Dataset Viewer
Auto-converted to Parquet
text
stringlengths
25
68.8k
quality
float64
1
2.58
source
stringclasses
5 values
Longest subarray having average greater than or equal to x Given an array of integers and an integer x. Find length of maximum size subarray having average of integers greater than or equal to x. Examples: Input : arr[] = {-2, 1, 6, -3}, x = 3 Output : 2 Longest subarray is {1, 6} having average 3.5 greater than x = 3. Input : arr[] = {2, -3, 3, 2, 1}, x = 2 Output : 3 Longest subarray is {3, 2, 1} having average 2 equal to x = 2. A simple solution is to one by one consider each subarray and find its average. If average is greater than or equal to x, then compare length of subarray with maximum length found so far. Time complexity of this solution is O(n2). An efficient solution is to use binary search and prefix sum. Let the required Longest subarray be arr[i..j] and its length is l = j-i+1. Thus, mathematically it can be written as: (Σ (arr[i..j]) / l ) ≥ x ==> (Σ (arr[i..j]) / l) – x ≥ 0 ==> (Σ (arr[i..j]) – x*l) / l ≥ 0 …(1) The equation (1) is equivalent to subtracting x from each element of subarray and then taking average of resultant subarray. So the resultant subarray can be obtained by subtracting x from each element of array. Let the updated subarray is arr1. Equation (1) can be further simplified as: Σ (arr1[i..j]) / l ≥ 0 ==> Σ (arr1[i..j]) ≥ 0 …(2) Equation (2) is simply Longest subarray having sum greater than or equal to zero. The Longest subarray having sum greater than or equal to zero can be found by method discussed in following article: Longest subarray having sum greater than k. The step wise algo is: 1. Subtract x from each element of array. 2. Find Longest subarray having sum greater than or equal to zero in updated array using prefix sum and binary search. Below is the implementation of above approach: filter_none edit close play_arrow link brightness_4 code // CPP program to find Longest subarray // having average greater than or equal // to x. #include <bits/stdc++.h> using namespace std; // Comparison function used to sort preSum vector. bool compare(const pair<int, int>& a, const pair<int, int>& b) { if (a.first == b.first) return a.second < b.second; return a.first < b.first; } // Function to find index in preSum vector upto which // all prefix sum values are less than or equal to val. int findInd(vector<pair<int, int> >& preSum, int n, int val) { // Starting and ending index of search space. int l = 0; int h = n - 1; int mid; // To store required index value. int ans = -1; // If middle value is less than or equal to // val then index can lie in mid+1..n // else it lies in 0..mid-1. while (l <= h) { mid = (l + h) / 2; if (preSum[mid].first <= val) { ans = mid; l = mid + 1; } else h = mid - 1; } return ans; } // Function to find Longest subarray having average // greater than or equal to x. int LongestSub(int arr[], int n, int x) { int i; // Update array by subtracting x from // each element. for (i = 0; i < n; i++) arr[i] -= x; // Length of Longest subarray. int maxlen = 0; // Vector to store pair of prefix sum // and corresponding ending index value. vector<pair<int, int> > preSum; // To store current value of prefix sum. int sum = 0; // To store minimum index value in range // 0..i of preSum vector. int minInd[n]; // Insert values in preSum vector. for (i = 0; i < n; i++) { sum = sum + arr[i]; preSum.push_back({ sum, i }); } sort(preSum.begin(), preSum.end(), compare); // Update minInd array. minInd[0] = preSum[0].second; for (i = 1; i < n; i++) { minInd[i] = min(minInd[i - 1], preSum[i].second); } sum = 0; for (i = 0; i < n; i++) { sum = sum + arr[i]; // If sum is greater than or equal to 0, // then answer is i+1. if (sum >= 0) maxlen = i + 1; // If sum is less than 0, then find if // there is a prefix array having sum // that needs to be added to current sum to // make its value greater than or equal to 0. // If yes, then compare length of updated // subarray with maximum length found so far. else { int ind = findInd(preSum, n, sum); if (ind != -1 && minInd[ind] < i) maxlen = max(maxlen, i - minInd[ind]); } } return maxlen; } // Driver code. int main() { int arr[] = { -2, 1, 6, -3 }; int n = sizeof(arr) / sizeof(arr[0]); int x = 3; cout << LongestSub(arr, n, x); return 0; } chevron_right Output: 2 Time Complexity: O(nlogn) Auxiliary Space: O(n) My Personal Notes arrow_drop_up A Programmer and A Machine learning Enthusiast If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to _EMAIL_. See your article appearing on the GeeksforGeeks main page and help other Geeks. Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below. Improved By : DivyaPurwar1
2.540664
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
A precursor of the modern day helicopter, the Aerial Screw designed by Leonardo da Vinci was designed to compress air in order to obtain flight. Now you can build this model straight from da Vinci's musings and marvel at how ahead of his time he truly was. Snap together assembly, no glue required. Recommended ages 8 and up. Made of plastic, the assembled model measures approx. 5" H and 7" W. Leonardo da Vinci first sketched the predecessor to the modern helicopter in the late 15th century. Dubbed the "aerial screw," this simple machine was designed to compress air to obtain flight through its unique shape. When originally designed, da Vinci's helicopter measured more than 15 feet in diameter and was made from reed, linen and wire. The four men depicted on this model represent the original four men in the sketches who stood on a central platform, turning cranks to rotate the shaft. However, due to weight constraints, this model would never have been able to take flight. A true Renaissance man, da Vinci was everything from a sculptor to a mathematician to an anatomist. He is credited with designing many original prototypes of modern inventions. WARNING: Choking Hazard - Small parts. Not for children under 3 years.
1.389574
HuggingFaceFW/fineweb-edu
, the right-wing watchdog group that has taken up the cause of forcing everyone in the Air Force to swear an oath to God -- regardless of their clear constitutional right not to -- claims that the proponents of forced religious oaths in the military have history on their side, saying: While this oath has undergone modifications over the centuries, the phrase 'So help me God' dates all the way back to 1776. So there can be no question regarding whether or not our Founding Fathers believed there was any conflict among the reference to 'God' and our founding principles and the Constitution. No question? Really? Then how come the military oath written by the very first Congress in 1789 left off the "So help me God" line? That's right, the very first Congress, which included a good number of the founders who actually framed the Constitution, did not make "So help me God" part of the military oath! These words were not part of any military oath until 1862, when the oath for officers needed to be changed because of the Civil War. And it wasn't until a full century after that that the words were added to the enlisted oath. Yes, it is true that one of the oaths used during the Revolutionary War, the oath taken by officers, did include the words. At that time, military officers were required to take the same oath taken by all officers of the government, military or civilian. This oath, renouncing all allegiance to King George and acknowledging the independence of the United States, did end with "So help me God." The first oath written specifically for the military, however, the oath first written in 1775 and revised in 1776 and taken by all enlisted soldiers, did not include the words. In September 1789, the first military oath under the new Constitution was approved. This oath, which was the same for both officers and enlisted, was part of "An Act to recognize and adapt to the Constitution of the United States the establishment of the Troops raised under the Resolves of the United States in Congress Assembled," and did not include the words "So help me God." Here is the original oath written by the Congress of 1789. This oath was actually two oaths, both of which were required for both officers and enlisted: It wasn't until long after the days of the founders -- over seven decades after these original oaths were written -- that "So help me God" was added to any military oath. The change came in 1862, when the oath for military officers was rewritten to include a statement that the officer had never borne arms against the United States or aided the Confederacy. This new Civil War era oath was the first military oath to end with the words "So help me God." The oath for enlisted members of the military, however, was not changed at this time. That oath remained "godless" for another century. The enlisted oath was not changed until 1950. The reason for the change at that time was the establishment of the Uniform Code of Military Justice (UCMJ). The purpose of the UCMJ, passed by Congress in May 1950, was to make the justice system in the military "uniform" across all of the branches of the military. Upon passage of the UCMJ, the line in the enlisted oath saying that a service member would obey orders "according to the articles of war" had to be changed to obeying orders "according to regulations and the Uniform Code of Military Justice." But "So help me God" was still not added to the oath when this change was made. That wouldn't happen until 1962, when Congress passed an act to make the enlisted oath more consistent with the officer oath, which, of course, did include the "so help me God" line. So, why don't we just get back to the intent of the founders, which is what groups like Judicial Watch are always claiming they want to do? The founders who wrote the first military oath under the Constitution in 1789 did not include the words "So help me God," so their intent was obviously that these words not be part of the oath. Judicial Watch's claim of having history on their side does not hold water. Maybe that will help the Air Force answer the questions that they are "not prepared at this moment to definitively answer." comments powered by Disqus
1.75605
Zyphra/Zyda-2
JournalArticleobiedkov2009buildingBuilding access control models with attribute exploration2009ObiedkovSergeiKourieG.DerrickEloffJ.H.P.2-728 ISSN: 0167-4048 DOI: 10.1016/j.cose.2008.07.011Computers and Security1–2http://www.sciencedirect.com/science/article/pii/S0167404808000497The use of lattice-based access control models has been somewhat restricted by their complexity. We argue that attribute exploration from formal concept analysis can help create lattice models of manageable size, while making it possible for the system designer to better understand dependencies between different security categories in the domain and, thus, providing certain guarantees for the relevance of the constructed model to a particular application. In this paper, we introduce the method through an example.access, analysis, attribute, concept, control, exploration, fca, formal, security
1.029438
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
By Justin Moyer The Washington Post — Defense Secretary Leon Panetta signed an order Thursday allowing women the same opportunities as men to serve in combat, including formerly off-limits assignments on attack submarines and in the Navy SEALs. Just two weeks before the announcement, researchers from San Diego's Naval Health Research Center published a study suggesting that some recent mothers deployed on the battlefield may be more prone to depression after seeing action. "Women who deploy and report combat-associated exposures after childbirth are significantly more likely to screen positive for maternal depression than are women who did not deploy after childbirth," concluded the study, titled "Is Military Deployment a Risk Factor for Maternal Depression?" and appearing in the Journal of Women's Health. "It is also possible," the report noted, "that giving birth and leaving a young child, in addition to the experience of combat, contribute to postdeployment depression." The study included eight co-authors, five of them associated with the Naval Health Research Center, a research and development laboratory within the Department of Defense. It was based on surveys of more than 1,600 women who "gave birth during active duty service." Not all branches of the armed forces showed the same results. "Participants who served in the Army had an increased risk of maternal depression; Army service members tend to be deployed longer and more frequently than personnel serving in the Navy and Air Force," the study found. Of course, you don't have to be a mom to experience depression on the front line. The report points out that "the increased rate of depression is primarily attributed to experiencing combat while deployed," not just to whether a solider is also a parent.
