n\t\tp, k := row.",
"ParentKey(\"/\")\n\n\t\tres := map[string]string{\n\t\t\t\"path\": filePath,\n\t\t\t\"fullkey\": row.",
"StringPath(\"/\"),\n\t\t\t\"parent\": p,\n\t\t\t\"key\": k,\n\t\t\t\"value\": row.",
"Value,\n\t\t\t\"query\": dataQuery,\n\t\t}\n\t\tresults = append(results, res)\n\t}\n\n\treturn results, nil\n}\n"
] |
{
"pile_set_name": "Github"
}
|
[
0.005964214711729622,
0,
0,
0.03571428571428571,
0,
0.03571428571428571,
0,
0,
0,
0,
0.038461538461538464,
0,
0,
0,
0,
0,
0.006756756756756757,
0.023809523809523808,
0.024691358024691357,
0.02531645569620253,
0.019801980198019802,
0,
0,
0.009009009009009009,
0,
0,
0,
0.03333333333333333,
0,
0.02127659574468085,
0,
0,
0,
0.01098901098901099,
0,
0,
0.037037037037037035,
0,
0,
0.058823529411764705,
0,
0.029411764705882353,
0,
0,
0.00819672131147541,
0,
0,
0,
0,
0,
0
] | 0.00832
| 5
|
[
"Q:\n\nFluent NHibernate - how to specify sequence name for Id with GeneratedBy.",
"Native()\n\nI use Fluent NHibernate and I need to use GeneratedBy.",
"Native() for Id generation to support Oracle,DB2 and MSSQL databases. ",
"If I try to run it like this on Oracle and insert new record to the table I get: \nCould not execute query: select hibernate_sequence.nextval from dual\nSystem.",
"Data.",
"OracleClient.",
"OracleException (0x80131938): ORA-02289: sequence does not exist\n\nMapping class:\npublic sealed class ListDataMap : ClassMap<ListData>\n{\n public ListDataMap()\n {\n Table(\"LIST_DEF\");\n\n Id(x => x.Id, \"ID\").Not.",
"Nullable().GeneratedBy.",
"Native();\n //other mapping\n }\n}\n\nHow can I specify the name of the sequence? ",
"I don't want to use hibernate_sequence because I will need more than 1 sequence and I don't want to have 1 shared sequence.",
"\nThanks!",
"\n\nA:\n\nI have found the answer here: http://thatextramile.be/blog/2007/07/native-id-generation-with-nhibernate/\nIt is simple as this:\nId(x => x.Id, \"ID\").Not.",
"Nullable().GeneratedBy.",
"Native(\n builder => builder.",
"AddParam(\"sequence\", \"SEQ_LIST_DEF\")\n);\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0.012987012987012988,
0.015625,
0.02857142857142857,
0,
0,
0,
0.013215859030837005,
0.043478260869565216,
0,
0,
0,
0.012738853503184714,
0.043478260869565216,
0,
0
] | 0.01134
| 5
|
[
"'use strict';\n\nvar buffer = require('buffer');\nvar Buffer = buffer.",
"Buffer;\nvar SlowBuffer = buffer.",
"SlowBuffer;\nvar MAX_LEN = buffer.kMaxLength || 2147483647;\nexports.alloc = function alloc(size, fill, encoding) {\n if (typeof Buffer.alloc === 'function') {\n return Buffer.alloc(size, fill, encoding);\n }\n if (typeof encoding === 'number') {\n throw new TypeError('encoding must not be number');\n }\n if (typeof size !",
"== 'number') {\n throw new TypeError('size must be a number');\n }\n if (size > MAX_LEN) {\n throw new RangeError('size is too large');\n }\n var enc = encoding;\n var _fill = fill;\n if (_fill === undefined) {\n enc = undefined;\n _fill = 0;\n }\n var buf = new Buffer(size);\n if (typeof _fill === 'string') {\n var fillBuf = new Buffer(_fill, enc);\n var flen = fillBuf.length;\n var i = -1;\n while (++i < size) {\n buf[i] = fillBuf[i % flen];\n }\n } else {\n buf.fill(_fill);\n }\n return buf;\n}\nexports.allocUnsafe = function allocUnsafe(size) {\n if (typeof Buffer.allocUnsafe === 'function') {\n return Buffer.allocUnsafe(size);\n }\n if (typeof size !",
"== 'number') {\n throw new TypeError('size must be a number');\n }\n if (size > MAX_LEN) {\n throw new RangeError('size is too large');\n }\n return new Buffer(size);\n}\nexports.from = function from(value, encodingOrOffset, length) {\n if (typeof Buffer.from === 'function' && (!",
"global.",
"Uint8Array || Uint8Array.from !",
"== Buffer.from)) {\n return Buffer.from(value, encodingOrOffset, length);\n }\n if (typeof value === 'number') {\n throw new TypeError('\"value\" argument must not be a number');\n }\n if (typeof value === 'string') {\n return new Buffer(value, encodingOrOffset);\n }\n if (typeof ArrayBuffer !",
"== 'undefined' && value instanceof ArrayBuffer) {\n var offset = encodingOrOffset;\n if (arguments.length === 1) {\n return new Buffer(value);\n }\n if (typeof offset === 'undefined') {\n offset = 0;\n }\n var len = length;\n if (typeof len === 'undefined') {\n len = value.byteLength - offset;\n }\n if (offset >= value.byteLength) {\n throw new RangeError('\\'offset\\' is out of bounds');\n }\n if (len > value.byteLength - offset) {\n throw new RangeError('\\'length\\' is out of bounds');\n }\n return new Buffer(value.slice(offset, offset + len));\n }\n if (Buffer.isBuffer(value)) {\n var out = new Buffer(value.length);\n value.copy(out, 0, 0, value.length);\n return out;\n }\n if (value) {\n if (Array.isArray(value) || (typeof ArrayBuffer !",
"== 'undefined' && value.buffer instanceof ArrayBuffer) || 'length' in value) {\n return new Buffer(value);\n }\n if (value.type === 'Buffer' && Array.isArray(value.data)) {\n return new Buffer(value.data);\n }\n }\n\n throw new TypeError('First argument must be a string, Buffer, ' + 'ArrayBuffer, Array, or array-like object.');",
"\n}\nexports.allocUnsafeSlow = function allocUnsafeSlow(size) {\n if (typeof Buffer.allocUnsafeSlow === 'function') {\n return Buffer.allocUnsafeSlow(size);\n }\n if (typeof size !",
"== 'number') {\n throw new TypeError('size must be a number');\n }\n if (size >= MAX_LEN) {\n throw new RangeError('size is too large');\n }\n return new SlowBuffer(size);\n}\n"
] |
{
"pile_set_name": "Github"
}
|
[
0.014925373134328358,
0.03125,
0.006134969325153374,
0.002911208151382824,
0,
0,
0,
0.006711409395973154,
0.003745318352059925,
0.005847953216374269,
0,
0
] | 0.005961
| 5
|
[
"---\nabstract: |\n A technique for constructing an infinite tower of pairs of ${{\\cal P}}{{\\cal T}}$-symmetric Hamiltonians, $\\hat{H}_n$ and $\\hat{K}_n$ ($n=2,\\,3,\\,4,\\,\\ldots$), that have exactly the same eigenvalues is described and illustrated by means of three examples ($n=2,\\,3,\\,4$). ",
"The eigenvalue problem for the first Hamiltonian $\\hat\n {H}_n$ of the pair must be posed in the complex domain, so its eigenfunctions satisfy a complex differential equation and fulfill homogeneous boundary conditions in Stokes’ wedges in the complex plane. ",
"The eigenfunctions of the second Hamiltonian $\\hat{K}_n$ of the pair obey a real differential equation and satisfy boundary conditions on the real axis. ",
"This equivalence constitutes a proof that the eigenvalues of both Hamiltonians are real. ",
"Although the eigenvalue differential equation associated with $\\hat{K}_n$ is real, the Hamiltonian $\\hat{K}_n$ exhibits quantum anomalies (terms proportional to powers of $\\hbar$). ",
"These anomalies are remnants of the complex nature of the equivalent Hamiltonian $\\hat{H}_n$. For the cases $n=2,\\,3,\\,4$ in the classical limit in which the anomaly terms in $\\hat{K}_n$ are discarded, the pair of Hamiltonians $H_{n,\\,{\\rm classical}}$ and $K_{n,\\,{\\rm classical}}$ have closed classical orbits whose periods are identical.",
"\naddress:\n- '${}^\\ast$Department of Physics, Washington University, St. Louis, MO 63130, USA\\'\n- '${}^\\dag$Theoretical Physics, Imperial College, London SW7 2AZ, UK\\'\nauthor:\n- 'Carl M Bender${}^\\ast$ and Daniel W Hook${}^\\dag$'\ndate: today\ntitle: 'Exact Isospectral Pairs of ${{\\cal P}}{{\\cal T}}$-Symmetric Hamiltonians'\n---\n\nIntroduction {#s1}\n============\n\nThis paper discusses the infinite class of higher-derivative Hamiltonians $$\\hat{H}_n=\\eta\\hat{p}^n-\\gamma(ix)^{(n^2)}\\quad(n=2,\\,3,\\,4,\\,\\ldots),\n\\label{eq1}$$ where $\\eta$ and $\\gamma$ are arbitrary positive real parameters. ",
"These Hamiltonians are all ${{\\cal P}}{{\\cal T}}$ symmetric; that is, they are symmetric under combined space reflection ${{\\cal P}}$ and time reversal ${{\\cal T}}$. The literature on ${{\\cal P}}{{\\cal T}}$ symmetry is extensive and growing rapidly; some early references [@R1; @R2; @R3; @R4] and recent review articles [@R5; @R6; @R7] provide background for this work.",
"\n\nThe Hamiltonians in (\\[eq1\\]) are special because they are spectrally identical to another class of Hamiltonians $\\hat{K}_n$, which have entirely real spectra. ",
"For example, for the case $n=2$ the Hamiltonian $$\\label{eq2}\n\\hat{H}_2=\\frac{1}{2m}\\hat{p}^2-\\gamma\\hat{x}^4$$ has a real positive discrete spectrum and this spectrum is identical to the spectrum of the conventionally Dirac Hermitian Hamiltonian $$\\hat{K}_2=\\textstyle{\\frac{1}{2m}}\\hat{x}^2+4\\gamma\\hat{p}^4+\\hbar\\sqrt{\n\\textstyle{\\frac{2\\gamma}{m}}}\\,\\hat{p}.",
"\n\\label{eq3}$$ The spectral equivalence of these two Hamiltonians has long been known and has been examined in many papers [@R8; @R9; @R10; @R11; @R12; @R13; @R14].",
"\n\nSpectral equivalences between pairs of non-Hermitian and Hermitian Hamiltonians have been discussed in the past [@R15; @R16] and a number of approximately equivalent pairs of Hamiltonians have been constructed (see, for example, Refs.",
" [@R17; @R18]). ",
"A few other exactly equivalent pairs of Hamiltonians have been found [@R19; @R20; @R21; @R22; @R23; @R24; @R25].",
"\n\nA brief demonstration that the Hamiltonians in (\\[eq2\\]) and (\\[eq3\\]) are spectrally identical is given in Ref.",
" [@R11]. ",
"The prescription introduced in Ref.",
" [@R11] makes use of several elementary transformations of differential equations. ",
"We review this analysis here.",
"\n\nTo begin, we construct the coordinate-space eigenvalue problem for $\\hat{H}_2$ in (\\[eq2\\]) by substituting $\\hat{p}=-i\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}$. The formal eigenvalue problem $\\hat{H}_2\\psi=E\\psi$ then becomes the differential-equation eigenvalue problem $$\\label{eq4}\n-\\frac{\\hbar^2}{2m}\\psi''(x)-\\gamma x^4\\psi(x)=E\\psi(x).$$ The eigenfunction $\\psi(x)$ is required to satisfy homogeneous boundary conditions inside a pair of Stokes’ wedges in the complex-$x$ plane. ",
"These wedges lie below and adjacent to the real-$x$ axis and have angular opening $\\pi\n/3$, as shown in Fig.",
" \\[f1\\].",
"\n\nTo establish that the eigenvalues of (\\[eq4\\]) are also eigenvalues of $\\hat{K}_2$ in (\\[eq3\\]), we follow the simple four-step recipe introduced in Ref.",
" [@R11]:\n\n[**Step 1:**]{} Map the integration path onto the real axis by the change of variable $$x=-2i\\sqrt{1+it},\\quad t\\in(-\\infty,\\infty).",
"\n\\label{eq5}$$ As $t$ runs along the real axis from $-\\infty$ to $+\\infty$, $x$ runs along the complex contour that asymptotes in the Stokes’ wedges shown in Fig.",
" \\[f1\\]. ",