1.453993
HuggingFaceFW/fineweb-edu
A WiFi is an electronic device that allows for the transfer of information from one place to another as a patient portal aegislabs. It is used in an office environment or to provide a "hotspot" to several devices. It also provides access to social networking sites and real-time streaming. WiFi is a device-to-device connectivity Wi-Fi is device-to-device connectivity that allows users to connect their devices to the internet. The main requirement for a Wi-Fi-enabled device is the ability to receive and transmit a wireless signal. Any wireless capable device in a specific range can pick up the WiFi signal. The range of a Wi-Fi network depends on the frequency band, radio power output, antenna gain, and propagation characteristics. Antennas are important at both ends of the connection. A more focused signal may be able to reach longer distances, whereas a more diffuse signal is more likely to reach shorter distances. A Wi-Fi node is a low-power device that transmits and receives radio signals. Depending on the local rules and regulations, the maximum power that a device can transmit is limited. The type of frequency used and the modulation technique are also factors. It allows for Bluetooth, social media, real-time streaming, and access to the limitless information WiFi has taken over as the de facto network of choice for smart devices ranging from smartphones to wearables to home appliances. With this comes the need for a myriad of authentication techniques for devices to connect. In addition, the Internet of Things (IoT) has ushered in a whole new world of connected devices. The resulting demand has resulted in the proliferation of new and exciting technologies, such as Bluetooth, wireless displays, and Wi-Fi. However, in this age of hyper-connectivity, users have become savvier in the security department, leaving lesser technologies to take a back seat. Unlike older connectivity technologies, wireless connections are capable of transmitting a plethora of data ranging from simple pictures to a fully interactive 3D virtual reality experience. Moreover, the advent of smart home automation has ushered in the need for a unified interface to control and interact with these disparate smart devices. Also check: Best key role of event management in any event It is a mobile computing device Mobile computing is a technology that allows for the transmission of information, such as photos, videos, and audio, via wireless devices. Unlike personal computers, mobile devices can be used in a variety of environments, from office settings to homes. In addition to the aforementioned functions, a mobile device can also be used for location-based services. Likewise, a smartphone can be used for making long-distance calls using cellular networking technology. A mobile computing device is any device that is equipped with a mobile component, such as a mobile processor, mobile broadband network, or a mobile operating system. It is possible to buy a mobile PC, or "mobile PC," that is based on a desktop computer's hardware. It can be a laptop or tablet, and it can be used to do pretty much anything a desktop PC can do. It requires a modem and a wireless gateway If you want to connect to the Internet, you're going to need a modem and a wireless gateway. The device may be a standalone or a router, and the choice depends on the type of internet you are using. A modem is a small, black box that sits in your home. It's designed to receive and process data from your ISP. It's usually a high-tech device with a couple of ethernet ports and an external antenna. A wireless router is a type of modem that broadcasts your Internet service as a home Wi-Fi network. A modem and a wireless gateway are two separate devices that work together to give you a secure, reliable, and speedy connection. However, they are not interchangeable. Having a modem and a router is a savvy idea, especially if you have multiple devices that you want to use with your Internet connection. It is aimed at office areas or to provide a "hotspot" A hotspot is a mobile device, often a smartphone, that provides Internet access to other devices. This can be done through tethering or simply by creating a Wi-Fi network from your smartphone. You can also buy a dedicated mobile hotspot to provide always-on broadband Internet speeds. Public hotspots are typically located in libraries, coffee shops, airports, hotels, and department stores just like wmlink 2step. The provider of the hotspot may have legal obligations related to privacy and liability. These concerns may relate to the potential for exposure to objectionable content, as well as child safety and protection from illegal behavior. Private hotspots, on the other hand, allow you to access the Internet on your device, without a cellular connection. This is a convenient solution for collaborating on a presentation in a conference room or working on a project in a van.
2.121991
m-a-p/FineFineWeb
What are Predictive Analytics? Predictive analytics refers to the analysis of big data to make predictions and determine the likelihood of future outcomes, trends or events. In business, it can be used to model various scenarios for how customers react to new product offerings or promotions and how the supply chain might be affected by extreme weather patterns or demand spikes. Predictive analytics may involve various statistical techniques, such as modeling, machine learning, and data mining. The power of predictive analytics stems from a wide range of methods and technologies—big data, data mining, statistical modeling, machine learning, assorted mathematical processes—that can be used in conjunction with parameters to sort through massive volumes of data, both current and historical, to pinpoint patterns and predict occurrences and situations that will likely occur at a specified time. This is especially useful for helping companies find and take advantage of patterns within data, whether highlighting risks and opportunities, behavior relationships, or supply chain management. Reliability and accuracy sets modern predictive analytics apart from past tools used to forecast sales, inventory, scheduling, occupancy, revenue, and a number of other critical business areas. Organizations in virtually any market can maximize a marketing campaign using predictive analytics to encourage customer purchases and feedback, and retain the most valuable customers through carefully targeted offers and promotions. Use Cases, by Industry Numerous industries are employing predictive analytics to find ways to operate more efficiently—saving money—and tap into new ways to increase revenue. Retailers can fine tune the customer experience, both online and in store. Airlines, hotels, and restaurants can build pricing around customer travel and dining habits. And predictive analytics brings a previously unknown accuracy to managing inventory and coordinating logistics. Predictive analytics is a popular crimefighting tool because it can find and stop fraud, cyberattacks, and other crimes by tracking behaviors. When unusual activity is detected an organization can take action before bad actors strike. Healthcare providers use predictive analytics to determine which patients are most at risk, what those risks are, and the best course of care. Companies providing healthcare coverage are able, thanks to these types of analytics, to more readily identify fraudulent claims as well as track patient adherence to prescribed care. The Difference Between Predictive and Prescriptive Prescriptive analytics functions at a slightly higher level than predictive analytics, but is still an extension of predictive analytics. While predictive analytics is used to predict what will happen in the future, prescriptive analytics is used to recommend or prescribe specific actions when certain information states are reached, or conditions are met. It uses algorithms, mathematical techniques and/or business rules to choose among several different actions that are aligned to an objective (such as improving business performance) and that recognize various requirements or constraints.
1.856408
openbmb/Ultra-FineWeb
Breast Cancer: Introduction What is cancer? Cancer starts when cells in the body change (mutate) and grow out of control. Your body is made up of tiny building blocks called cells. Normal cells grow when your body needs them, and die when your body doesn't need them any longer. Cancer is made up of abnormal cells that grow even though your body doesn't need them. In most types of cancer, the abnormal cells grow to form a lump or mass called a tumor. Understanding the breast The breast is made up of lobules and ducts. The lobules are the glands that can make milk. The ducts are thin tubes that carry the milk from the lobules to the nipple. The breast is also made of fat, connective tissue, lymph nodes, and blood vessels. What is breast cancer? Breast cancer is cancer that starts in cells in the breast. The ducts and the lobules are the 2 parts of the breast where cancer is most likely to start. Breast cancer is one of the most common types of cancer in women in the U.S. Healthcare providers don't yet know exactly what causes it. Once breast cancer forms, cancer cells can spread to other parts of the body (metastasize), making it life-threatening. The good news is that breast cancer is often found early, when it's small and before it has spread. There are many types of breast cancer. These are the most common types: Ductal carcinoma. This is the most common type. It starts in the lining of the milk ducts. When breast cancer has not spread outside of the ducts, it's called ductal carcinoma in situ (DCIS) or intraductal carcinoma. This is the most common type of noninvasive breast cancer. Invasive ductal carcinoma is breast cancer that has spread beyond the walls of the breast ducts. It's the most common type of invasive breast cancer. Invasive lobular carcinoma. This type starts in the milk-producing glands (lobules) and spreads outside the lobules. Here are a few less common types that you may hear about: Paget disease. This is a very rare form of breast cancer that starts in the glands in the skin of the nipple. It grows slowly and occurs in only 1 nipple. Most people with Paget disease also have tumors in the same breast. This type causes symptoms that are like a skin infection, such as inflammation, redness, oozing, crusting, itching, and burning. Inflammatory breast cancer. This is a rare form of invasive breast cancer. Often there is no lump or tumor. Instead, this cancer makes the skin of the breast look red and feel warm. The breast skin also looks thick and pitted, like an orange peel. It tends to be found in younger women and grows and spreads quickly. Triple negative breast cancer. This is a type of breast cancer that doesn't have estrogen receptors and progesterone receptors. It also doesn't have an excess of the HER2 protein on the cancer cell surfaces. This type of breast cancer is most often found in younger women and in African-American women. It tends to grow and spread faster than most other types of breast cancer. Because these cancer cells don't have hormone receptors or excess HER2, medicines that target these changes don't work. The most common kind is triple-negative invasive ductal carcinoma. How breast cancer spreads Breast cancer can spread by growing into nearby tissues in the breast. It can also spread when the cancer cells get into and travel through the blood or lymph systems. When this happens, cancer cells may be found in nearby lymph nodes, such as in the armpit. These lymph nodes are called axillary lymph nodes. They are often checked for cancer as part of the diagnosis process. If the cancer reaches these nodes, it may have spread to other parts of the body. Breast cancer that has spread from the breast to other organs of the body is called metastatic breast cancer. When breast cancer spreads, it most often goes to the brain, bones, liver, or lungs. A key factor in making a breast cancer diagnosis is finding out if it has spread: Noninvasive (in situ) cancer is only in the ducts and hasn't spread to nearby areas. If not treated, it can grow into a more serious, invasive type of cancer over time. If you are diagnosed with noninvasive ductal carcinoma, your chances of surviving are very high if you don't wait to treat it. Invasive (infiltrating) cancer has the potential to spread to nearby areas. This type is much more serious than noninvasive cancer. When it starts to spread, it often invades nearby lymph nodes first. It can then spread to other parts of your body through your bloodstream and lymphatic system. Treatment for invasive cancer is often a more difficult, long-term process. Talking with your healthcare provider If you have questions about breast cancer, talk with your healthcare provider. Your healthcare provider can help you understand more about this cancer. Online Medical Reviewer: Kimberly Stump-Sutliff RN MSN AOCNS Online Medical Reviewer: Louise Cunningham RN BSN Online Medical Reviewer: Preeti Sudheendra MD Date Last Reviewed: © 2000-2022 The StayWell Company, LLC. All rights reserved. This information is not intended as a substitute for professional medical care. Always follow your healthcare professional's instructions.