"Under the change of independent variable in (\\[eq5\\]), the derivatives transform as follows: $$\\begin{aligned}\n\\label{eq6}\n\\,\\,\\,{\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}&=&\\sqrt{1+it}\\,{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}},\\\\\n\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}\\right)^2&=&(1+it)\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^2+{\\textstyle{\\frac{1}{2}}}i{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}.",
"\n\\label{eq7}\\end{aligned}$$ Thus, with the substitution $\\psi(x)=\\phi(t)$, (\\[eq4\\]) becomes $$-\\textstyle{\\frac{\\hbar^2}{2m}}\\left[(1+it)\\phi''(t)+{\\textstyle{\\frac{1}{2}}}i\\phi'(t)\n\\right]-16\\gamma(1+it)^2\\phi(t)=E\\phi(t).",
"\n\\label{eq8}$$\n\n[**Step 2:**]{} Take the Fourier transform of (\\[eq8\\]). ",
"The Fourier transform of $\\phi(t)$ is $$f(p)=\\int dt\\,e^{i pt/\\hbar}\\phi(t),\n\\label{eq9}$$ so the Fourier transform of (\\[eq8\\]) is achieved by making the replacements $$it\\to\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\quad{\\rm and}\\quad{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\to-\\frac{ip}{\\hbar},\n\\label{eq10}$$ and we obtain $$\\begin{aligned}\n&&-16\\gamma\\hbar^2f''(p)+\\hbar\\left(\\textstyle{\\frac{p^2}{2m}}-32\\gamma\\right)\nf'(p)+\\left(\\textstyle{\\frac{p^2}{2m}}+\\textstyle{\\frac{3\\hbar p}\n{4m}}-16\\gamma\\right)f(p)\\nonumber\\\\\n&&\\quad=Ef(p).",
"\n\\label{eq11}\\end{aligned}$$\n\n[**Step 3:**]{} Introduce the new dependent variable $g(p)$ by $$f(p)=Q(p)g(p)\n\\label{eq12}$$ and choose $Q(p)$ to remove the one-derivative term and thereby change (\\[eq11\\]) to Schrödinger form. ",
"The condition on $Q(p)$ that eliminates terms containing $g'(p)$ is $$\\textstyle{\\frac{Q'(p)}{Q(p)}}=\\textstyle{\\frac{p^2}{64m\\gamma\\hbar}}-\n\\textstyle{\\frac{1}{\\hbar}}.",
"\n\\label{eq13}$$ Differentiating (\\[eq13\\]), we get $$\\textstyle{\\frac{Q''(p)}{Q(p)}}=\\textstyle{\\frac{p}{32m\\gamma\\hbar}}+\\left(\n\\textstyle{\\frac{p^2}{64m\\gamma\\hbar}}-\\textstyle{\\frac{1}{\\hbar}}\\right)^2\n\\label{eq14}$$ and substituting (\\[eq12\\] – \\[eq14\\]) into (\\[eq11\\]), we obtain the Schrödinger equation $$-16\\gamma\\hbar^2g''(p)+\\left(\\textstyle{\\frac{p^4}{256m^2\\gamma}}+\n\\textstyle{\\frac{\\hbar p}{4m}}\\right)g(p)=Eg(p).",
"\n\\label{eq15}$$\n\n[**Step 4:**]{} Finally, rescale the independent variable $p$: $$p\\to\\sqrt{32m\\gamma}\\,p.",
"\n\\label{eq16}$$ This rescaling makes (\\[eq15\\]) resemble the original Schrödinger equation in (\\[eq4\\]): $$-\\textstyle{\\frac{\\hbar^2}{2m}}g''(p)+\\left(4\\gamma p^4+\\hbar\\sqrt{\n\\textstyle{\\frac{2\\gamma}{m}}}\\,p\\right)g(p)=Eg(p).",
"\n\\label{eq17}$$ The Schrödinger equation (\\[eq17\\]) is associated with the Hamiltonian in (\\[eq3\\]). ",
"Since the differential equation (\\[eq17\\]) is real and the boundary conditions on the eigenfunctions $g(p)$ are imposed on the real axis, it follows that the eigenvalues are real. ",
"This constitutes a rigorous proof that the non-Hermitian Hamiltonian $\\hat{H}_2$ in (\\[eq2\\]) has a real spectrum.",
"\n\nThe term in (\\[eq3\\]) that is proportional to $\\hbar$ is a quantum anomaly that arises as a remnant of the complex boundary conditions on the eigenfunctions associated with (\\[eq4\\]). (",
"These boundary conditions are illustrated in Fig.",
" \\[f1\\].) ",
"In the classical limit $\\hbar\\to0$, we obtain the classical Hamiltonian $$K_{2,\\,{\\rm classical}}=\\textstyle{\\frac{1}{2m}}x^2+4\\gamma p^4.",
"\n\\label{eq18}$$\n\nIt is an interesting but previously unnoticed fact that at the classical level the two Hamiltonians (\\[eq2\\]) and (\\[eq18\\]) are equivalent. ",
"To demonstrate this equivalence we show that the classical trajectories determined by these Hamiltonians in complex-coordinate space have identical periods. ",
"We plot in Fig.",
" \\[f2\\] two classical orbits of $H_{2,\\,{\\rm classical}}$ for $m=1/2$, $\\gamma=1$, and energy $E=1$. Note that there are four turning points, which are located at $x=e^{i\\pi/4}$, $x=e^{3i\\pi/4}$, $x=e^{5i\\pi/4}$, and $x=e^{7i\\pi/\n4}$. A trajectory starting at $x=2i$ gives a closed orbit in the upper-half plane, and a trajectory starting at $x=-2i$ gives a closed orbit in the lower-half plane. ",
"Both orbits have the same period $T$, where $$T=\\frac{\\sqrt{2\\pi}\\Gamma(1/4)}{4\\Gamma(3/4)}=1.854\\,074\\,68\\ldots\\,.",
"\n\\label{eq19}$$ We calculate $T$ by solving Hamilton’s equations ${\\dot x}=\\frac{\\partial H}{\n\\partial p}=2p$ and ${\\dot p}=-\\frac{\\partial H}{\\partial x}=4x^3$. Eliminating $p$, we express the period $T$ as the contour integral $$T=\\oint\\frac{dx}{2\\sqrt{1+x^4}}.",
"\n\\label{eq20}$$ We then use Cauchy’s theorem to distort the contour to one that goes along a ray from the origin to a turning point, encircles the turning point, and follows the ray back to the origin. ",
"The contour then continues along another ray out to the other turning point, encircles this turning point, and follows that ray back to the origin. ",
"The resulting integral becomes a standard representation for a Beta function.",
"\n\nIn Fig.",
" \\[f3\\] we plot the classical orbit for a particle of energy $E=1$ described by the Hamiltonian $K_{2,\\,{\\rm classical}}$ in (\\[eq18\\]). ",
"Note that there are now two and not four turning points located at $x=\\pm1$. The figure shows a closed periodic classical orbit that begins at $x=2i$. The period $T$ of this orbit is exactly that given in (\\[eq19\\]).",
"\n\nFigure \\[f3\\] exhibits a remarkable new topological feature that is not found in the complex classical trajectories of Hamiltonians of the form $p^2+V(x)$, namely, that the classical orbit makes a $270^\\circ$ loop around the turning points. ",
"There have been many studies of complex classical systems [@R2; @R26; @R27; @R28; @R29; @R30; @R31] and in previous numerical studies of complex trajectories the Hamiltonians that were examined were quadratic in the momentum $p$. When the momentum term in the Hamiltonian is quadratic, the trajectory always makes a $180^\\circ$ U-turn about the turning points. ",
"In contrast, with Hamiltonians of the form $p^3+V(x)$, the classical trajectory makes a $240^\\circ$ turn and for Hamiltonians of the form $p^4+V(x)$, the classical trajectory makes a $270^\\circ$ turn about the turning points. ",
"These behaviors are illustrated in Fig.",
" \\[f4\\].",
"\n\nTo understand the angular rotation of a classical trajectory about a turning point, let us consider a Hamiltonian of the form $H=p^n+V(x)$. From the first of Hamilton’s equations, ${\\dot x}=\\frac{\\partial H}{\\partial p}=np^{n-1}$, we can eliminate $p$ from the Hamiltonian and we find that a particle of energy $E$ obeys the equation ${\\dot x}=n[E-V(x)]^{(n-1)/n}$. We can now see that the turning point is also a branch point of an $n$-sheeted Riemann surface. ",
"Note that as $n\\to\\infty$, a classical trajectory that approaches a turning point will make a full $360^\\circ$ turn and continue going in the same direction! (",
"We encounter many examples of such higher-order turning points throughout this paper. ",
"However, we emphasize that, in general, the properties of higher-order classical turning points are not easy to predict analytically, and require the kind of sophisticated analysis used in catastrophe theory.)",
"\n\nThe main objective of this paper is to show how to construct isospectral pairs of Hamiltonians, one of which is associated with a complex eigenvalue problem while the other is associated with a real eigenvalue problem. ",
"There have been many attempts to find isospectral pairs of Hamiltonians of the form $\\hat{p}^2+\nV(\\hat{x})$ by using the four-step differential-equation procedure outlined above. ",
"However, all such attempts have proved fruitless. ",
"In this paper we consider a wider class of Hamiltonians in which $\\hat{p}^2$ is replaced by $\\hat\n{p}^n$, and we suggest by means of illustrative examples (rather than by presenting a proof) that for each integer value of $n$ it is now possible to construct such an isospectral pair of ${{\\cal P}}{{\\cal T}}$-symmetric Hamiltonians. (",
"To construct a proof, one would have to follow the procedure detailed in the illustrative examples in Secs.",
" \\[s3\\] and \\[s4\\].) ",
"The eigenfunctions for the first member of the pair ${\\hat H}_n$ satisfy boundary conditions in Stokes’ wedges in the complex plane. ",
"However, the eigenfunctions for the second member of the pair ${\\hat K}_n$ satisfy a real differential equation with homogeneous boundary conditions given on the real axis. ",
"Therefore, our construction constitutes a rigorous proof that entire eigenspectrum of the complex Hamiltonian ${\\hat H}_n$ is real.",
"\n\nThe Hamiltonian $\\hat{K}_n$ that is spectrally equivalent to $\\hat{H}_n$ has quantum anomaly terms containing powers of $\\hbar$ up to $n-1$. If we discard these anomaly terms, we obtain a pair of [*classical*]{} Hamiltonians that are equivalent in the following sense: For each closed periodic classical trajectory of the first Hamiltonian, it appears that there exists a closed trajectory of the second Hamiltonian that has exactly the same period.",
"\n\nThis paper is organized as follows: In Sec.",
" \\[s2\\] we present some general introductory calculations. ",
"Then, in Secs.",
" \\[s3\\] and \\[s4\\] we treat the cases $n=3$ and $n=4$. Finally, in Sec.",
" \\[s5\\] we make some concluding remarks.",
"\n\nGeneral treatment {#s2}\n=================\n\nIn order to carry out Step 1 on $\\hat{H}_n$ in (\\[eq3\\]) we must generalize the mapping in (\\[eq5\\]): $$x=-\\frac{i}{\\alpha}(1+it)^\\alpha,\\quad t\\in(-\\infty,\\infty),\n\\label{eq21}$$ where $\\alpha=1/n$. Note that this change of variable reduces to (\\[eq5\\]) when $n=2$ ($\\alpha={\\textstyle{\\frac{1}{2}}}$). ",
"Now, as $t$ runs from $-\\infty$ to $+\\infty$ along the real axis, $x$ runs along a complex contour that is appropriate for the Hamiltonian $\\hat{H}_n$.\n\nThe transformations from $x$ derivatives to $t$ derivatives can then be written as $$\\begin{aligned}\n\\,\\,\\,{\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}&=& (1+it)^{1-\\alpha}{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}},\n\\label{eq22}\\\\\n\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}\\right)^2 &=& (1+it)^{2-2\\alpha}\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^2+i\n(1-\\alpha)(1+it)^{1-2\\alpha}{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}},\n\\label{eq23}\\\\\n\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}\\right)^3 &=&(1+it)^{3-3\\alpha}\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^3\n+3i(1-\\alpha)(1+it)^{2-3\\alpha}\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^2\\nonumber\\\\\n&&\\qquad -(1-\\alpha)(1-2\\alpha)(1+it)^{1-3\\alpha}{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}},\n\\label{eq24}\\\\\n\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}\\right)^4 &=&(1+it)^{4-4\\alpha}\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^4\n+6i(1-\\alpha)(1+it)^{3-4\\alpha}\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^3\\nonumber\\\\\n&& \\qquad -(1-\\alpha)(7-11\\alpha)(1+it)^{2-4\\alpha}\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^2\\nonumber\\\\\n&& \\qquad-i(1-\\alpha)(1-2\\alpha)(1-3\\alpha)(1+it)^{1-4\\alpha}{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}.",
"\n\\label{eq25}\\end{aligned}$$ This set of equations generalizes (\\[eq6\\]) and (\\[eq7\\]); (\\[eq22\\]) and (\\[eq23\\]) reduce to (\\[eq6\\]) and (\\[eq7\\]) when $\\alpha={\\textstyle{\\frac{1}{2}}}$. In the next two sections we show how use these results to transform a general class of Hamiltonians of the form (\\[eq1\\]). ",
"Note that the Hamiltonian in (\\[eq2\\]) corresponds to $n=2$. We begin with the simplest generalization, namely, $n=3$.\n\nCase $n=3$ {#s3}\n==========\n\nIn this section we consider the Hamiltonian (\\[eq1\\]) for the case $n=3$: $$\\hat{H}_3=\\eta\\hat{p}^3-i\\gamma \\hat{x}^9.",
"\n\\label{eq26}$$ The corresponding differential-equation eigenvalue problem $\\hat{H}_3\\psi=E\\psi$ is $$\\label{eq27}\ni\\hbar^3\\eta\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}\\right)^3\\psi(x)-i\\gamma x^9\\psi(x)=E\\psi(x).$$\n\nTo solve this boundary-value problem the integration path must lie in Stokes’ wedges. ",
"For the above equation these wedges do not include the real axis. ",
"The wedges are determined by the asymptotic solutions to (\\[eq27\\]), which for large $|x|$ have the form $\\exp(c\\omega x^4)$, where $c=\\frac{1}{4\\hbar}(\\gamma\n/\\eta)^{1/3}$ is a positive constant and $\\omega$ is a cube root of unity: $\\omega^3=1$. From this asymptotic behavior we see that each of the Stokes’ wedges has angular opening $\\pi/4$. We impose boundary conditions in the wedges $-\\pi/8>{\\rm arg}\\,x>-3\\pi/8$ and $-5\\pi/8>{\\rm arg}\\,x>-7\\pi/8$. (These wedges are the shaded regions in the lower-half plane shown in Fig.",
" \\[f5\\].) ",
"Requiring that $\\psi(x)$ vanish as $|x|\\to\\infty$ with ${\\rm arg}\\,x$ in the above two wedges eliminates two of the three possible solutions to (\\[eq27\\]) and keeps only the solution whose asymptotic behavior is given by $\\exp(cx^4)$.\n\nWe now follow Step 1 of the procedure explained in Sec.",
" \\[s1\\] and make the change of variable in (\\[eq21\\]) with $\\alpha=\\frac{1}{3}$. From (\\[eq24\\]) we then obtain the differential equation $$\\begin{aligned}\n&& i\\hbar^3\\eta\\left[(1+it)^2\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^3+2i(1+it)\\left(\n{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^2-\\textstyle{\\frac{2}{9}}{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right]\\phi(t)\\nonumber\\\\\n&& \\qquad-3^9\\gamma(1+it)^3\\phi(t)=E\\phi(t).",
"\n\\label{eq28}\\end{aligned}$$ This differential equation is to be solved on the [*real*]{} axis in the $t$ variable and the solution satisfies homogeneous boundary conditions on the [*real*]{} axis. ",
"Note that as $t$ runs from $-\\infty$ to $\\infty$, the variable $x$ runs from an angle of $-2\\pi/3$ to an angle of $-\\pi/3$ in the complex-$x$ plane. ",
"This integration in the complex-$x$ plane is shown in Fig.",
" \\[f5\\].",
"\n\nFollowing Step 2, we perform the Fourier transform in (\\[eq9\\]) and use (\\[eq10\\]) to obtain $$\\begin{aligned}\n&& \\eta\\left[-\\left(1+\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\right)^2p^3+2\\hbar\\left(1+\\hbar\n{\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\right)p^2-\\textstyle{\\frac{2}{9}}\\hbar^2 p\\right]f(p)\\nonumber\\\\\n&&\\qquad-3^9\\gamma\\left(1+\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\right)^3f(p)=Ef(p).",
"\n\\label{eq29}\\end{aligned}$$\n\nWe then simplify (\\[eq29\\]) by transforming it to a new differential equation that does not have a second-derivative term. ",
"To do so we let $f(p)=Q(p)g(p)$, as in Step 3 of Sec.",
" \\[s1\\]. ",
"The condition on $Q(p)$ that eliminates the second-derivative term is $$\\textstyle{\\frac{Q'(p)}{Q(p)}}=-\\textstyle{\\frac{1}{\\hbar}}-\\textstyle{\\frac{\n\\eta p^3}{3^{10}\\gamma\\hbar}},\n\\label{eq30}$$ and upon differentiation we get $$\\begin{aligned}\n\\textstyle{\\frac{Q''(p)}{Q(p)}}&=&\\textstyle{\\frac{1}{\\hbar^2}}-\\textstyle{\\frac\n{\\eta p^2}{3^9\\gamma\\hbar}}+\\textstyle{\\frac{\\eta^2p^6}{3^{20}\\gamma^2\\hbar^2}}\n+\\textstyle{\\frac{2\\eta p^3}{3^{10}\\gamma\\hbar^2}},\\nonumber\\\\\n\\textstyle{\\frac{Q'''(p)}{Q(p)}}&=&-\\textstyle{\\frac{1}{\\hbar^3}}-\\textstyle{\n\\frac{2\\eta p}{3^9\\gamma\\hbar}}+\\textstyle{\\frac{\\eta^2p^5}{3^{18}\\gamma^2\n\\hbar^2}}+\\textstyle{\\frac{\\eta p^2}{3^8\\gamma\\hbar^2}}\n-\\textstyle{\\frac{\\eta^2p^6}{3^{19}\\gamma^2\\hbar^3}}-\\textstyle{\\frac{\n\\eta p^3}{3^9\\gamma\\hbar^3}}-\\textstyle{\\frac{\\eta^3p^9}{3^{30}\\gamma^3\\hbar^3}\n}.",
"\n\\label{eq31}\\end{aligned}$$ The resulting equation for $g(p)$ is $$\\begin{aligned}\n&&-3^9\\gamma\\hbar^3g'''(p)+\\left(\n\\textstyle{\\frac{\\eta^2\\hbar p^6}{3^{10}\\gamma}}\n-\\eta\\hbar^2p^2\\right)g'(p)\\nonumber\\\\\n&&\\qquad+\\left(\\textstyle{\\frac{4\\eta^2\\hbar p^5}{3^{10}\\gamma}}\n-\\textstyle{\\frac{2\\eta\\hbar^2p}{9}}\n-\\textstyle{\\frac{2\\eta^3p^9}{3^{21}\\gamma^2}}\\right)g(p)=Eg(p).",
"\n\\label{eq32}\\end{aligned}$$ This completes Step 3.",
"\n\nFinally, we perform the scaling $$p\\to\\textstyle{\\frac{27\\gamma^{1/3}}{\\eta^{1/3}}}p\n\\label{eq33}$$ and obtain $$\\begin{aligned}\n&&-\\eta\\hbar^3g'''(p)+\\left(-27\\eta^{2/3}\\gamma^{1/3}\\hbar^2p^2\n+243\\eta^{1/3}\\gamma^{2/3}\\hbar p^6\\right)g'(p)\\nonumber\\\\\n&&\\qquad+\\left(972\\eta^{1/3}\\gamma^{2/3}\\hbar p^5-\n6\\eta^{2/3}\\gamma^{1/3}\\hbar^2p+1458\\gamma p^9\\right)g(p)=Eg(p).",
"\n\\label{eq34}\\end{aligned}$$ This completes Step 4 and from this result we make the [*ansatz*]{} ${\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\to\n\\frac{i}{\\hbar}\\hat{x}$ to identify the Hamiltonian that is equivalent to that in (\\[eq26\\]): $$\\begin{aligned}\n&&\\hat{K}_3=i\\eta\\hat{x}^3+i\\left(-27\\eta^{2/3}\\gamma^{1/3}\\hbar\\hat{p}^2\n+243\\eta^{1/3}\\gamma^{2/3}\\hat{p}^6\\right)\\hat{x}\\nonumber\\\\\n&&\\qquad+\\left(972\\eta^{1/3}\\gamma^{2/3}\\hbar\\hat{p}^5-\n6\\eta^{2/3}\\gamma^{1/3}\\hbar^2\\hat{p}+1458\\gamma \\hat{p}^9\\right).",
"\n\\label{eq35}\\end{aligned}$$ Observe that there is an $\\hbar^2$ anomaly term as well as two $\\hbar$ anomaly terms. ",
"Therefore, in the classical limit $\\hbar\\to0$, $\\hat{K}_3$ in (\\[eq35\\]) becomes $$\\begin{aligned}\nK_{3,\\,{\\rm classical}}=i\\eta x^3+243i\\eta^{1/3}\\gamma^{2/3}p^6x+1458\\gamma p^9.",
"\n\\label{eq36}\\end{aligned}$$\n\nWe now argue that the two classical Hamiltonians, $H_{3,\\,{\\rm classical}}$ and $K_{3,\\,{\\rm classical}}$, are equivalent by computing numerically the classical trajectories for each Hamiltonian and verifying that trajectories having the same energy have the same periods. ",
"In Fig.",
" \\[f6\\] we plot a classical trajectory for $H_{3,\\,{\\rm classical}}$ with $\\eta=1$ and $\\gamma=1$ for a particle of energy $E=1$ starting at $x=0.5\\,i$.\n\nThe trajectory in Fig.",
" \\[f6\\] has an elaborate structure. ",
"It winds around six of the nine turning points in the negative (clockwise) direction. ",
"Because each of the nine turning points is also a branch point of cubic type, with each wind the direction of the path changes by $240^\\circ$, as shown in Fig.",
" \\[f4\\]. ",
"Thus, after the path leaves its starting point at $x=0.5\\,i$, it winds in the negative direction and crosses from sheet zero to sheet two of the Riemann surface (which is equivalent to sheet $-1$). ",
"The number of the sheet is indicated in a circle on Fig.",
" \\[f6\\]. ",
"The path then heads upward and to the left, but it does not cross itself because it is on the second sheet and no longer on the zeroth sheet. ",
"The path then proceeds to visit each sheet of the Riemann surface twice before returning to its starting point at $x=0.5\\,i$ on the zeroth sheet.",
"\n\nWe can calculate the period of this orbit exactly by distorting the path shown in Fig.",
" \\[f6\\] into a path that begins at the origin, travels outward to a turning point along a ray, encircles the turning point, and then returns to the origin, and then repeats this trip five more times. ",
"However, in evaluating the complex line integrals we must be careful to remember that the [*phase*]{} of the integrand changes as the path encircles the turning point. ",
"Upon adding together the contributions from all six turning points we obtain the exact result $T=2[\\cos(\\pi/18)+\\cos(7\\pi/18)]\\Gamma(10/9)\\Gamma(1/3)/\\Gamma(4/9)=\n3.377\\,981\\,999\\,015\\ldots~.$\n\nIn Fig.",
" \\[f7\\] we plot the classical trajectory of a particle of energy $E=1$ governed by the Hamiltonian $K_{3,\\,{\\rm classical}}$ with $\\eta=1$ and $\\gamma=\n1$. This trajectory begins at $x=0$. The time for the particle to follow the path shown in this figure is $T=1.125\\,994\\ldots$, which is precisely $1/3$ of the period of the closed orbit shown in Fig.",
" \\[f6\\]. ",
"We emphasize that the trajectory of this orbit is [*not yet closed*]{}. ",
"Figure \\[f7\\] shows that the particle must trace this path three times before the orbit closes, and the time required to do this is exactly the period of the orbit shown in Fig.",
" \\[f6\\].",
"\n\nOne might think (wrongly!) ",
"that there should be a total of [*six*]{} rather than three turning points on Fig.",
" \\[f7\\]. ",
"We determine the positions of the turning points from the first of Hamilton’s equations $$\\dot{x}=\\frac{\\partial}{\\partial p}K_{3,\\,{\\rm classical}}=3^6 2ip^5x+3^8 2 p^8.",
"\n\\label{eq37}$$ The turning points are the points where $\\dot{x}=0$, and this seems to occur when $p=0$ and when $ix+9p^3=0$. However, if we then substitute each of these conditions into the equation $K_{3,\\,{\\rm classical}}=1$, we find that only the first of these conditions is consistent, so we learn that there are three turning points situated at the three roots of $-i$. The second condition is inconsistent.",
"\n\nCase $n=4$ {#s4}\n==========\n\nIn this section we consider the Hamiltonian $$\\hat{H}_4=\\eta\\hat{p}^4-\\gamma\\hat{x}^{16}.",