2.489507
openbmb/Ultra-FineWeb
's instructions to update or reprogram the modules using the appropriate tools and software. - This process should help resolve any software-related issues that could trigger code p1607. Remember to consult a professional if you are unsure about any of these procedures or if the issue persists after attempting the suggested fixes. Proactive Measures To Prevent Code P1607 Regular vehicle maintenance to minimize the risk of error codes: - Schedule routine maintenance checks and inspections to identify potential issues and address them promptly. - Regularly check and replace worn-out or damaged components such as spark plugs, sensors, and wires. - Keep track of recommended service intervals for oil changes, filter replacements, and fluid flushes. - Ensure proper tire inflation and alignment to optimize vehicle performance and reduce strain on the electrical system. - Follow the manufacturer's guidelines for vehicle maintenance to maintain optimal functionality and reduce the likelihood of error codes. Understanding and addressing potential causes of code p1607 before they escalate: - Familiarize yourself with common causes of code p1607, such as faulty connectors, poor electrical connections, or sensor issues. - Regularly scan your vehicle for any error codes and take immediate action if code p1607 appears, preventing further complications. - Consult with a qualified mechanic or technician to troubleshoot the specific cause of code p1607 and address any underlying issues. - Stay updated on any recalls or service bulletins related to your vehicle's make and model, as they may provide insight into potential causes and solutions for error codes. Implementing preventive measures like cleaning connectors and electrical contacts: - Periodically inspect and clean electrical connectors and contacts, ensuring they are free from dirt, corrosion, or debris. - Use a specialized electrical contact cleaner and a soft brush to gently remove any buildup or residue from connectors. - Ensure connectors are securely fastened to prevent loose connections, which can result in error codes such as p1607. - Consider applying dielectric grease to protect electrical connections from moisture and corrosion. - Regularly test the electrical system using a multimeter to verify the integrity of connectors and contacts. By taking proactive measures, you can significantly reduce the occurrence of code p1607 and ensure that your vehicle operates smoothly. Regular maintenance, understanding potential causes, and implementing preventive measures will go a long way in preventing this error code and ensuring a trouble-free driving experience. Stay diligent in caring for your vehicle, and you'll minimize the risk of encountering code p1607 and other similar issues. Seeking Professional Help And Resources When diy troubleshooting is not enough, it's important to know when to seek professional help for fixing code p1607. Here are some key points to keep in mind: - Finding a reliable car mechanic: When faced with a complex issue like code p1607, it's crucial to find a trustworthy and experienced car mechanic who specializes in your vehicle make and model. Consider the following factors when looking for a reliable mechanic: - Look for certified technicians who have expertise in diagnosing and repairing the specific issue. - Ask for recommendations from friends, family, or online communities. - Read customer reviews and ratings to gauge the quality of service provided. - Verify that the mechanic has the necessary diagnostic tools and equipment for accurate troubleshooting. - Taking advantage of online resources, forums, and communities: The internet is a valuable resource for additional guidance when dealing with code p1607. Consider the following online platforms: - Online forums and communities dedicated to car enthusiasts and diy troubleshooting. - Manufacturer-specific websites or forums where experts share their knowledge and provide solutions. - Online tutorials and videos that walk you through troubleshooting steps, helping you gain a better understanding of the issue. - Understanding the importance of regular car servicing: Prevention is key when it comes to recurring issues like code p1607. Regular car servicing can help identify potential problems before they escalate. Here's why it's important: - Routine maintenance can help catch minor issues before they turn into major problems. - Timely servicing ensures that all components are functioning optimally, reducing the risk of unexpected faults. - Regular oil changes, filter replacements, and fluid checks can prevent issues that may trigger code p1607. Remember, seeking professional help and utilizing online resources can provide valuable insights and guidance when troubleshooting code p1607. It's always better to have an expert opinion to ensure a proper fix and avoid further complications. Frequently Asked Questions For How To Fix Code P1607 What Is Code P1607 And Its Meaning? Code p1607 refers to a malfunction in the vehicle's engine control module (ecm). It indicates a discrepancy between the module's stored data and the actual operating conditions. What Causes Code P1607 To Appear? Code p1607 can be triggered by various factors, including a faulty ecm, wiring issues, or sensor malfunctions. Additionally, a power interruption or battery disconnect may also contribute to this error code. How Does Code P1607 Affect The Vehicle'S Performance? When code p1607 appears, it can result in decreased engine performance, increased fuel consumption, and an illuminated check engine light. Addressing this issue promptly is crucial to maintain optimal vehicle functioning. How Can Code P1607 Be Fixed? To fix code p1607, start by inspecting and repairing any underlying wiring or sensor issues. Resetting the ecm may also resolve the problem. If the issue persists, it's advisable to consult a professional mechanic for further diagnostics and potential ecm replacement. Can I Drive With Code P1607? While it may be possible to drive the vehicle with code p1607, it's advisable to address the issue promptly. Continued driving without addressing the underlying problem can potentially lead to further damage and costly repairs. To quickly address and fix code p1607, it is crucial to follow a systematic approach. By understanding its causes, such as faulty wiring or a malfunctioning sensor, you can effectively tackle the issue. Begin by inspecting the electrical connections and wiring, ensuring they are secure and free from any damage. If everything seems fine, proceed to check the sensor's functionality or consider replacing it if necessary. Additionally, it's essential to scan for any other trouble codes that may be indicating related issues. A comprehensive diagnosis will help troubleshoot the problem with accuracy and precision. Regular maintenance and keeping up-to-date with software updates can prevent these issues from occurring in the first place. Remember, staying proactive and taking prompt action can save time, effort, and prevent further complications. - How to Eliminate Hemi Tick: Expert Tips for a Squeaky Clean Engine - December 1, 2023 - How Long Do Firestone Tires Last: Unveiling the Ultimate Lifespan Secrets - December 1, 2023 - Ultimate Guide: Permanently Disable Viper Car Alarm with These Expert Techniques - December 1, 2023
1.772398
openbmb/Ultra-FineWeb
Handling multiple event types in a topic Question: How can you have multiple event types in a topic and maintain topic-name subject constraints? Edit this page Example use case: You have distinct but related event types and you want to produce them to the same topic, but you also want to maintain topic-name subject constraints. Why produce different events to the different same topic? One reason would be you have low-traffic topics and you'd like to consolodate them to reduce overhead for the brokers. Or you need to get the exact order of different events and by producing them to the same topic you are guaranteed correct ordering per-partition. To do multiple events with topic-name constraints you'll need to use schema references, which is a schema that contains a field representing an object which is reference to another another schema. In this tutorial you'll learn about using schema references with both Protobuf and Avro. For more information on multiple event topics you can read Put several event types in a Kafka Topic by Martin Kleppmann and Putting Several Event Types in the Same Topic – Revisited by Robert Yokota. Hands-on code example: Run it
1.703621
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Latest News & Updates Dr. Susan David is a Psychologist at Harvard Medical School and is a founder and co-director of the Institute of Coaching at McLean Hospital of Harvard Medical School. In her Ted Talk about emotional agility, which you can find here, she discusses the concept of emotional agility, how society has made a push towards positivity, and inadvertently, how this may have led to additional suffering. There is a push in our media, in our society, and in our homes to be positive; think positive, look on the bright side, or simply, smile! Dr. David posits that this push towards positivity often leads to denial of the truth and denial of our emotions. We can end up feeling bad about ourselves for experiencing negative emotions and negative thoughts because we're supposed to be happy and positive all of the time. The truth is, life isn't always happy and positive. Certainly there are times in our lives when we are happy and things are going well and we feel good, but there are also times when things do not go our way and we just feel bad. Dr. David suggests that instead of trying to be positive during these times, and pushing those negative thoughts away, we need to embrace them, to learn to deal with and cope with them rather than trying to run away from them. Dr. David's Ted Talk mirrors much of what is discussed in Acceptance and Commitment Therapy and, in particular, the idea that we must accept, rather than try to push away, negative thoughts and feelings. These things are a way of life and like a rollercoaster, sometimes we have to just wait it out. I like to use grief as an example in my practice with clients. Our society treats grief as something that is normal – we are expected to be sad or to cry when someone close to us passes away. We also know that people we love may pass away, and as much as we do not like that thought, we have no choice but to accept it. We treat grief with a lot of respect, in most cases, and allow it to come and go naturally. I believe that we need to learn to treat the rest of our emotions with the same type of respect that we treat grief. When we are feeling anxious or sad, rather than beating ourselves up for these feelings we should be accepting that this is how it is right now, and allowing those feelings to come and go. Often, the more we try to control these feelings, the worse off we become. Either we actually end up enhancing the feelings that we started with, or we add additional distress, such as shame or frustration when we do not succeed in getting rid of the feelings. I would like to challenge you to you try accepting your negative thoughts and feelings, and treating them with the same respect that you would grief. Listen to Dr. David's Ted Talk, and reflect back on your own experiences of trying to get rid of your negativity. Try something new, and see what happens. Source: Click With Valentine's Day fast-approaching, and the holiday seasoning winding down, I found myself reflecting on the important people in my life, and how we choose to celebrate these people. When we think of birthdays, anniversaries, Valentine's Day, Christmas, and other important holidays, what do we think of? For me, the first thing that pops into my mind is gifts. Chocolates and flowers for Valentine's Day and anniversaries, expensive presents, gift cards, and even money for other important occasions. But is this how we really want to celebrate the most important people in our lives? While gift-giving can be a great way to show a loved one that you've been thinking about them, spending quality time with loved ones is also extremely important. A study outlined by NPR in a December article suggested that people felt most loved during times of interaction rather than when receiving gifts. However, during busy holiday times, such as in December, people often feel additional stress at having to rush to spend time with people close to them. During these times of high stress, such as Christmas, we often lose sight of being present. We become consumed with worries about making it to every family gathering, getting the right gifts, and