"\n\\label{eq38}$$ The substitution $\\hat{p}=-i\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}$ converts the formal eigenvalue problem $\\hat{H}_4\\psi=E\\psi$ into the differential-equation eigenvalue problem $$\\eta\\hbar^4\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}x}}}\\right)^4\\psi(x)-\\gamma x^{16}\\psi(x)=E\\psi(x).",
"\n\\label{eq39}$$ The asymptotic behavior of the eigenfunctions $\\psi(x)$ has the form $\\exp(icx^5/5)$, where $c=\\frac{1}{5\\hbar}(\\gamma/\\eta)^{1/4}$ is a positive constant. ",
"Thus, the eigenfunctions vanish exponentially fast in a pair of ${{\\cal P}}{{\\cal T}}$-symmetric wedges in the lower-half complex-$x$ plane centered about $-3\\pi/10$ and $-7\\pi/10$.\n\n[**Step 1:**]{} We map this differential-equation eigenvalue problem onto the real axis by taking $\\alpha=\\frac{1}{4}$ in (\\[eq21\\]) so that $x=(1-it)^{1/4}$. The mapped eigenvalue problem is $$\\begin{aligned}\n&&\\eta\\hbar^4\\left[(1+it)^3\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^4+\\textstyle{\\frac{9}\n{2}}i(1+it)^2\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^3-\\textstyle{\\frac{51}{16}}(1+it)\\left({\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right)^2-\\textstyle{\\frac{3}{32}}i{\\textstyle{\\frac{\\rm d}{{\\rm d}t}}}\\right]\\phi(t)\\nonumber\\\\\n&&\\qquad -4^{16}\\gamma(1+it)^4\\phi(t)=E\\phi(t).",
"\n\\label{eq40}\\end{aligned}$$\n\n[**Step 2:**]{} Taking the Fourier Transform of (\\[eq40\\]), we get $$\\begin{aligned}\n&&\\eta\\hbar^4\\left[\\left(1+\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\right)^3\\textstyle{\\frac{p^4}{\\hbar^4\n}}-\\textstyle{\\frac{9}{2}}\\left(1+\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\right)^2\\textstyle{\\frac{p^3}{\n\\hbar^3}}+\\textstyle{\\frac{51}{16}}\\left(1+\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\right)\\textstyle{\\frac{\np^2}{\\hbar^2}}-\\textstyle{\\frac{3}{32}}\\textstyle{\\frac{p}{\\hbar}}\\right]f(p)\n\\nonumber\\\\\n&&\\qquad -4^{16}\\gamma\\left(1+\\hbar{\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\right)^4f(p)=Ef(p).",
"\n\\label{eq41}\\end{aligned}$$\n\n[**Step 3:**]{} We transform the dependent variable using $f(p)=Q(p)g(p)$ and choose $Q(p)$ to eliminate the third-derivative term $g'''(p)$. The function $Q(p)$ that does this is $$Q(p)=\\exp\\left(-\\textstyle{\\frac{p}{\\hbar}}+\\textstyle{\\frac{\\eta p^5}{4^{17}5\n\\gamma\\hbar}}\\right).",
"\n\\label{eq42}$$ The result in (\\[eq42\\]) simplifies (\\[eq41\\]) to $$\\begin{aligned}\n&&-4^{16}\\hbar^4\\gamma g''''(p)+\\textstyle{\\frac{3p^{16}\\eta^4}{4^{52}\\gamma^3}}\ng(p)+\\textstyle{\\frac{\\hbar\\eta^3}{4^{35}\\gamma^2}}\\left[8p^{12}g'(p)+54p^{11}\ng(p)\\right]\\nonumber\\\\\n&&\\quad+\\textstyle{\\frac{\\hbar^2\\eta^2}{4^{19}\\gamma}}\\left[24p^8g''(p)+240p^7\ng'(p)+483p^6g(p)\\right]\\nonumber\\\\\n&&\\quad-\\textstyle{\\frac{\\hbar^3\\eta}{32}}\\left[-48p^3g''(p)-6p^2g'(p)\n+87pg(p)\\right]=Eg(p).",
"\n\\label{eq43}\\end{aligned}$$\n\n[**Step 4:**]{} Next, we perform the scaling transformation $$p\\to\\textstyle{\\frac{4^4\\gamma^{1/4}}{\\eta^{1/4}}}p\n\\label{eq44}$$ and obtain the [*real*]{} eigenvalue problem $$\\begin{aligned}\n&&-\\eta\\hbar^4g''''(p)+4^{12}3\\gamma p^{16}g(p)+\\hbar4^9\\gamma^{3/4}\\eta^{1/4}\n\\left[8p^{12}g'(p)+54p^{11}g(p)\\right]\\nonumber\\\\\n&&\\quad+\\hbar^2 4^5\\sqrt{\\gamma\\eta}\\left[24p^8g''(p)+240p^7g'(p)+483p^6g(p)\n\\right]\\nonumber\\\\\n&&\\quad-8\\hbar^3\\gamma^{1/4}\\eta^{3/4}\\left[-48p^3g''(p)-6p^2g'(p)+87pg(p)\n\\right]=Eg(p),\n\\label{eq45}\\end{aligned}$$ whose boundary conditions are posed on the real axis. ",
"Finally, we identify the Hamiltonian that gives rise to this eigenvalue problem by substituting ${\\textstyle{\\frac{\\rm d}{{\\rm d}p}}}\\to\n\\frac{i}{\\hbar}\\hat{x}$: $$\\begin{aligned}\n\\hat{K}_4&=&-\\eta\\hat{x}^4+4^{12}3\\gamma \\hat{p}^{16}\n+4^9\\gamma^{3/4}\\eta^{1/4}\\left(8i\\hat{p}^{12}\\hat{x}\n+54\\hbar\\hat{p}^{11}\\right)\\nonumber\\\\\n&&\\quad+4^5\\sqrt{\\gamma\\eta}\\left(-24\\hat{p}^8\\hat{x}^2+240\\hbar i\\hat{p}^7\n\\hat{x}+483\\hbar^2\\hat{p}^6\\right)\\nonumber\\\\\n&&\\quad-8\\gamma^{1/4}\\eta^{3/4}\\left(48\\hbar \\hat{p}^3\\hat{x}^2-6i\\hbar^2\n\\hat{p}^2\\hat{x}+87\\hbar^3\\hat{p}\\right).",
"\n\\label{eq46}\\end{aligned}$$ We have thus shown that the eigenvalues of $\\hat{K}_4$ are real and are identical to the eigenvalues of $\\hat{H}_4$.\n\nNotice that $\\hat{K}_4$ has first-, second-, and third-order anomaly terms. ",
"In the classical limit $\\hbar\\to0$ we obtain $$K_{4,\\,{\\rm classical}}=-2^{13}3\\sqrt{\\gamma\\eta}\\,p^8x^2\n-\\eta x^4+2^{21}i\\gamma^{3/4}\\eta^{1/4}p^{12}x+2^{24}3\\gamma p^{16}.",
"\n\\label{eq47}$$ We will now demonstrate that the two classical Hamiltonians, $H_{4,\\,{\\rm\nclassical}}$ and $K_{4,\\,{\\rm classical}}$, are equivalent by showing that the classical periods of the motion are identical.",
"\n\nLet us first examine the complex particle motion due to $H_{4,\\,{\\rm\nclassical}}$ for the case $\\eta=1$ and $\\gamma=1$. In Fig.",
" \\[f8\\] we plot a closed orbit of a particle of energy $E=1$ that begins at $0.8i$. The orbit takes the approximate shape of a rectangle and makes $270^\\circ$ turns at the four corners. ",
"The period of this orbit is $T=1.697\\,723\\,019\\,533\\ldots$ . ",
"We can calculate this period exactly by distorting it into rays that go from the origin out to each of the turning points and back to the origin, taking great care to keep track of the phase of the integrand. ",
"The exact formula for the period is $T=[\\cos(3\\pi/16)+\\cos(5\\pi/16)]\\Gamma(1/4)\\Gamma(17/16)/\n\\Gamma(5/16)$.\n\nNext, we examine the classical trajectories of $K_{4,\\,{\\rm classical}}$ for the case $\\eta=1$ and $\\gamma=1$. In Fig.",
" \\[f9\\] we plot the classical trajectory for a particle of $E=1$ that begins at $x=-i$. There are four turning points of fourth-root type. ",
"However, in this figure it is not possible to see the detailed structure of this trajectory near the origin. ",
"Therefore, in Fig.",
" \\[f10\\] we plot a blow-up of the square region in Fig.",
" \\[f9\\] near the origin.",
"\n\nIn Fig.",
" \\[f10\\] we can now see the four turning points and a rather complicated trajectory. ",
"The regions surrounding the upper pair of turning points have a highly detailed structure, and thus the square region surrounding the upper-right turning point is blown up again in Fig.",
" \\[f11\\] (left side). ",
"The vicinity of the turning point contains additional structure, and this region must be blown up still more in Fig.",
" \\[f11\\] (right side).",
"\n\nSummary {#s5}\n=======\n\nWe have shown by using a number of examples that it is possible to construct an infinite tower of pairs of isospectral Hamiltonians $\\hat{H}_n$ and $\\hat{K}_n$, for which the first member of the pair is a complex ${{\\cal P}}{{\\cal T}}$-symmetric Hamiltonian. ",
"The differential-equation eigenvalue problem for the second Hamiltonian is entirely real, and therefore the eigenvalues of both Hamiltonians are real. ",
"The second member of the pair has quantum anomalies of order $\\hbar^{n-1}$. We have also shown that at the classical level, where the anomaly terms in $\\hat{K}_n$ are discarded, the Hamiltonians are equivalent by demonstrating that they have closed orbits of the same period.",
"\n\nMany unsolved problems remain. ",
"For example, we do not know if for [*every*]{} classical orbit of the Hamiltonians $H_{n,\\,{\\rm classical}}$ there is a corresponding classical orbit of the Hamiltonians $K_{n,\\,{\\rm classical}}$ of exactly the same period. ",
"Because complex coordinate space is a Riemann surface having an elaborate sheet structure, it is possible to find various classical orbits having many different periods. ",
"For example, for the classical Hamiltonian $H_{3,\\,{\\rm classical}}$ with $\\eta=1$ and $\\gamma=1$, we find that a particle of energy $E=1$ that starts at $x=1$ has a closed trajectory of period $T=6[\\cos(\\pi/18)+\\cos(5\\pi/18)]\\Gamma(10/9)\\Gamma(4/3)/\\Gamma(4/9)=\n4.143\\,708\\,353\\ldots$ . ",
"This orbit is shown in Fig.",
" \\[f12\\].",
"\n\nWe calculate the period of this orbit exactly by distorting the path shown in Fig.",
" \\[f12\\] into a path that begins at the origin, travels outward to a turning point along a ray, encircles the turning point, and then returns to the origin, and then repeats this trip five more times. ",
"In the complex line integrals the [*phase*]{} for each path advances as the path encircles the turning point. ",
"Upon adding together the contributions from all six turning points we obtain an analytic expression for the period of the motion. ",
"Although we are convinced that one exists, we have not yet been able to find a corresponding orbit of the Hamiltonian $K_{3,\\,{\\rm classical}}$.\n\nCMB is supported by a grant from the U.S. Department of Energy.",
"\n\n[999]{}\n\nC. M. Bender and S. Boettcher, Phys.",
" Rev. Lett., [**",
"80**]{}, 5243 (1998).",
"\n\nC. M. Bender, S. Boettcher, and P. N. Meisinger, J. Math.",
" Phys.",
" [**40**]{}, 2201-2229 (1999). ",
"P. Dorey, C. Dunning, and R. Tateo, J. Phys.",
" A: Math.",
" Gen. [**34**]{}, L391 (2001); ibid.",
" [**34**]{}, 5679 (2001).",
"\n\nC. M. Bender, D. C. Brody, and H. F. Jones, Phys.",
" Rev. Lett.",
" [**89**]{}, 270401 (2002); Am.",
" J. Phys.",
" [**71**]{}, 1095 (2003).",
"\n\nC. M. Bender, Contemp.",
" Phys.",
" [**46**]{}, 277 (2005). ",
"C. M. Bender, Rep. Prog.",
" Phys.",
" [**70**]{}, 947-1018 (2007). ",
"P. Dorey, C. Dunning, and R. Tateo, J. Phys.",
" A: Math.",
" Gen. [**40**]{}, R205 (2007).",
"\n\nA. A. Andrianov, Ann.",
" Phys.",
" (N.Y.) [**140**]{}, 82 (1982).",
"\n\nV. Buslaev and V. Grecchi, J. Phys.",
" A [**26**]{}, 5541 (1993).",
"\n\nH. F. Jones and J. Mateo, Phys.",
" Rev. [**D73**]{}, 085002 (2006).",
"\n\nC. M. Bender, D. C. Brody, J.-H. Chen, H. F. Jones, K. A. Milton, and M. C. Ogilvie, Phys.",
" Rev. D [**74**]{}, 025016 (2006).",
"\n\nH. F. Jones, J. Mateo, R. J. Rivers, Phys.",
" Rev. D [**74**]{}, 125022 (2006). ",
"A. A. Andrianov, Phys.",
" Rev. D [**76**]{}, 025003 (2007). ",
"H. F. Jones and R. J. Rivers, Phys.",
" Rev. D [**75**]{}, 025023 (2007). ",
"F. Scholtz, H. Geyer, and F. Hahne, Ann.",
" Phys.",
" [**213**]{}, 74 (1992).",
"\n\nA. Mostafazadeh, J. Phys.",
" A: Math.",
" Gen. [**36**]{}, 7081 (2003).",
"\n\nH. F. Jones, J. Phys.",
" A: Math.",
" Gen. [**38**]{}, 1741 (2005).",
"\n\nA. Mostafazadeh, J. Phys.",
" A: Math.",
" Gen. [**38**]{}, 6557 (2005); Erratum [*ibid.*]{} ",
"8185.",
"\n\nC. M. Bender, S. F. Brandt, J.-H. Chen, and Q. Wang, Phys. ",
"Rev. D [**71**]{}, 025014 (2005). ",
"C. M. Bender and P. D. Mannheim, arXiv: hep-th/0706.0207. ",
"H. F. Jones, arXiv: hep-th/0711.4967. ",
"D. Krejcirik, H. Bila, and M. Znojil, J. Phys.",
" A: Math.",
" Gen. [**39**]{}, 10143 (2006).",
"\n\nA. Mostafazadeh, J. Phys.",
" A: Math.",
" Gen. [**39**]{}, 13495 (2006).",
"\n\nD. P. Musumbu, H. B. Geyer, and W. D. Heiss, J. Phys.",
" A: Math.",
" Theor.",
" [**40**]{}, F75 (2007).",
"\n\nP. E. G. Assis and A. Fring, arXiv: 0708.2403.",
"\n\nC. M. Bender, D. D. Holm, and D. W. Hook, J. Phys.",
" A: Math.",
" Theor.",
" [**40**]{}, F81-F89 (2007). ",
"C. M. Bender, D. D. Holm, and D. W. Hook, J. Phys.",
" A: Math.",
" Theor.",
" [**40**]{}, F793-F804 (2007). ",
"C. M. Bender, J.-H. Chen, D. W. Darg, and K. A. Milton, J. Phys.",
" A: Math.",
" Gen. [**39**]{}, 4219-4238 (2006). ",
"A. Fring, J. Phys.",
" A: Math.",
" Theor.",
" [**40**]{}, 4215 (2007). ",
"C. M. Bender and D. W. Darg, J. Math.",
" Phys.",
" [**48**]{}, 042703 (2007). ",
"A. Nanayakkara, Czech.",
" J. Phys.",
" [**54**]{}, 101 (2004) and J. Phys.",
" A: Math.",
" Gen. [**37**]{}, 4321 (2004).",
"\n"
] |
{
"pile_set_name": "ArXiv"
}
|
[
0.003424657534246575,
0,
0,
0,
0.0055248618784530384,
0,
0.01020408163265306,
0.024390243902439025,
0,
0.0027624309392265192,
0.042682926829268296,
0.012711864406779662,
0.125,
0.0625,
0,
0.1111111111111111,
0,
0.012048192771084338,
0,
0.00408997955010225,
0.018518518518518517,
0,
0,
0.007042253521126761,
0.012345679012345678,
0,
0.0025252525252525255,
0,
0,
0,
0,
0,
0.004672897196261682,
0,
0.004424778761061947,
0.009900990099009901,
0,
0,
0,
0.02040816326530612,
0,
0,
0,
0,
0.06666666666666667,
0,
0,
0.0038022813688212928,
0,
0,
0,
0.1111111111111111,
0,
0,
0,
0.019390581717451522,
0,
0.02564102564102564,
0,
0.004310344827586207,
0,
0,
0,
0,
0,
0,
0.0029940119760479044,
0,
0,
0,
0,
0,
0.0022172949002217295,
0.022222222222222223,
0,
0,
0,
0,
0,
0.006010518407212622,
0.003205128205128205,
0,
0,
0,
0.0018867924528301887,
0,
0.003436426116838488,
0.00234192037470726,
0,
0.006711409395973154,
0.017241379310344827,
0,
0.002512562814070352,
0,
0.018867924528301886,
0,
0.002403846153846154,
0,
0,
0.0027100271002710027,
0,
0,
0.00558659217877095,
0,
0.14285714285714285,
0.005681818181818182,
0,
0,
0.006289308176100629,
0,
0.005050505050505051,
0.017857142857142856,
0,
0,
0.006896551724137931,
0.011363636363636364,
0,
0,
0.004975124378109453,
0.002840909090909091,
0,
0,
0.005649717514124294,
0,
0,
0.012195121951219513,
0,
0.0058823529411764705,
0,
0,
0.006666666666666667,
0,
0.002583979328165375,
0.0016155088852988692,
0,
0.002109704641350211,
0.0032310177705977385,
0.0017730496453900709,
0,
0,
0,
0.007751937984496124,
0,
0,
0,
0.0043859649122807015,
0,
0,
0.05555555555555555,
0.01818181818181818,
0,
0.1111111111111111,
0,
0.005405405405405406,
0,
0.008620689655172414,
0,
0.0035211267605633804,
0,
0,
0,
0,
0.0058823529411764705,
0.003472222222222222,
0.037037037037037035,
0,
0.011904761904761904,
0,
0,
0,
0.009569377990430622,
0,
0,
0,
0,
0,
0,
0.045454545454545456,
0,
0.027777777777777776,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.045454545454545456,
0,
0,
0.043478260869565216,
0,
0,
0.02702702702702703,
0,
0.030303030303030304,
0,
0,
0.029411764705882353,
0.045454545454545456,
0,
0,
0,
0.02857142857142857,
0,
0.075,
0,
0,
0.037037037037037035,
0,
0,
0.043478260869565216,
0,
0,
0.037037037037037035,
0,
0.0196078431372549,
0,
0.01639344262295082,
0,
0,
0,
0.021739130434782608,
0,
0,
0.037037037037037035,
0,
0,
0.01818181818181818,
0,
0,
0.041666666666666664,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.015625,
0,
0,
0,
0,
0,
0,
0.02702702702702703,
0,
0,
0,
0,
0.027777777777777776,
0,
0,
0
] | 0.008
| 5
|
[
"\n724 S.W.2d 126 (1987)\nVARTANIAN FAMILY TRUST NO. ",
"1, et al., ",
"Appellants,\nv.\nGALSTIAN FAMILY TRUST, et al., ",
"Appellees.",
"\nNo. ",
"05-86-00342-CV.",
"\nCourt of Appeals of Texas, Dallas.",
"\nJanuary 29, 1987.",
"\n*127 John G. Tatum, Dallas, for appellants.",
"\nRobert H. Mow, Jr., Bryant C. Boren, Jr., Emily McKillip, Dallas, for appellees.",
"\nBefore STEPHENS, HECHT and BAKER, JJ.",
"\nBAKER, Justice.",
"\nAppellants, Vartanian Family Trust No. ",
"1 et al., (\"",
"Vartanians\") third-party plaintiffs in the trial court, sued appellees, Galstian Family Trust No. ",
"1 et al., (\"",
"Galstians\") third-party defendants below, for fraud, breach of fiduciary duty, indemnity, and contribution. ",
"Galstians answered with the affirmative defense of res judicata and moved for summary judgment. ",
"The trial court granted the motion, severed the summary judgment, and dismissed the thirdparty action for purposes of appeal. ",
"Vartanians appeal the granting of summary judgment. ",
"For the reasons stated below, we affirm.",
"\nThe trustees and beneficiaries of the Vartanian and Galstian Family Trusts are members of the respective families. ",
"In 1978, the Vartanian and Galstian Family Trusts purchased the Kimberly Woods Apartments on behalf of a joint venture. ",
"In 1980, litigation arose between the two families concerning management of the apartments and joint venture funds. ",
"In a settlement agreement signed by the parties in March 1981, various properties were divided between the families. ",
"The Vartanians received Kimberly Woods Apartments as part of this agreement. ",
"The parties released each other (1) from all claims raised in the lawsuit; (2) from all claims raised as \"other issues\"; and (3) from all claims, known or unknown, that any member of either family may have had against any member of the other. \"",
"Other issues\" referred to those claims raised by each side in the settlement proceeding other than issues concerning disposition of the jointly held real estate.",
"\nIn June 1981 pursuant to the settlement the trial court entered its final order dismissing the claims of all parties with prejudice. ",
"In March 1983, the Vartanians sold the Kimberly Woods Apartments to Hall Briartree Associates. ",
"In April 1984, Hall sued the Vartanians alleging that the Vartanians had fraudulently concealed the existence of termite infestation at Kimberly Woods. ",
"The Vartanians then brought this third-party action alleging that the Galstians *128 had fraudulently concealed the existence of termites from the Vartanians. ",
"In addition, the Vartanians sought contribution and indemnity from the Galstians for the claims brought by Hall Briartree against them.",
"\nIn their argument under points of error one and two the Vartanians assert that the trial court erred in failing to take judicial notice of the laws of the State of California pursuant to the Vartanians' motion to do so under the provisions of Rule 202 of the Texas Rules of Civil Procedure. ",
"We find that this argument is without merit and that Texas law applies to determine the effect of the 1981 judgment of dismissal. ",
"Matters of remedy and procedure are governed by the law of the forum where the suit is maintained. ",
"Penny v. Powell, 162 Tex. ",
"497, 347 S.W.2d 601 (1961).",
"\nTurning our attention to applicable Texas authority, we conclude that the Vartanians' argument that res judicata does not apply is likewise without merit.",
"\nThe Galstians argue that the Vartanians are barred from suing the Galstians on any claim that was or could have been raised in the 1981 lawsuit because of the dismissal with prejudice entered on June 8, 1981. ",
"In so stating they cite Texas Water Rights Comm'n v. Crow Iron Works, 582 S.W.2d 768, 771 (Tex.1979), wherein the Texas Supreme Court enunciates the rule that \"a judgment in the first suit precludes a second action by the parties and their privies not only on matters actually litigated but also on causes of action or defenses which arise out of the same subject matter which might have been litigated in the first suit.\"",
"\nThe Vartanians concede and recognize the rule as quoted above, but argue that res judicata does not apply here because the issue of termite damage and the resultant claim of fraud in the inducement was never presented in any manner and they had no knowledge of the claim in order to assert it in the first action.",
"\nApplicable Texas authority is contrary to the position asserted by the Vartanians. ",
"The 1981 judgment of dismissal is conclusive, not only on the matters actually raised and litigated but also on every other matter which the parties might have litigated and had decided as an incident to or essentially connected with the subject matter of the litigation. ",
"Commonwealth of Massachusetts v. Davis, 140 Tex. ",
"398, 168 S.W.2d 216 (1942); Rhoades v. Prudential Leasing Corp., 413 S.W.2d 404, 407 (Tex. ",
"Civ.",
"App.-Austin 1967, no writ). ",
"The fraud asserted to have been discovered by the Vartanians after the June 1981 judgment does not vitiate the res judicata effect of that order. ",
"See McRae v. Turner, 626 S.W.2d 351, 352 (Tex.",
"App.-Fort Worth 1981, no writ). ",
"As stated in McRae, 626 S.W.2d at 352, \"... [the] judgment otherwise persists [as] res judicata until set aside; and it cannot be attacked or set aside by any method save the exclusive remedy provided by bill of review. ",
"McEwen v. Harrison, 162 Tex. ",
"125, 345 S.W.2d 706 (1961).\" ",
"Although fraud is a ground for setting aside an agreed judgment the other requirements for a bill of review, not alleged here, must also be alleged and proved. ",
"Points of error one and two are overruled.",
"\nIn points of error three and four the Vartanians state that the trial court erred in refusing to permit their claims for contribution or indemnity against the Galstians under the circumstances.",
"\nIt is well settled that neither contribution nor indemnity can be recovered from a party against whom the injured party has no cause of action. ",
"City of Houston v. Watson, 376 S.W.2d 23, 33 (Tex.",
"Civ.",
"App.- Houston 1964, writ ref'd n.r.e.); ",
"Safway Scaffold Co. of Houston, Inc. v. Safway Steel Products, Inc., 570 S.W.2d 225, 229 (Tex.",
"Civ.",
"App.-Houston [1st Dist.] ",
"1978, writ ref'd n.r.e.); ",
"Grove Mfg. ",
"Co. v. Cardinal Construction Co., 534 S.W.2d 153, 154 (Tex.",
"Civ.",
"App.-Houston [14th Dist.] ",
"1976, writ ref'd n.r.e.). ",
"This is the situation here. ",
"Points of error three and four are overruled.",
"\nThe judgment of the trial court is affirmed.",
"\n"
] |
{
"pile_set_name": "FreeLaw"
}
|
[
0,
0,
0.021739130434782608,
0,
0,
0,
0,
0,
0.022727272727272728,
0.037037037037037035,
0.07894736842105263,
0.125,
0.025,
0,
0.01020408163265306,
0,
0,
0,
0,
0,
0,
0.008620689655172414,
0.016666666666666666,
0,
0,
0,
0,
0,