planning out every detail of our holidays that we may forget to stop and enjoy the moment. Christmas may be over for this year, but we can still practice being more present with our loved ones. Take some time to breathe and ground yourself before attending that birthday party or anniversary dinner – leave the stress from work and home where they belong, and practice being in the moment. Instead of focusing on gifts for your upcoming anniversary or birthday, why not begin a tradition that involves spending time with one another, or going on an adventure every year? Maybe you and you partner decide that every year on your anniversary you will try a new restaurant in a different city, or that every Christmas you will plan your annual trip together. Try shifting your focus from giving and receiving material items, to making new memories and living a fulfilled life. All in all, I think we sometimes lose sight of why we take time out of our busy lives to see the people who are important to us. We want them to feel loved and appreciated, and know that they are important to us. So maybe try something new – make some great memories that will last a lifetime with the people that are most important in your life. To Begin I'd like you to watch THIS VIDEO. What thoughts came up for you as you watched this video? Were you able to relate to what the individuals were saying? Did you understand why they answered the way they did? I'd like you to take a moment to reflect on a time when you made a mistake, and some of the things that you said to yourself. What sort of words did you use? How did those words affect you? Now think of the last time a loved one came to you and told you about a mistake. How did those words differ from the ones you told yourself? I'm willing to bet that there is a big difference in how you speak to yourself versus how you speak to others. Why Self Compassion? I'm sure you've heard the term self-compassion before. Maybe you wondered why it was important, or why people even bother talking about it. Maybe you thought you didn't need to be self-compassionate, or that it simply wasn't something that would impact your life. Kristin Neff (2012) suggests that self-compassion is more than looking on the bright side or attempting to avoid negative feelings. Self-compassionate people are able to recognize when they are suffering, but act kindly towards themselves. Neff (2012) further explains that studies have indicated that individuals with higher levels of self-compassion experience less anxiety and self-consciousness when asked about their weaknesses, display more wisdom and emotional intelligence, and often experience higher levels of social connectedness and overall life satisfaction. If we can learn to be kinder to ourselves, we can learn to let go of our mistakes and shortcomings, and move forward from them. This doesn't necessarily mean ignoring them, but rather not allowing them to hook us into a pattern of self-depreciation and dislike. Instead, we can accept our mistakes/shortfalls/situations for what they are, learn from them, and move forward. So how do I be Kinder to Myself? Being compassionate towards oneself is similar to the way that we express compassion for others. As in the video above, it is clear that many of us are better able to be compassionate towards our loved ones than we are to ourselves. Learning how to be self-compassionate will not happen overnight; it may take time, practice, and trial and error. Neff (2012) posits that there are three main components to having compassion for oneself: 1. Self-kindness 2. A sense of common humanity 3. Mindfulness In short, these three aspects of self-compassion involve being understanding towards ourselves and our downfalls; recognizing that we are not alone and that other people struggle as well; and practicing living in the moment and accepting some of our thoughts, feelings, and emotions. What self-compassion is not, is self-pity, self-indulgence, or self-esteem (Neff, 2012). To learn more about how you can be more self-compassionate, click here to read Kristin Neff's chapter on The Science of Self-Compassion. Source: Neff, K. D. (2012). The science of self-compassion. In C. Germer & R. Siegel (Eds.), Compassion and Wisdom in Psychotherapy (pp. 79-92). New York: Guilford Press. Anxiety is a funny thing – we all experience it, and many have suggested that it has its roots in evolution. Back in the hunting and gathering days, we had to be alert for any signs of predators lurking around, and our sense of anxiety would signal us to flee the area or prepare for a fight. Today, as a human race we still experience anxiety on a daily basis, even in the absence of dangerous predators. As humans, we have a tendency to want to protect ourselves from danger, but in some instances, that perception of danger can be a little bit off. Anxiety typically leads to avoidance – the hunter doesn't hunt north of the forest because he knows there's a large family of lions that lives there. Similarly, we often try to avoid situations that are dangerous to
1.041105
Zyphra/Zyda-2
Family: Scolopacidae, Sandpipers view all from this family Description ADULT In summer plumage, has beautifully patterned brown, black, and white feather markings on back and upper wings. Head, neck, and breast are streaked with brown, and underparts are mainly white, but with brown spots and barring on flanks. Bill is usually all-dark. In winter, looks more pale with gray-brown overall feathers on back, and upper wings marked with marginal white spots and scallops. Bill is pale at base. JUVENILE Similar to winter adult, but feathers on back have buffy marginal spots and breast has obvious dark streaking. Bill is paler at base. Dimensions Length: 14" (36 cm) Habitat Widespread and common breeding species in open, boggy, boreal forests. Long-distance migrant that winters from southern U.S. to South America. Usually found on coast (mudflats and lagoons) outside breeding season but, during migration, sometimes stages on lakes. Observation Tips Distant birds can sometimes be identified with reasonable certainty because of their frenetic feeding habits. Close views allow separation from Lesser Yellowlegs: concentrate on relative body sizes, and bill size and shape. Range Western Canada, California, Southeast, Northwest, Alaska, Rocky Mountains, Southwest, Florida, Plains, Eastern Canada, Great Lakes, New England, Mid-Atlantic, Texas Voice Utters a strident tiu-tiu-tiu in flight. Song is a yodeling twee-ooo. Discussion Robust, elegant wading bird. Extremely long, orange-yellow legs and long, relatively thick and slightly upturned bill make identification easy. However, confusion is possible with Lesser Yellowlegs, which is smaller and an altogether more dainty bird. Feeds primarily in shallow water, catching aquatic invertebrates and small fish, but equally at home on open mudflats. Often chases wildly, like a thing possessed, after prey. Seen from above in flight, all birds have mainly dark upperparts, with contrasting white rump and pale-barred tail. Typically rather wary and nervous. Sexes are similar.
1.56493
HuggingFaceFW/fineweb-edu
rating: +23+x Cover of SCP-CN-999 Item #: SCP-CN-999 Object Class: Euclid Spectial Containment Procedures: All SCP-CN-999 currently contained by the Foundation have been neutralized, its text contents are now archived in Site-CN-71's high secrecy document library. Any retrieved active SCP-CN-999 should be contained at Site-CN-71's high value containment region. It is now forbidden to conduct any testings on the item's properties; if new text content are discovered they should be documented and archived immediately. Description: SCP-CN-999 is an A4 double-sided print totaling 10 pages of texture same as normal white office paper. Its cover has the picture of a silhouette resembling that of a typical pigeon (Columba) spreading its wings, and the title Spreading Your Wings: Finding Your Advanced Career Path. SCP-CN-999's main content is the brief description of some anomaly-related groups across the world. Such description will contain a common logo of the group, and briefly describe the group's history and properties. What's worth mentioning is that the bottom of such description is a row labelled "Available positions" which described several positions that match the group's properties and what is suspected to be the number of positions available for that job. Except for the first page being a manual describing the usage of the item, every page of SCP-CN-999 has contained the descriptions of 5 anomalous groups of interest, totaling 45 groups of interest for the whole book. Every retrieved SCP-CN-999 was accompanied with an A4 size form document (referred to as SCP-CN-999-1), in a series of tests such document has shown excellent waterproof, fireproof and tenacity qualities. The form SCP-CN-999-1 requires to fill in a series of personal information, and the group of interest and position that the applicant is going to apply for. Example of a page of SCP-CN-999. Click to zoom in. The anomalous properties of SCP-CN-999 will show after the applicant has signed in SCP-CN-999-1's signature column. The handwriting filled in on the item will automatically disappear after signing, a time and a location will appear on a specific place on the item's back side in forms of English; the location mentioned will usually be the empty room of area between 6 to 8 square meters the closest to the item; the time mentioned will usually be 30 to 120 minutes after the form is signed. What is worth noting, the follow-up SCP-CN-999-1 anomalous effects can only be triggered when the applicants have filled in correct personal information on SCP-CN-999-1, and not a prisoner nor having a paid full-time position at any corporations or organizations. Otherwise after the handwriting has disappeared, the specific location at its back will only show the phrase "ERROR: Personal Information Does Not Match" or "ERROR: Has Stable Position" written in traditional Chinese, until an applicant satisfying the conditions have signed their name on SCP-CN-999-1. If the applicant can reach the specified location at the specified time, all living humanoids in the room except for the applicant will be moved outside the room via unknown means, and cannot interrupt the room in any room during the whole interview. A human of the same appearance with one of the group's high-ranking figure wearing the group's representative clothing will appear in the room and have a conversation with the applicant. According to records of surveillance equipment in the room, the two's conversation is highly representative of interviews of normal job application. Please refer to Addendum SCP-CN-999-A for the related surveillance equipment records. According to the outcome of the interview, one of the two situations below will occur: - If the applicant passes the interview, he will shake hands with the interviewer, generate a strong white light enough to blind for 3 seconds, and disappear along with the interviewer after the white light fades away. In about 30% of the experiments, Foundation personnel can find the applicant at the applied position in the respective groups of interest; but more often the applicant has gone missing thereafter. - If the applicant cannot pass the interview, the interviewer will express regret over the matter, forcibly move the applicant outside the room by unknown methods and then disappear. After this the applicant cannot trigger SCP-CN-999-1 again. Addendum SCP-CN-999-A: Video recording of an interview generated by SCP-CN-999-1 This addendum is a transcription of the fourth trigger test on SCP-CN-999-1 conducted by the Foundation, also the first successful test in triggering of SCP-CN-999-1.1 As other groups of interests are involved, the experiment subject was arranged to fill in and trigger SCP-CN-999-1 in the Hong Kong branch of front organization Standard Caring Project to prevent possible leak of confidential information. The message written on the back side of SCP-CN-999-1 asked the experiment subject to attend the interview 15 minutes later in an empty meeting room of the company. The following is the record of events that happened after the experiment subject entered the meeting room. Experiment subject: D-1851, originally named Liu Yi Long (劉宜隆), being framed in a case of espionage and sentenced to death for crime of treason, then enlisted as a Class D personnel by the Foundation through standard procedures. For the progression of the test, the subject's charge was revoked by the local government through political relationships and his monthly execution exempted, such that he became a clean free personnel. Applying organization: Unusual Incidents Unit