0,
0.010526315789473684,
0.013157894736842105,
0,
0.007407407407407408,
0.00684931506849315,
0,
0,
0.038461538461538464,
0,
0.0064516129032258064,
0,
0.002369668246445498,
0,
0,
0,
0.04081632653061224,
0.01098901098901099,
0,
0,
0,
0.021739130434782608,
0,
0.004545454545454545,
0.06896551724137931,
0,
0,
0,
0,
0,
0,
0,
0,
0.02127659574468085,
0,
0,
0,
0.09090909090909091,
0.01694915254237288,
0,
0,
0,
0,
0,
0,
0
] | 0.009559
| 5
|
[
"Thursday, August 3, 2017\n\nI'm not\nconsciously bucking convention for your clicks. ",
"I'm not playing the role of self-styled trash\niconoclast. ",
"I may, however, be a man with questionable taste as regards a certain strain\nof Hollywood filmmaking. ",
"That, and/or I have a pronounced tendency to\nenjoy weird, messy movies which few others seem to enjoy, at least at first blush. ",
"Or both! ",
"Probably I'm both! ",
"Either\nway, I am happy to report that I thoroughly enjoyed my first visit to The Dark\nTower even though seemingly no one else did*. ",
"Also, I have no idea whether I\nwill enjoy it a second time or if you will enjoy it at all. ",
"Judging by the\nreviews, you probably will not? ",
"Aren’t you glad you clicked this review?",
"\n\nI've been a fan of King's epic magnum opus since the publication of the second book in the series in paperback, waaaaay back in the ancient era of 1989. ",
"I've read the series, the novella, the Concordances, the graphic novels, and every King book that connects to the Tower saga. ",
"But I never\nbelieved that The Dark Tower would actually be a movie. ",
"Moreover, I’ve never really\nbelieved that The Dark Tower would be a decent movie. ",
"The lead up to the film’s\nrelease, with its multiple date changes, lack of a strong marketing push and,\nfor that matter, any trailers until two months before the film's release, not to mention the absence of buzz and the reports of disastrous early screenings, all but confirmed that I was right. ",
"The\nreviews, which were unleashed last night on hopeful fans of the books like\nplague rats on unwary babies, made things definitive: The Dark Tower is a bad\nmovie. ",
"A flat balloon. ",
"A total disappointment. ",
"A banal wreck of the Hesperus\nthat has managed to score more poorly than Batman v. Superman, formerly the poster\nchild for Movies That No One In Their Right Mind Would Defend.",
"\n\nSo of\ncourse I enjoyed it.",
"\n\nMind you, the movie on screen isn't actually The Dark Tower - not as King wrote it. ",
"It's a weirdo amalgamation of Dark Tower elements that's remarkably out of step with current adaptation trends, far more reminiscent of past decades of film adaptations in how cavalierly it plunders the source material in order to craft a \"Hollywood version.\" ",
"On a first\nviewing The Dark Tower is an appealing throwback to the kind of mid-budget,\noverly serious, semi-to-genuinely ambitious fantasy films made in the 1980s; the\nsort of films I tended to stumble over as a child via friends or cable and that I very much enjoyed for their feeling tactile and a bit dog-eared; as much\nbecause of as in spite of their flaws and absurdities. ",
"The ragged edges and everything-but-the-kitchen-sink\napproach are part of the appeal. ",
"So too the flirtations or outright dalliances with\ncamp. ",
"I want to rewatch The Dark Tower on slightly degraded VHS. ",
"I want to do a double feature with, say, Highlander or Willow or something. ",
"THAT'S the vibe this movie gives off, and for some reason I'm okay with that on first viewing despite this movie in no real way resembling the books that made me fall in love with these stories.",
"\n\nAs a book\nseries The Dark Tower is very weird and messily constructed and sometimes very\nsilly and embarrassing (This is a saga containing a bizarre and totally\nunneeded reconstruction of the Emerald City, as well as Doctor Doom robots\nwhich throw Harry Potter snitches at people, to name just two examples). ",
"Those\nqualities were and are part of the appeal. ",
"The Dark Tower as a movie feels\nsimilarly messy and silly and weird, and if it isn't 100% clear, I like messy and silly and weird.",
"\nThese things unironically appeal to me. ",
"I want Matthew McConaughey's Evil Villain to be in charge of a\ngiant death-ray that's powered by unwilling psychic children who live in a\ntotally unexplained compound on top of a mesa in another world. ",
"I want to see him use this death-ray right away, with as little explanation as possible. ",
"Yes, please.",
"\nI want homeless people living in NYC who are secretly refugees from that unexplained\ncompound, and I want inexplicable sci-fi portals leading into the kitchens of\nChinese restaurants, and I want Dennis Haysbert intoning the Gunslinger's Creed very seriously, and I want battles with Todash monsters samidst rusting theme park equipment, and I want demons made of floorboards and an\noverweight guy from the Sombra organization leaping like a monkey over NYC\nrooftops and and and and and….",
"\n\nA lot of\nvery smart, very cool people saw something crushingly mediocre and/or\nunforgivable when they watched The Dark Tower. ",
"They're not wrong. ",
"If you're a Tower junkie - a longtime Constant Reader - you're probably going to hate the movie. ",
"However, here is what I saw as a longtime fan of King's series: a purposefully\nstripped-down (far too stripped down), leanly propulsive introduction to Jake Chambers, Roland\nDeschain, Walter Padick (aka The Man in Black), as well as the concept of the Tower as\nthe hub of the multiverse. ",
"It's not a good adaptation of the books, but it's an approach that functions as a quasi-sequel to the books I've dearly loved while also coming across as its own bizarre and wounded beast. ",
"A number of reviews have complained that the plot is\nincomprehensible. ",
"Very possibly my love for and knowledge of the source material has made it impossible\nfor me to see that incomprehensibility, but it seemed fairly straightforward to\nme, collapsing an absurdly overstuffed mythology into a story\nthat fits a single film: The Tower stands at the center of all worlds, keeping them safe. ",
"The Man in Black wants to bring the Tower down. ",
"Doing\nso will let a bunch of demons and darkness into the universe. ",
"He wants to use\nJake to do it, since Jake’s strong in The Shine, a powerful psychic ability that can be harnessed to break the Tower. ",
"Roland, formerly\na protector of the Tower, doesn’t care about any of that now, doesn’t see the point\nin battling a darkness he can’t individually conquer, and only wants vengeance for the life of his father.",
"\nJake meets him and helps him broaden his mind and open his heart a little.",
"\n\nThat’s the film, easily\nunderstood to my mind, and I don’t think there’s anything wrong in concept with limiting the story's initial scope and making clear the stakes involved in order to welcome the 90% of people who have never read King’s\nDark Tower books. ",
"Nor, for some reason, do I have any issue with their taking extensive liberties here despite my longstanding love of this series. ",
"I never felt like I couldn't understand what I was seeing. ",
"I didn’t feel\nlike the film as a whole was hopelessly disjointed and broken. ",
"I didn’t feel as\nthough the leads were sleepwalking through the film or betraying the source\nmaterial.",
"\n\nMcConaughey\nbrings a grimly purposeful emptiness to the role of Walter, the Man in\nBlack, Roland's ageless nemesis and the more he strutted around like a Nihilist\nPeacock who just does not give a fuck about anything, the more I bought into\nthat emptiness. ",
"Walter’s casual sadism isn't showily Evil, it's bored. ",
"He’s\nbored, and he wants out; out of the universe, out of life, eager for an end to\nall things, and McConaughey’s emptiness sells that eagerness. ",
"Also, hearing an\nactor of McConaughey's caliber intone very seriously about his magic powers (or\nrather, his “magicks”) is deeply weird and dopey but also really satisfying?",
"\nThis is where the camp elements of the film – mostly centered around\nMcConaughey and his band of sycophants – simply clicked for me. ",
"McConaughey casually\ncooking up some chicken while wearing an apron, right before he murders two people is just goofy as fuck, and (to my twisted mind) a total hoot. ",
"McConaughey\nrolling around multiple worlds, telling people in a Very Serious Voice to “stop\nbreathing,” which they then promptly do, is blackly hilarious and campy as all\nget out. ",
"I can’t be the only one who enjoys that sort of thing, can I?",
"\n\nAs for Roland\nhimself Idris Elba goes minimalist, as he should, while bringing interesting flickers\nof emotion to the surface over the course of the film – like flecks of mica in\ngranite. ",
"I particularly liked the flash of quiet madness across his face at\nthe thought that Jake might be one of Walter’s tricks. ",
"As someone who has held\nRoland Deschain in my head for over a quarter of a century I thought Elba did\nsolid work in introducing King’s most complicated creation. ",
"The movie's script lets him down by eliding entirely over the flashbacks that gave the character depth in the first Dark Tower book, but that's not Elba's fault. ",
"He's got charisma to burn, and he fits the role like a well-worn glove. ",
"There were outcries when Elba was cast, since Roland is very clearly a white man in the books (and that fact is an actual plot point for a good part of the second novel). ",
"I don't care. ",
"Elba embodies Roland's laconic stoicism and his wounded heart quite well, say thankee.",
"\n\nThe big\nsurprise is Tom Taylor, playing young Jake Chambers. ",
"He’s saddled with the most\nthankless and the most precarious role, and he does shockingly good work with\nwhat's on the page and more importantly with what is not on the page (which is,\nI presume, a lot). ",
"He’s gratifyingly authentic as Jake, and he elevates the\nfilm around him simply by feeling like a real kid from New York City, absorbing\neverything the film throws at him. ",
"Taylor and Elba have solid chemistry, and\nwhile I would be very surprised at this point if there’s ever a sequel I would genuinely\nenjoy seeing them play off of one another again.",
"\n\nSure, yes,\nthere are lots of problems. ",
"For one, the scenes with Fran Kranz fiddling around with portal\ntechnology and McConaughey’s death-ray feel like the most pedestrian scenes in\nthe film. ",
"Then again, I sat through multiple, duller (and seemingly lengthier), scenes of The\nRed Skull and Arnim Zola standing around talking about developing death-ray\ntechnology without condemning Captain America: The First Avenger in the entirety. ",