Applying position: Junior detective [Start of log] Interviewee walks into the room, the video record appears frozen for less than a second. After turning back to normal, the personnel originally operating the filming equipment in the room disappears, a humanoid of appearance and voice same as UIU senior detective Carl Bellic (indicated as the interviewer below) wearing black suit appears in the center of the room behind a rectangular desk. Interviewer: (In Cantonese) Hello, Mr. Liu. I am a senior agent of the Operation Wing, also an assistant for the Human Resources Department for now, call me Carl. Please take a seat. Interviewee: (In English) Hello… (In Cantonese) Hello, Mr. Carl. Interviewee sit on the chair in front of the interviewer. Interviewer: Actually you don't need to be surprised, Mr. Liu. As a detective, mastering multiple mainstream languages are our basics. Now can you please give a brief self-introduction? Interviewee: I'm Liu Yi Long, graduated in Shanghai University with Bachelor of Civil Law. After graduation I worked as a legal adviser in Dai Ping Biscuit Factory just as what I wrote on the records of past experience, dealing with legal issues of the company…mainly about intellectual properties. Then…then…because of coincidences and framing, I was…put in the prison for a few months. Then the prison staffs introduced me to this job. I…although I was a graduate of laws, but I was at a military academy for a few years, and kept on training after leaving it, so I think I'm good enough for a detective's job in terms of fitness and gunnery technique. And I'm familiar with the Chinese Civil and Criminal Laws, so I can provide assistance when your department requires such knowledge. This is about all for my case. Interviewer: Hmm…alright, I'll ask you a few questions then. First of all, Mr. Liu you seem to have a prior? A crime of treason, then revoked, interesting. Are you alright talking about it? Interviewee: Ah…yes. When I was a legal adviser I was mainly dealing with issues about intellectual property. God knows which idiot who told me to handle the patent of a new product, the amnesia biscuit, but putting the whole formula and production process inside. What's more bullshit, my secretary was switched into another wearing a human face mask since I don't know when, and ran away real fast, leaving me being caught and a crime of treason forced onto me — god knows how the fuck me being a staff of a small company would commit treason. And only recently one from the jail came and told me I was proven to be innocent, and then introducing me to this job. An American government employee? Don't know how they'd thought of this. Interviewer: You seemed to be surprised by this. As you see, we are an official organization of United States of A Mary King, and if it weren't for a special occasion, you wouldn't even have the chance to get an interview. Joining us, it means that you would have to work for the United States of A Mary King, and if necessary you would have to be an enemy of your home country. So are you going for this junior detective job even so? Interviewee: A Mary King? Ha yes. I don't have any returns, would I? If I don't come for this job, I would probably be put back in jail and take a bullet I don't know when. For now, it's alright home country or not. Interviewer: Our organization is different than the other departments whatsoever, the threats we face are unimaginably strange, and you may end up in the stomach juice of a scary big lizard. Are you alright even so? Interviewee: Heh, it wouldn't be any stranger than what I saw in the biscuit factory. Interviewer: Then it's decided. Welcome to the Unusual Incidents Unit, you're hired. Interviewee: Eh…what? Is that all? No going back and wait for notification, nothing? Interviewer: This is all. The wage and date to start working
1.122263
Zyphra/Zyda-2
– WINDS – TYPHOONS – Like all gases, air constantly moves. Masses of air, warm or cool, wet or dry, move across land and sea and bring about weather changes. During this process, one air mass replaces another. When air is heated, it expands. Hot air is less dense than cold air. For this reason, it rises and leaves behind an area of low pressure. Unlike hot air, cold air has a large density. Instead of rising, it presses heavily on the earth's surface. Therefore, it produces an area of high pressure. Since gases always try to move from high to low pressure, winds are caused by the flow of cold air which tries to replace the rising hot air. Why is there such a difference in the temperature of the air at various places on earth? There are two major global air patterns on Earth. One is from the poles towards the equator and the other is from the equator towards the poles. On the earth's surface, the poles are always cold and the equator hot. Cold air comes down from the polar regions. Since the distance from the poles to the equator is so great, the cold air from the poles warms up on the way. Similarly, the hot equatorial air becomes cooler on its way to the poles and this is what causes the difference in temperature. These winds do not blow in the north-south direction, but they are diverted. The rotation of the earth is the cause of this change in direction. These two major global air patterns cover thousands of kilometres. Besides these air patterns, there are smaller cycles which cover hundreds of kilometres. These smaller air patterns form because of smaller changes in temperature. For example, the air above the ground is heated by the ground whereas the air above the sea is colder. As a result, the cool air moves from the sea to the land, forming a 'sea breeze'. During the night, the land is cooler than the sea (since water heats up and cools down more slowly) and the breeze blows from the land to the sea. This wind is called a 'land breeze'. Winds that blow very powerfully can develop into storms, which can turn into hurricanes. Actually, no one knows why some of the storms become hurricanes and others do not. A hurricane forms over tropical seas, it moves, and when it reaches the land or a colder part of the sea, it slowly diminishes, dies out. A hurricane can be 1000 kilometres in diameter. The centre of the hurricane is called the 'eye'. The speed of the wind in a hurricane can range from 150 kph. (kilometres per hour) to 300 kph. All hurricanes originate close to the equator. Hurricanes in the Pacific and Indian Oceans are known as 'typhoons'. Sometimes storms can also develop into tornadoes. These resemble hurricanes but form over land. Tornadoes can occur anywhere on Earth but are mostly observed over the central United States. A tornado, like a hurricane, is a strong wind spinning and turning around a core. Unlike a hurricane, it contains a partial vacuum. The wind speed of a tornado is about 300 kph., but sometimes it can reach 800 kph. Scientists do not know exactly how tornadoes form. It is thought that when warm moist air meets the cold air from the north, it causes clouds to form and storms to develop. This brings about an uprush of warm air, which is known as a tornado. When a tornado passes over a house, for example, the low pressure at the centre causes the air in the house to expand suddenly and, as a result, the building explodes. A. What do the following refer to? 1. 'it' (line 5): 2. These' (line 41): B. Mark the best choice. 1. Line 20, 'diverted' probably means . a) directed b)changed c) blown d) rotated 2. Hot air rises because it . a) leaves behind an area of low pressure b) is not as dense as cold air c) produces areas of high pressure d) has a large density 3. Winds form due to the . a) flow of cold air into a low pressure area b) fact that hot air presses on the earth's surface c) flow of hot air into a high pressure area d) fact that air is a gas
2.565768
m-a-p/FineFineWeb
How to create an oil and gas boom without fracking American oil and natural gas companies are ramping up their drilling in the Gulf of Mexico as they seek to exploit a vast natural gas field that's believed to hold as much as 7 trillion cubic feet of recoverable gas. But those efforts are stymied by a lack of permits. "If you drill a well and don't get a permit, you just can't drill," said Matt Smith, an energy analyst at the New York-based Wood Mackenzie. Smith said a recent study by the Energy Information Administration found that the total reserves in the North Sea have shrunk by roughly 30% since the early 1990s, leaving only 2.8 trillion cubic yards of recoverables for U.S. and U.N. regulators to tap. " It's a little bit of a red flag to me that the U-K., the United Kingdom, and other countries don't have these permits." Smith said a recent study by the Energy Information Administration found that the total reserves in the North Sea have shrunk by roughly 30% since the early 1990s, leaving only 2.8 trillion cubic yards of recoverables for U.S. and U.N. regulators to tap. But Smith also pointed to the fact that the vast oil and petroleum-rich areas of the U, K., and NE are subject to seismic monitoring restrictions, making it virtually impossible for drillers to drill within those areas. "There are a number of reasons why we don't want to drill in these areas," Smith said. "First, it's very difficult to get an order from the US. or U. K. or elsewhere to drill. Second, we have the same problem as we have in other parts of the world where the geology is different. And third, we don.sibly drill in areas that are very inaccessible. So the U., K., NE, and Ogasawara areas are just not a place for a lot of oil and fuel to be produced." While fracking is being used as a last resort in a number for shale oil and shale gas drilling, Smith said it is unlikely that any major oil and energy companies will move their operations there, or move production of oil to places that are more remote from other countries. "The U.k. doesn't have much of an oil-producing region," Smith told Fox News. "I'm not sure we would have seen oil and other commodities like natural gas in the UK, Canada, France, Australia, or Russia, which are all very different from the United State." While some shale oil companies may have trouble finding enough resources in the United Sates, Smith says they're still likely to make money because of the low cost of drilling, the higher profits, and the high price of gas. "They are very efficient, and they can do things that are expensive to the U." he said.
1.10897
m-a-p/FineFineWeb
Building South African smart cities With the major governmental push toward digital transformation to align SA with the developments of Industry 4.0, president Cyril Ramaphosa has recognised that with more technology adoption, we can grow our economy and make the lives of citizens better. With this in mind, the Public Sector ICT Forum's upcoming event will focus on "Building the smart cities of tomorrow", and take place on 10 April at the Protea Hotel, Fire and Ice, Pretoria Menlyn. Smart cities bring the promise of sustainability, efficiency and improved living standards for citizens, says Mark Walker, associate vice-president, Sub-Saharan Africa, at IDC Middle East, Africa and Turkey. "The main challenge for South African cities that aspire to become smart cities is the fact that in certain areas there are still some basic infrastructure shortcomings. Since there is a need for infrastructure developments, the solution could be building smart cities," he notes. Some South African cities have sporadic implementation of smart city technologies, such as smart traffic and security cameras. With these separate initiatives, cities would then have to integrate into systems to work together and build an extensive network to ensure they are truly smart. Another consideration is that these technologies come from western countries, so we need to ensure they cater to African needs. With complex systems and technology adoption come the need for a highly skilled workforce, which is another aspect of smart cities that should be considered. Walker points out there is a range of benefits that exist when moving toward smart cities, such as the economic impact, improved public service delivery, and greater access to services and commercial opportunities. Smart cities can also improve public safety and security. With improved infrastructure management, citizens' quality of life will be enhanced, as will government's visibility and transparency across service platforms, infrastructure systems and city departments, he concludes. The Public Sector ICT Forum's "Building the smart cities of tomorrow" event will examine how the technology implementation of smart cities can meet the needs of the digital citizen and how government can harness smart city technologies to benefit residents.