"It wasn’t any\nharder to do that here. ",
"For another, the script is as mentioned a throwback to the way Hollywood USED to adapt genre properties - namely, however the hell they wanted, and damn the fans - and while I enjoyed the film for what it was (again, a throwback to 80s fantasy films ala Highlander or Krull) the script isn't great. ",
"More importantly, the elimination of the flashbacks contained in the first Dark Tower novel means that Roland himself isn't as complicated or as interesting as he would be if we saw more of his harsh and unforgiving, melancholy upbringing. ",
"The film's leanness lets Roland down in this respect and that's a bummer. ",
"Thirdly, the script as it appears on the screen leans too heavily on educating the audience via exposition as opposed to letting us puzzle things out. ",
"That's a shame, but there is - to my genuine surprise - ZERO prolonged voiceover explaining things to us. ",
"That's a plus.",
"\n\nFinally and relatedly, to those of us who may or may not have scrutinized\nevery inch of trailer footage and who've noticed the film's running time, it’s fairly obvious that great big hunks of the film were\nexcised. ",
"Despite feeling like I got a fast-paced, full story from the\nfilm and despite really liking the experience of a genre film that clocks in at\nunder two hours (we could all do with more movies that last an hour and a half), I still wanted more. ",
"My biggest issue with The Dark Tower on first\nwatch is that it simply isn't long enough. ",
"It isn't that I wanted more action. ",
"It's that I wanted the film to relax more, to breathe\ndespite McConaughey’s commands to the contrary, to luxuriate in some longer conversations\nand some wordlessness and more weirdness. ",
"It is highly doubtful that we will ever see any sort of Deluxe\nDirector’s Cut Edition of the film and that feels like a shame, because another\n20 minutes of Jake and Roland making their way through Mid-World together would definitely enrich my experience.",
"\n\nWhere was this?",
"\n\nThat looks like a door from Drawing of the Three! ",
"Where was this?",
"\n\nOh, hey, a depiction of the Tower's beams! ",
"Where was this?",
"\n\nSay hey, where was this?",
"\n\nWhere dis?",
"\n\nThe Dark\nTower is not the movie I had in my head, at all, but then I honestly wonder whether it really\ncould be. ",
"Not theoretically, in a Best of All Possible Worlds game, as a prestige HBO series (Lord, how I wish...) or a three-hour Lord of the Rings-style epic that's faithful to the first novel (Which would also be wonderful..), but as a\nfilm that is actually financed and filmed and put into theaters by the same\ncompanies currently trying to build out a hundred different cinematic universes.",
"\nMaybe that makes me a cynic, but hey, I’m the one pointing to the positives in\na movie currently sitting at 16% on Rotten Tomatoes*, so clearly I’ve got SOME\noptimism in me.",
"\n\n*This\nscore positions The Dark Tower as “worse” than Baywatch in the eyes of those poor\nsouls who think of RT’s aggregated “scores” as some kind of critical Final\nWord. ",
"It similarly positions The Dark Tower as more reviled than The Oogieloves and the Great Balloon Adventure, and that is fucking insane.",
"\n\nThe\nDark Tower is not the second coming of The Fellowship\nof the Ring. ",
"We're all bummed about that. ",
"It is, however, a perfectly serviceable and surprisingly enjoyable if unfortunately truncated and bizarrely loose\nintroduction to a very weird, very complicated, very goofy, very niche property\nthat I have loved unabashedly for over a quarter of a century. ",
"Much like the\nfirst book of King’s series it is functional, but not\nextraordinary.",
"\n\nIt took King writing The Drawing of the Three\nfor the world of the Dark Tower to come to full, satisfying, exciting life. ",
"That’s\nthe book that made me and many others fall fully in love with Roland and Jake (and\nEddie and Susannah, whom we will now likely never see). ",
"It’d be nice if the film made enough money to justify\ntheir at least attempting to make a second film incorporating the elements of\nthat book, introducing the two characters who truly make the story whole, and\ngiving the filmmakers an honest opportunity to learn from the choices and the\nmistakes made in their initial film. ",
"Whether they do or don’t learn would be up\nto them, but it’d be nice.",
"\n\nSigh.",
"\n\nThat’s\nhow I feel today at any rate. ",
"I liked it, warts and all, despite the reservations and the problems that are very self-evident. ",
"I left the theater legitimately smiling even if I'm not especially clear on why. ",
"The thing\nof it is, I don’t know if I'm blind. ",
"I can't tell whether, as a longtime fan, being swept up in the\nexcitement of seeing ANY Dark Tower movie led me to fall for a bad Dark Tower movie.",
"\nAll these poor reviews seem to say that's exactly what’s happened. ",
"By their\nmeasure I’m sufficiently intoxicated by the pure lizard-brained satisfaction of\nseeing a bunch of stuff I never thought I'd see on screen brought to life that\nI cannot distinguish between a fun, liberal mash-up of a series I love and drab\nmediocrity. ",
"That’s disturbing to me. ",
"I don’t want to be viewed as someone who\ndefends “bad” movies. ",
"Nevertheless, a fun, liberal mash-up is what I saw last\nnight.",
"\n\nI'm seeing the movie again this weekend, with all of this negative criticism\nnow firmly in mind, and part of me kind of hopes that some kind of scales will\nfall from my eyes and I'll join the ranks of the 84% who just really, really do not\nlike the film. ",
"That would be easier, yeah? ",
"I could laugh off my initial\nenjoyment as a product of my wishful thinking and my longstanding fandom, and pitch\nin on bashing this particular piñata. ",
"Better that outcome surely than to feel\nlike some kind of bizarro Armond White, enthusiastically endorsing films that\nother smarter, better writers want to kill with fire. ",
"Once I see it again I’ll\nreport back and let you know whether my opinion’s changed.",
"\n\nUltimately I'm a guy who likes and sometimes\nloves a lot of films that are divisive and wounded and strange. ",
"Films that may or may not ever gain a cult\nfollowing, and which I seem predisposed to want to take in and cuddle from the\noutset. ",
"Today I add The Dark Tower\nto that list.",
"\n\nWelcome, Foolish Mortals..\n\nWelcome to MMorse Writes! - ",
"a resurrected home for the various-and-sundry scribblings of MMorse, author of the upcoming book \"Speaking Backward: Exploring the Themes and Mythology of Twin Peaks.\"",
"\n\nI encourage you to bookmark and/or join this blog, and to contribute your comments and your thoughts. ",
"They are always read, and always appreciated. ",
"If you'd like to get in touch with me for any reason (lucrative writing assignments, offers of free swag, pop culture recommendations and invitations to affairs of state are all encouraged), you may do so at [email protected]."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0,
0,
0,
0,
0,
0,
0,
0.01098901098901099,
0,
0,
0.0064516129032258064,
0.007936507936507936,
0.014705882352941176,
0.012195121951219513,
0,
0,
0,
0,
0.011428571428571429,
0,
0,
0.0038461538461538464,
0.0026455026455026454,
0,
0,
0.03389830508474576,
0.013157894736842105,
0,
0.006430868167202572,
0,
0.007692307692307693,
0,
0.0049504950495049506,
0,
0,
0.010245901639344262,
0,
0,
0.010309278350515464,
0.013888888888888888,
0,
0,
0.0031446540880503146,
0,
0,
0.022388059701492536,
0.004830917874396135,
0,
0.007662835249042145,
0,
0,
0,
0,
0.007751937984496124,
0.01818181818181818,
0.00684931506849315,
0.005780346820809248,
0,
0,
0,
0,
0.005263157894736842,
0.01639344262295082,
0.018518518518518517,
0.012345679012345678,
0,
0.005847953216374269,
0,
0,
0.031746031746031744,
0,
0.011627906976744186,
0.0111731843575419,
0,
0.013071895424836602,
0.008264462809917356,
0,
0.006688963210702341,
0.004166666666666667,
0,
0,
0,
0,
0,
0,
0.011235955056179775,
0,
0.005376344086021506,
0,
0,
0,
0,
0.022222222222222223,
0,
0,
0.08333333333333333,
0,
0.005194805194805195,
0.005747126436781609,
0.011695906432748537,
0,
0.0136986301369863,
0,
0,
0.012195121951219513,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0.006802721088435374,
0,
0,
0,
0,
0,
0,
0,
0,
0.005813953488372093,
0,
0,
0,
0.025,
0.017241379310344827,
0,
0,
0,
0.004329004329004329
] | 0.004679
| 5
|
[
"Christian Mohr\n\nChristian Mohr (born April 5, 1980) is an American football defensive end who played for the Seattle Seahawks, Philadelphia Eagles and Cleveland Browns of the National Football League.",
"\n\nHe was signed by the Düsseldorf Panther in 2001 to play in the GFL. ",
"He started playing football at the age of 19. ",
"\nFive years later, Christian Mohr signed a two-year contract with the Seattle Seahawks in 2005, despite never having played college football in the United States. ",
"\nChristian also played for the Berlin Thunder and Rhein Fire in the NFL Europe from 2004 to 2007, won the World Bowl with Berlin Thunder 2004 and received All-NFL Europe team honors in 2005 and 2006 and Team Defense MVP honors in 2005, 2006 and 2007.",
"\nThe Indianapolis Colts offered him a contract for the 2007 NFL season, but an injury kept Mohr from playing.",
"\nHowever, he kept training with his local Aachen team Grasshopper Hassenichjesehn until his injuries healed.",
"\n\nHe played for the GFL-Team Kiel Baltic Hurricanes for the second half of the 2009 season. ",
"The Mönchengladbach Mavericks signed him for the 2010 and 2011 season.",
"\n\nExternal links\nCleveland Browns bio\n\nCategory:1980 births\nCategory:Living people\nCategory:Sportspeople from Aachen\nCategory:German players of American football\nCategory:American football defensive ends\nCategory:German Football League players\nCategory:Seattle Seahawks players\nCategory:Berlin Thunder players\nCategory:Philadelphia Eagles players\nCategory:Rhein Fire players\nCategory:Cleveland Browns players"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.035,
0.02857142857142857,
0,
0.012195121951219513,
0.012,
0.01834862385321101,
0,
0.010869565217391304,
0,
0.01715686274509804
] | 0.013414
| 5
|
[
"YouTube\n\nMay 12, 2008\n\nVideo and testimonials on the travesty that occurred in the aftermath of Hurricane Katrina when police and law enforcement confiscated lawfully-owned firearms–at precisely the time citizens needed them most for self-defense!",
"\n\n\n\nThe Emergency Election Sale is now live! ",
"Get 30% to 60% off our most popular products today!"