1.470359
m-a-p/FineFineWeb
Health and Social Behaviour: Dietary Reference Values (DRVs), current dietary goals, recommendations, guidelines and the evidence for them Three main types of dietary recommendations may be produced by public health agencies: dietary allowances (DRVs), dietary goals, and dietary guidelines. Dietary allowances are quantitative guidelines for different population subgroups for the essential macroand micro-nutrients to prevent nutritional deficiencies. Dietary goals are quantitative national targets for selected macronutrients and micronutrients aimed at preventing long-term chronic disease e.g. coronary heart disease, stroke and cancer. They are usually aimed at the national population level rather than the individual level. Dietary guidelines are broad targets aimed at the individual to promote nutritional well-being. They were initially introduced for macronutrients but are now being used for micronutrients. Dietary guidelines can be expressed as quantitative targets (e.g. five servings of fruit and vegetables/day) or as qualitative guidelines (e.g. eat more fruit and vegetables). - The human body needs a variety of nutrients and the amount of each nutrient needed is called the nutrient requirement. - In the UK, estimated requirements for various groups within the UK population were examined and published by the Committee on Medical Aspects of Food and Nutrition Policy (COMA) in the 1991 report Dietary Reference Values for Food Energy and Nutrients for the United Kingdom. COMA has now been replaced by the Scientific Advisory Committee on Nutrition (SACN) who are likely to review the UK nutritional requirements in the near future. - DRVs are a series of estimates of the amount of energy and nutrients needed by different groups of healthy people in the UK population; they are not recommendations or goals for individuals. - DRVs have been set for following groups: Boys and girls aged 0-3 months; 4-6 months; 7-9 months; 10-12 months; 1-3 years; 4-6 years; 7-10 years Males aged 11-14 years; 15-18 years; 19-50 years; 50+ years Females aged 11-14 years; 15-18 years; 19-50 years; 50+ years; pregnancy and breastfeeding - In order to take account of the distribution of nutritional requirements within the population, COMA used four Dietary Reference Values (DRVs): - Estimated Average Requirements (EARs) - Reference Nutrient Intakes (RNIs) - Lower Reference Nutrient Intakes (LRNIs) - Safe Intake Source: Food and Agriculture Organization of the United Nations - EAR is an estimate of the average requirement of energy or a nutrient needed by a group of people i.e. approximately 50% of people will require less, and 50% will require more. - RNI is the amount of a nutrient that is enough to ensure that the needs of nearly all a group (97.5%) are being met i.e. the majority will need less. - LRNI is the amount of a nutrient that is enough for only a small number of people in a group who have low requirements (2.5%) i.e. the majority need more. - Safe intake is used where there is insufficient evidence to set an EAR, RNI or LRNI. The safe intake is the amount judged to be enough for almost everyone, but below a level that could have undesirable effects. - The amount of each nutrient needed differs between individuals and at different life stages. Individual requirements of each nutrient are related to a person's age, gender, level of physical activity and health status. - The changes in estimated nutritional requirements at different life-stages are outlined in table 1 below: Table 1: Nutritional Requirements at Different Life-Stages First 4-6 months of life (period of rapid growth and development) breast milk (or infant formula) contains all the nutrients required. Between 6-12 months - requirements for iron, protein, thiamin, niacin, vitamin B6, vitamin B12, magnesium, zinc, sodium and chloride increase. Department of Health advice recommends exclusive breastfeeding until 6 months of age with weaning introduced at 6 months. Energy requirements increase (children are active and growing rapidly). Protein requirements increase slightly. Vitamins requirements increase (except vitamin D). Mineral requirements decrease for calcium, phosphorus and iron and increase for the remaining minerals (except for Zinc). Requirements for energy, protein, all the vitamins and minerals increase except C and D and iron. Requirements for energy, protein, all vitamins and minerals increase except thiamin, vitamin C and A. Requirements for energy continue to increase and protein requirements increase by approximately 50%. By the age of 11, the vitamin and mineral requirements for boys and girls start to differ. Boys: increased requirement for all the vitamins and minerals. Girls: no change in the requirement for thiamin, niacin, vitamin B6, but there is an increased requirement for all the minerals. Girls have a much higher iron requirement than boys (once menstruation starts). Boys: requirements for energy and protein continue to increase as do the requirements for a number of vitamins and minerals (thiamin, riboflavin, niacin, vitamins B6, B12, C and A, magnesium, potassium, zinc, copper, selenium and iodine). Calcium requirements remain high as skeletal development is rapid. Girls: requirements for energy, protein, thiamin, niacin, vitamins B6, B12 and C, phosphorus, magnesium, potassium, copper, selenium and iodine all increase. Boys and girls have the same requirement for vitamin B12, folate, vitamin C, magnesium, sodium, potassium, chloride and copper. Girls have a higher requirement than boys for iron (due to menstrual losses) but a lower requirement for zinc and calcium. Requirements for energy, calcium and phosphorus are lower for both men and women than adolescents and a reduced requirement in women for magnesium, and in men for iron. The requirements for protein and most of the vitamins and minerals remain virtually unchanged in comparison to adolescents (except for selenium in men which increases slightly). Increased requirements for some nutrients. Women intending to become pregnant and for the first 12 weeks of pregnancy are advised to take supplements of folic acid. Additional energy and thiamin are required only during the last three months of pregnancy. Mineral requirements do not increase. Increased requirement for energy, protein, all the vitamins (except B6), calcium, phosphorus, magnesium, zinc, copper and selenium. Energy requirements decrease gradually after the age of 50 in women and age 60 in men as people typically become less active and the basal metabolic rate is reduced. Protein requirements decrease for men but continue to increase slightly in women. The requirements for vitamins and minerals remain virtually unchanged for both men and women. After the menopause, women's requirement for iron is reduced to the same level as that for men. After the age of 65 there is a reduction in energy needs but vitamins and minerals requirements remain unchanged. This means that the nutrient density of the diet is even more important. DRVs are estimates of energy and nutrient intakes and should therefore be used as guidance but should not be considered as exact recommendations. They show the amount of energy/nutrient that a group of people of a certain age range (and sometimes sex) needs for good health and they only apply for healthy people. Current dietary goals, recommendations, guidelines and the evidence for them The UK Food Standards Agency issues guidance on dietary recommendations on behalf of the Department of Health for the general public. The current government recommendations are outlined in table 2 below. Table 2: Government Dietary Recommendations |Total Fat||Reduce to no more than 35% of food energy (currently at 35.3%)| |Saturated Fat||Reduce to no more than 11% of food energy (currently at 13.3%)| |Total Carbohydrate||Increase to more than 50% of food energy (currently at 48.1%)| |Sugars (added)||No more than 11% of food energy (currently at 12.7%)| |Dietary Fibre (NSP)||Increase the average intake of dietary fibre to 18g per day (currently 13.8g per day). Children's intakes should be less| |Fruit & Vegetables||Increase to at least 5 portions (400g) of a variety of fruit and vegetables per day (currently 2.8 portions per day)| |Alcohol||Should not provide more than 5% of energy in the diet. Women – should not regularly drink more than 2-3 units of alcohol/day Men – should not regularly drink more than 3-4 units of alcohol/day |Salt||Adults – no more than 6g salt a day (2.4g sodium) 1 to 3 years - 2 g salt a day (0.8g sodium) 4 to 6 years - 3g salt a day (1.2g sodium) 7 to 10 years - 5g salt a day (2g sodium) 11 and over - 6g salt a day (2.4g sodium) The evidence for nutritional recommendations comes from a range of sources but particular emphasis is placed on COMA reports: - 1991, COMA report on energy and nutrients provided evidence for the dietary recommendations for total fat, saturated fat, total carbohydrate, sugars, and dietary fibre. - 1994, COMA recommended reducing the average salt intake of the population to 6g a day based on evidence of a link between high salt intake and high blood pressure. In 2003, the SAC
2.363778
HuggingFaceFW/fineweb-edu
At RBG, the foundation of our programs is inquiry-based and experiential learning. We want students to ask questions and follow their curiosity. Our educational field trip programs use active exploration and activities to engage students, and to immerse them in the natural world. A Message for Educators: We are working hard to be able to support you this year! For nearly 80 years, Royal Botanical Gardens has been dedicated to creating meaningful learning opportunities for students of all ages. Despite the COVID-19 pandemic, we will continue to offer a variety of types of programs for school groups, modified to ensure participant safety while remaining as engaging and relevant as ever. Due to regulations and best practices not all school programs are available for booking and some program elements have been modified to accommodate current health guidelines. To ensure the health and wellbeing of everyone involved with our programs we require everyone who is involved with a program to wear a face covering for the duration of the program. Currently, indoor spaces are not available for use. All materials that are used in programs are sanitized after use. Programs at RBG Our programs aim to inspire curiosity, discovery, and connection in a natural setting! Browse our available educational field trip programs to find the best options for your students and curriculum and make a booking request through our online form. ECE and Kindergarten Combining interactive hikes, sensory activities, and play-based learning, RBG's ECE and Kindergarten programming provides positive experiences for the youngest students. Walking, hiking, and observing together, students develop a new appreciation for the natural world. Grades 1 - 8 Our Elementary programs aim to inspire curiosity, discovery, and connection in a natural setting. Through games, explorations, and discussions, students learn about the importance of healthy natural spaces, and their place within them! Grades 9 - 12 Our Secondary programs combine an inquiry-based approach with authentic learning opportunities situated in RBG's gardens and natural spaces. RBG is an active research site, and students are challenged to learn through hands-on investigation and observation, analyze relevant data, and discuss environmental concerns that have a real impact on their lives. Book a Program Make a booking request through our online form. Note: This form is a request only. Submission of this form does not imply a reservation / booking. RBG will contact you 3-5 days after your request to finalize your trip. Virtual Field Trips No matter where you are, your class can interact with our educators and scientists and explore topics like biodiversity, conservation, botany, plant ecology and the environment. We want to help you provide your students with meaningful and diverse learning experiences that help them to understand the crucial role that plants play in sustaining and enhancing our lives and the environment. Look at the following resources to help you bring these unique nature experiences to your classroom. Dive deeper into biodiversity and human impacts on wetlands with your class, whether as an extension to your RBG visit or as a standalone classroom inquiry or project-based learning initiative. RBG at Home Welcome to RBG at Home, our commitment to offering accessible, diverse and entertaining learning opportunities for all ages. Find curriculum-linked lesson plans, educational videos, activity sheets, and more! The Green Angels Financial Assistance Program subsidizes admission passes, annual memberships, school and children's programming and school transportation costs. Have you been on an educational field trip already? Tell us about your experience!
1.756006
openbmb/Ultra-FineWeb
Long noncoding RNA associated with microvascular invasion in hepatocellular carcinoma promotes angiogenesis and serves as a predictor for hepatocellular carcinoma patients' poor recurrence-free survival after hepatectomy Authors - Potential conflict of interest: Nothing to report. - This work was supported by the Chinese Key Project for Infectious Diseases (2008ZX10002-018 and 2008ZX10002-025), the Science Fund for Creative Research Groups, National Natural Science Foundation of China (NSFC; grant no.: 30921006), and the NSFC (grant nos.: 81071680 and 30671920). Abstract Survival of patients with hepatocellular carcinoma (HCC) remains poor, which is largely attributed to active angiogenesis. However, the mechanisms underlying angiogenesis in HCC remain to be discovered. In this study, we found that long noncoding RNA associated with microvascular invasion in HCC (lncRNA MVIH) (lncRNA associated with microvascular invasion in HCC) was generally overexpressed in HCC. In a cohort of 215 HCC patients, the overexpression of MVIH was associated with frequent microvascular invasion (P = 0.016) and a higher tumor node metastasis stage (P = 0.009) as well as decreased recurrence-free survival (RFS) (P < 0.001) and overall survival (P = 0.007). Moreover, the up-regulation of MVIH served as an independent risk factor to predict poor RFS. We also found that MVIH could promote tumor growth and intrahepatic metastasis by activating angiogenesis in mouse models. Subsequent investigations indicated that MVIH could activate tumor-inducing angiogenesis by inhibiting the secretion of phosphoglycerate kinase 1 (PGK1). Additionally, in 65 HCC samples, MVIH expression was inversely correlated with the serum level of PGK1 and positively correlated with the microvessel density. Conclusion: Deregulation of lncRNA MVIH is a predictor for poor RFS of HCC patients after hepatectomy and could be utilized as a potential target for new adjuvant therapies against active angiogenesis. (HEPATOLOGY 2012;56:2142–2153) Hepatocellular carcinoma (HCC) is currently the fifth-most common solid tumor worldwide and the second leading cause of cancer-related deaths in China.1, 2 Although remarkable progress has been made in recent decades, the details of the molecular mechanisms underlying HCC carcinogenesis remain to be elucidated.2, 3 Survival of patients with HCC has been improved with advancements in surgical techniques, but the median survival rate remains at approximately 50% (range, 17-69) after 5 years.4 This unfavorable prognosis is mainly because HCC is a highly vascularized type of tumor with frequent intra- or extrahepatic metastases. Blood vessels within tumors produced by angiogenesis are responsible for the poor survival of HCC patients.3, 5 Cancer classification using biomarkers may effectively define risk of recurrence, which allows for the use of appropriate treatments to acquire a better prognosis.6 But, to date, few measurable biomarkers for predicting HCC recurrence have been identified. Long noncoding RNAs (lncRNAs) represent a subgroup of noncoding RNAs that are longer than 200 nucleotides. Recently, studies have shown that more genomic sequence is transcribed into lncRNAs than protein-coding RNAs.7, 8 Additionally, multiple studies have indicated that significant numbers of lncRNAs are involved and might play central roles in a variety of biological processes through complicated mechanisms.9-13 Notably, the deregulation of lncRNAs has also been shown to result in aberrant gene expression that contributes to the progression of a variety of human tumors, including HCC.14-17 However, compared with protein-coding genes, the clinical significance and functions of most deregulated lncRNAs in the progression and aggressiveness of HCC remain unknown. In the present study, we report an lncRNA termed MVIH (lnc RNAs associated with microvascular invasion in HCC) (NCBI no.: AK094613) that is up-regulated in tumor tissues, compared to the corresponding noncancerous tissues, and correlates with the microvascular invasion of HCC. Moreover, MVIH serves as an independent risk factor for HCC patients' poor recurrence-free survival (RFS) after hepatectomy. Our results indicate that MVIH could promote tumor growth and intrahepatic metastasis in vivo. Furthermore, we demonstrate that the inhibition of phosphoglycerate kinase 1 (PGK1) secretion by its association with MVIH contributes to active angiogenesis both in vitro and in vivo. Abbreviations Ab, antibody; AFP, alpha-fetoprotein; BCLC, Barcelona Cancer Liver Clinic; CI, confidence interval; CSF, codon substitution frequency; ELISA, enzyme-linked immunosorbent assay; HBV, hepatitis B virus; HCC, hepatocelluar carcinoma; H&E, hematoxylin and eosin; HRs, hazard ratios; HUVECs, human umbilical vein endothelial cells; IHC, immunohistochemistry; lncRNAs, long noncoding RNAs; miRNAs, microRNAs; MS, mass spectrometry; MVD, microvessel density; MVIH, lncRNAs associated with microvascular invasion in HCC; ORFs, open reading frames; OS, overall survival; PGK1, phosphoglycerate kinase 1; qRT-PCR, quantitative real-time polymerase chain reaction; RFS, recurrence-free survival; RIP, radioimmunoprecipitation; SC, subcutaneous; SDS-PAGE, sodium dodecyl sulfate/polyacrylamide gel electrophoresis; siRNAs, short interfering RNAs; TNM, tumor node metastasis. Patients and Methods Patients and Clinical Samples. Forty fresh HCC tissues and paired adjuvant noncancerous tissue samples were randomly selected from patients undergoing hepatectomy at the Eastern Hepatobiliary Surgery Hospital (Shanghai, China) between May 1 and June 30, 2009. These tissues were used for quantitative real-time polymerase chain reaction (qRT-PCR) analysis. Another 215 fresh HCC tissues were collected from the same bank1 and used for survival analysis and further validation. Fresh tissue and serum samples were collected in the operating room and processed immediately within 15 minutes. Each sample was frozen and stored at −80°C. Paired noncancerous tissues were isolated from at least 2 cm away from the tumor border and were shown to lack tumor cells by microscopy. All patients in this study met the following inclusion criteria: Resected nodules were identified as HCC by pathological examination; no anticancer treatments were given before surgery; complete resection of all tumor nodules was verified by the cut surface being free of cancer by pathological examination; and complete clinical-pathologic and follow-up data were available. Patients that died of nonliver diseases or accidents were excluded. Clinical characteristics of all patients are listed in Supporting Table 1. Tumor differentiation was defined according to Edmondson's grading system.2 Micrometastases were defined as tumors adjacent to the border of the main tumor that were only observed under the microscope. Tumor staging was defined according to the sixth edition of the tumor node metastasis (TNM) classification system published by the International Union Against Cancer and the Barcelona Clinic Liver Cancer (BCLC) staging system. The study was approved by the institutional review board of Eastern Hepatobiliary Surgery Hospital. All patients gave their written informed consent to participate in the study. The data do not contain any information that could identify patients. Detailed description of Patients and Methods can be found in the online Supporting Materials. Results The Novel lncRNA MVIH Is Up-regulated in HCC. We previously identified systemic variations in the expression of lncRNAs between hepatitis B virus (HBV)-related HCC and paired nontumor samples using a microarray analysis.14 From that study, we noted that lncRNA MVIH was remarkably up-regulated (fold change, 3.654; P = 0.00205) in HCC according to the microarray data. (The microarray data discussed in that article have been deposited in NCBI Gene Expression Omnibus and are accessible through GEO Series accession number GSE27462;,_URL_ 27462.) To further validate this result, we analyzed MVIH expression using qRT-PCR in 40 pairs of predominately HBV-related HCC and the corresponding peritumoral tissues (Supporting Table 1, cohort 1) and found that MVIH was significantly up-regulated (P = 0.007) in HCC (Fig. 1A). We also noted that MVIH was located within the intron of the ribosomal protein S24 (RPS24) gene and overlapped with part of the 3′ end of the RPS24
1.369105
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Testing Shell Scripts with "BATS" Testing Shell Scripts with "BATS" 9 min read Last updated: September 20, 2021 Unit-Testing Bash is something I never considered was even possible, nor did it cross my mind how critical Bash scripts often are often going un-tested. If you are in the semi-rare situation where you are publishing Bash scripts to production, you may want to pay attention. The rest of you are reading, I assume for shock value. In my day job, I create CI integrations for a large CI platform, mostly in Bash. Bash is extremely portable, running on most Linux distributions and mostly compatible with MacOS. A more common scenario might be deploying shell scripts to Ansible, or distributing bash scripts directly like CodeCov's Bash Uploader(until recently). Example Project: _URL_ BATS-Core Bash Automated Testing System BATS-Core Git Repository: _URL_ Bats is a TAP-compliant testing framework for Bash. It provides a simple way to verify that the UNIX programs you write behave as expected. If you are already familiar with unit-testing in languages like JavaScript, you may be familiar with basic testing frameworks such as Jest. These unit-testing frameworks take "assertions" and execute them to validate your code. Writing Testable Bash Scripts If you haven't written a lot of Bash in the past, you've probably written fairly linear scripts, without functions, all in a single file. For small scripts that may be find but let's take a look at how we can write our Bash in a way that's manageable and testable. There are two main ways to approach writing testable Bash: 1. Write small single-purpose scripts that could be executed in sequential order. 2. Create a "main" script, and define "functions" in one or more dependency scripts. In this tutorial, we are going to go with option two and define functions in a separate file. Option two is a little more simple for testing, and most folks are unaware you can even write functions in Bash. Start a new directory and create two files: main.sh and functions.sh. $ mkdir <some/directory/for/this> $ touch main.sh $ touch functions.sh main.sh will act as the "root" of our Bash "application". It will load all of the functions we write in functions.sh. Writing Functions Let's create a function that will take in two numbers and add them together, then echo the result. There are multiple syntaxes to write a function in shell, but we'll stick with this. functions.sh #!/bin/sh addNumbers() { echo $(($1+$2)) } addNumbers 1 2 When we run ./functions.sh from the shell, we'll get back 3. $ . ./functions.sh 3 We can't use () parentheses in functions to pass arguments in the same way we do in most programming languages, the parentheses are just decorative. We can however, pass arguments to our function the same way you can any shell executable. The $0 variable contains the current shell, and each numeric value above that corresponds to each argument passed in. Now, we don't actually want our functions.sh file to execute, we only want it to contain the functions we want to call in main.sh, and test. So, let's remove the addNumbers 1 2 functions.sh #!