] |
{
"pile_set_name": "OpenWebText2"
}
|
[
0.004048582995951417,
0,
0
] | 0.00135
| 5
|
[
"Carroll Six automobile\n\nThe Carroll Six automobile was built by the Carroll Automobile Company of Lorain, Ohio, from 1920 to 1922. ",
"It was commonly called the \"Carroll Car.\"",
"\n\nHistory\nCharles F. Carroll, the company's founder, was an advertising mogul who had success in an account with Fisk Tires through an agency he operated in nearby Cleveland. ",
"He attempted to purchase the Moon Automobile Company of St. Louis, Missouri, following the death of Joseph W. Moon in 1918 but did not succeed. ",
"Carroll's earnings from the advertising business financed his car-building venture, and he built automobiles in a factory located in a former brass works on Washington Avenue in Lorain, Ohio.",
"\n\nCar details\nThe Carroll Six was offered in both a two-door roadster model and as a four-door open touring sedan. ",
"The four-door had a distinctive black leather over steel California top, which was a non-folding hardtop with an opera window in the C-pillar. ",
"The car was also unusual in that the radiator was placed ahead of the front axle. ",
"Two paint colors were available, Carroll Green and Carroll Red, each in two-tone finishes.",
"\n\nIt sold for US$3985 FOB and offered many items as standard, such as a leather interior, at a time when options were becoming popular among car buyers.",
"\n\nThe cars were assembled from parts purchased from various manufacturers. ",
"Carroll Cars were fitted with a Buda six-cylinder engine, but there are records showing that Beaver sixes and Rochester sixes may have been used. ",
"The 66hp engine's top speed was 62mph/100km/h.",
"\n\nProduction\nActual production figures vary. ",
"Approximately 600 cars were built; however, some sources state that the number is about 400 cars, mostly touring sedans. ",
"Other sources state 183 cars. ",
"Only one confirmed survivor, a Carroll Green touring sedan, is on display at the William E. Swigart, Jr. Antique Automobile Museum located in Huntingdon, Pennsylvania. ",
"This car was purchased directly from Charles F. Carroll in 1967 and had been his personal car for many years.",
"\n\nEnd of the line\nAlthough accounts vary, it has been said that a number of cars were assembled and placed on a train bound for California to fill dealer orders. ",
"The cars were shipped with missing or inadequate radiator fluid and the train was held over during a blizzard in Chicago. ",
"When the cars arrived in California, none of them would start or could be driven; all had damaged engine blocks. ",
"They were scrapped and were a total loss, costing the company its business. ",
"This, along with a national economic downturn, brought the assembly of the Carroll Six to a halt in 1922.",
"\n\nSee also\n Moon Automobile Company\n Buda Engine Company\n\nReferences\n\n Black River Historical Society, Lorain, Ohio\n \"Pennsylvania Prizes,\" Hemmings Motor News, January 1, 2010; Jim Donnelly, author\n www.trombinoscar.com (website translation)\n Carroll Six sales literature, Detroit Free Library archives, Detroit, Michigan\n Newspaper articles from the Lorain Herald (Journal), Lorain Public Library, Lorain, Ohio\n\nExternal links\n Swigart Auto Museum\n Rochester Engine Company\n Fisk Tire Company\n http://www.trombinoscar.com/usaohio/carroll2001.html\n\nCategory:Lorain, Ohio\nCategory:Cars introduced in 1920\nCategory:Motor vehicle manufacturers based in Ohio"
] |
{
"pile_set_name": "Wikipedia (en)"
}
|
[
0.015267175572519083,
0,
0.011428571428571429,
0.013888888888888888,
0.005235602094240838,
0,
0,
0,
0.022222222222222223,
0,
0,
0.0136986301369863,
0,
0,
0,
0,
0.011904761904761904,
0.009174311926605505,
0,
0,
0,
0,
0,
0.01524390243902439
] | 0.004919
| 5
|
[
"Q:\n\nprotected field is not accesible from derived class in C#\n\nI tried to access a protected string from derived class, but its not accessible\npublic class ParentClass\n {\n public string UserName {\n get { return \"User Name is accessible to any class under same namespace Skin_File\"; }\n set { }\n }\n private string AccountNumber {\n get { return \"Not accessible from child class\"; }\n set { }\n }\n internal string UserAge {\n get { return \"User Age is accesible to child class\"; }\n set { }\n }\n protected string PhoneNumber {\n get { return \"Accessible only to ParentClass\"; }\n set { }\n }\n }\n protected class DerivedClass : ParentClass\n {\n string DerivedUserName = new ParentClass().UserName;\n string DerivedAccountNumber = new ParentClass().AccountNumber; // Not accessible since that was private\n string DerivedUserAge = new ParentClass().UserAge;\n protected string DerivedPhoneNumber = new ParentClass().PhoneNumber; // derived class but not accessible\n }\n\nHere is the fiddle for people who need it.",
"\n\nA:\n\nThis:\nstring DerivedPhoneNumber = new ParentClass().PhoneNumber;\n\nCreates an instance of ParentClass from the and will only have access to public members. ",
"As you're inherting ParentClass, you inherit its protected members as well.",
"\nIf you want to initialize the value, you need to do so inside your class constructor:\nprotected DerivedClass()\n{\n DerivedPhoneNumber = PhoneNumber;\n}\n\nAlthough, I don't see the point in declaring another field to store the same number. ",
"Access it directly.",
"\n\nA:\n\nYou create an instance of ParentClass. ",
"You can't see the protected members.",
"\nYou have access to it's protected members from the DerivedClass.",
"\nYou have to just invoke \nprotected string DerivedPhoneNumber = PhoneNumber;\n\nTry the following\ninternal class DerivedClass : ParentClass\n{\n string DerivedUserName = new ParentClass().UserName;\n string DerivedUserAge = new ParentClass().UserAge;\n protected string DerivedPhoneNumber;// = PhoneNumber; // derived class but not accessible\n\n public DerivedClass() {\n DerivedPhoneNumber = PhoneNumber;\n }\n}\n\n"
] |
{
"pile_set_name": "StackExchange"
}
|
[
0.00338409475465313,
0.006211180124223602,
0.013333333333333334,
0.008333333333333333,
0,
0.022222222222222223,
0,
0.015384615384615385,
0.00702576112412178
] | 0.008433
| 5
|
[
"The Way of Baseball by Shawn Green Finding Stillness at 95 mph\n\nShawn Green’s career statistics can be found on the backs of baseball cards in shoe boxes across America: 328 home runs, 1,071 RBIs, .282 career batting average, All-Star, Gold Glove, Silver Slugger. . . . ",
"But numbers tell only part of the story.",
"\n\nHis path to success was as grounded in philosophical study as in ballpark wisdom. ",
"Striving to find stillness within the rip-roaring scene of Major League Baseball—from screaming fans to national scandals— Green learned to approach the sport with a clear mind. ",
"In the tradition of Phil Jackson’s Sacred Hoops,\n\nGreen shares the secrets to remaining focused both on and off the field, shedding light on a signature approach to living by using his remarkable baseball experiences to exemplify how one can find full awareness, presence, and, ultimately, fulfillment in any endeavor. ",
"Following his development from inconsistent rookie to established All-Star to aging veteran,\n\nThe Way of Baseball illustrates the spiritual practices that enabled him to “bring stillness into the flow of life.” ",
"Requiring mastery of perspective and continual management of ego, the game of baseball afforded Green the opportunity to explore his potential as more than just a ballplayer. ",
"A treasure of practical wisdom and an intimate look at what it really means to “let go,” The Way of Baseball illuminates the creative possibilities within us all.",
"\n\nShawn Green’s career in Major League Baseball spanned fifteen years with four teams. ",
"He finished in the top ten of league MVP voting three times. ",
"Visit him at ShawnGreen.com.",
"Gordon McAlpine is the author of three acclaimed novels: Joy in Mudville, The Persistence of Memory, and Mystery Box.",
"\n\nUnrated Critic Reviews for The Way of Baseball\n\nKirkus Reviews\n\nBy developing a solitary routine that involved taking hundreds of swings off a tee, Green discovered a way to find inner stillness, to free his mind of distraction and focus on nothing but the act of hitting.",
"\n\nNew York Journal of Books\n\nThe reader comes away understanding the mindset it takes to understand how and why Ted Williams once described hitting a baseball by saying: “The hardest thing to do in baseball is to hit a round baseball with a round bat.” ",
"Shawn Green takes us through the mental process with the singular clarity...\n\nBaseball Reflections\n\nHowever, in his new book, former MLB All Star Shawn Green attempts to explain to readers the how they can find meaning in all parts of life, whether they are flipping burgers or stepping in the batter’s box against Randy Johnson."
] |
{
"pile_set_name": "Pile-CC"
}
|
[
0.014814814814814815,
0,
0,
0.0056179775280898875,
0.003134796238244514,
0.004739336492890996,
0.005714285714285714,
0.006172839506172839,
0.011494252873563218,
0.01639344262295082,
0.03571428571428571,
0.02564102564102564,
0.010948905109489052,
0.007905138339920948,
0.0121580547112462
] | 0.010697
| 5
|
[
"[The physician's role in assessing the fitness of elderly patients to drive].",
"\nWith the aging of the population, physicians are increasingly faced with questions about patients' fitness to drive. ",
"When an older patient's driving competency is questioned, a comprehensive, step-by-step assessment is recommended. ",
"A discussion of the various considerations that are important in assessing and counselling drivers and their families regarding a patient's ability to drive safely is presented. ",
"The medico-legal aspects of the issue are also addressed."
] |
{
"pile_set_name": "PubMed Abstracts"
}
|
[
0,
0,
0,
0,
0
] | 0
| 5
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.