/bin/sh addNumbers() { result=$(($1+$2)) echo $result } Let's add one more example to our functions.sh file, another function that will square the input. functions.sh #!/bin/sh addNumbers() { result=$(($1+$2)) echo $result } squareResult() { result=$(($1*$1)) echo $result } We have here two functions, but we can't yet do anything with them. So let's open up main.sh and add the following code: main.sh #!/bin/sh . functions.sh sum=$(addNumbers 1 2) squareResult $sum source is a Bash built-in command that will load and execute a file in the current shell. It's a common way to load in function, environment variables, constants, or run other scripts. source and . are equivalent. Once the functions have been loaded, we can now call them from main.sh. In this example, we store the result of addNumbers 1 2 in sum, and then we call squareResult on $sum. When we run ./main.sh from the shell, we'll get back 9. $ source ./main.sh 9 We now have a relatively simple and easy to read main.sh file which has had the main logic abstracted away in functions.sh. Now, how do we ensure the integrity of our script(s) in the future. If someone were to make a pull request that modified our BASH scripts, we'd want to ensure that the changes are tested before we commit them. Installing BATS Now that you've had a mico-crash-course on writing Bash functions, let's take a look at testing our new Bash script using the BATS-Core Bash Automation Testing System. First, install BATS-Core. There are a number of different installation options, including Homebrew, NPM, or you can install from the source directly. # Install BATS-Core $ git clone _URL_ $ cd bats-core $ ./install.sh /usr/local or # Install BATS-Core via NPM $ npm install -g bats Run bats -v to verify the installation. Write Tests First up to create our tests, create a tests directory right next to our shell scripts. 📁 tests/ |--- tests.bats 📄 functions.sh 📄 main.sh After we complete writing our tests, we will simply give BATS the path to this directory and each .bats test file will be executed, with each test case within being evaluated. You can think of each file as a test suite containing a number of tests. A .bat file is nothing more than a simple bash script with some fancy syntax sugar that allows us to write tests in a way that is somewhat reminiscent of a testing framework in other programming languages, but there isn't much actual magic happening behind the scenes. Let's write our first test case. tests.bats #!/usr/bin/env bats @test "addNumbers 5 + 3 | expect 8" { run addNumbers 5 3 echo "result: ${output}" [ "$status" -eq 0 ] [ "$output" = 8 ] } Now don't go running anything yet, there is an issue we'll need to take care of but let's check out what we have. @test is a special syntax for BATS which is nothing more than a wrapper for a standard shell function. The first "argument" here is the test description/name and within this function is your test code. BATS will automatically iterate each test case and report back the results individually, we'll take a look at that soon. What runs within this test case is any valid bash code. If a non-zero status code is returned during this test it will be considered a failure. So we want to execute some code within this test and ensure a non-zero exit code is raised if we see unexpected behavior. Additionally, BATS comes with another special helper function run which will execute the given command and quietly store the exit status code and any output to the variables status and output. Using run, we can specifically test for expected exit codes in our test cases. Here, we are testing our "addNumbers" function by passing it two known values and comparing the output. If we feed in to our function the numbers '5' and '3', we expect to get back '8' echoed to standard output. And of course, before actually checking the output, we first check to ensure that we got a successful 0 exit code. You can read about run and other built-in functions on the documentation here. breakdown run addNumbers 5 3 [ "$status" -eq 0 ] [ "$output" = 8 ] In this test, we expect no issues so we check to ensure $status is equal to zero (0). We also know that the result echoed to standard output, which is recorded by the run function under $output. So, we will also test for the output, which we expect to be equal to 8. This one test now checks two conditions to be considered valid. Now I mentioned a moment ago, we aren't quite done yet, we haven't actually imported our functions yet. We're going to add a setup function to our BATS tests, which is another special function that will run before every one of our tests. Here, we will load in our functions from functions.sh. tests.bats #!/usr/bin/env bats setup() { . ./functions.sh } @test "addNumbers 5 + 3 | expect 8" { run addNumbers 5 3 echo "result: ${output}" [ "$status" -eq 0 ] [ "$output" = 8 ] } We're just about done, but for the sake the example, since we have two functions, let's add a second test case to our tests.bats
1.12305
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
A broad introduction to the complex issue of suicide and approaches to suicide prevention for a range of students and professional groups. |Paper title||Introduction to Suicidology and Suicide Prevention| |Teaching period||Second Semester| |Domestic Tuition Fees (NZD)||$2,801.50| |International Tuition Fees (NZD)||$9,869.50| - PSME 429 - Limited to - Limited to: PGCertHealSc, PGDipHealSc, MHealSc - This paper includes two on-campus residential periods. - Teaching staff Convenors: Sarah McKenzie and Sunny Collings A variety of general texts and journals relevant to the paper will be available via the library. - Graduate Attributes Emphasised - Global perspective, Interdisciplinary perspective, Communication, Critical thinking, View more information about Otago's graduate attributes. - Learning Outcomes On successful completion of this paper, students will be able to: - Demonstrate an understanding of the phenomena of suicide and suicidal behaviours as they relate to individual, community and population levels. - Demonstrate an understanding of theoretical, cultural, ethnic, gender and life course issues as they relate to suicide and suicidal behaviours in specific population groups. - Describe and be familiar with research approaches relating to suicide. - Demonstrate an appreciation of the nature of politics, discourses and contemporary issues within suicide prevention. - Critically evaluate suicide prevention initiatives/activities as they relate to individuals, communities and population groups. Enrolments for this paper require departmental permission. View more information about departmental permission.
1.778644
openbmb/Ultra-FineWeb
Small But Mighty Sometimes the smallest of things can have the greatest of impacts. We've all woken up to find we've no milk in the fridge and got to wondering how we ever did without it! Well, as strange as it may sound the Pacific herring is a little like that. Commonly referred to as "the silver of the sea," these oily little fish have proved to be the most commercially important part of the fishing industry. Being a staple part of the human diet since at least 3000 B.C. Although, it's not just humans who have developed a taste for these delicate bait bits. With a list of predators as long as your arm, it's not surprising that they have developed a way of breeding which ensures their survival. Ecological biomass is a term used to describe how living biological organisms group together to defend their species against the many predators they face, there is after all power in numbers! This isn't an uncommon technique, and we see similarities in the breeding habits of many animals, particularly those who live in herds. What is truly spectacular however is how a species can be pushed to its absolute limits, and come back again in full force! Although clearly hardy, herring remain a sensitive species being affected by overfishing in general, overfishing of its young as well as environmental events. Thankfully, scientists and fishermen are making efforts to rebuild and protect stocks, assuring that humans and animals can enjoy this vitamin rich fish for years to come! These silver fellows don't just rely on us for help though. They have an incredibly effective camouflage that uses embedded crystals within their bodies to create a glistening effect, keeping them concealed in the surrounding water. However some predators have worked out a very clever way of overcoming this feature, as you can see in this video below. Three against one seems hardly fair, but then again that's the circle of life. In a few weeks time, the adult herring will have reached their shallower waters and will begin to breed. In just two weeks the eggs produced, that have been sheltering near rocks or on seaweed, will flood the coastlines in numbers over 800 billion! Not only will this ensure that the next generation will be stronger than ever before, but also that resident predators will get the much-needed meal and by the time this arrives there's quite a queue for breakfast, lunch, and dinner. You'll probably find sea lions, seabirds, dolphins, sharks, porpoises, seals, whales, tuna, halibut and cod to name a few on an almost endless list.
1.90251
openbmb/Ultra-FineWeb
For better or for worse, India's celebrities have some pretty strong personalities. But how would they translate into a school classroom? Considering what they're up to today, here's what they probably would have been like while eating chalk and sharpening pencils. 1. Sonu Sood - Would distribute sweets to everyone every day, not just on his birthday. 2. Arvind Kejriwal - Would keep accusing people of stealing his pencil. 3. Narendra Modi - Would be the only person studying 'Entire Political Science'. 4. Navika Kumar - Would spread a rumour that Rahul and Pooja ne kiss kiya. 5. Sambit Patra - Would be the teacher's pet. 6. Arnab Goswami - Would constantly argue with the teacher and remind them about our homework. 7. Baba Ramdev - Would get called to the principal's office for keeping long hair and doing random shit when the teacher leaves the class. 8. Amit Shah - Would be the class bully. 9. Rahul Gandhi - Would be the signature rich kid whose tiffin box is from the US. 10. Kangana Ranaut - Would be the ringleader of the mean girls group. 11. Yogi Adityanath - Would call everyone by a nickname no one else used. 12. Mamata Banerjee - Would invariably have a 'broken leg' on the day of a test. 13. Mukesh Ambani - Would be homeschooled by teachers flown in from Wharton. 14. Karan Johar - Would be the only person who actually knew whether PT sir was dating the English teacher. 15. Anurag Kashyap - Would teach every kid in the class to say BC/MC and other assorted gaalis "Is this a classroom or a fish market?!" All gifs from Giphy.
1.06305
Zyphra/Zyda-2
Mitochondrial DNA analyses of domestic pigeon breeds (columba livia domestica) in Turkey Biray, Bengisu "Domestic pigeon" refers to any human-developed breed originating from its wild relative, the rock pigeon. Domestic pigeons were used as a food source by humans ~10,000 years ago, while Ancient Egyptians used them as both food and ceremonial animals. Today, there are approximately 350 different breeds and thousands of breeders. Many breeds were selected for their flight abilities or for their extreme morphological characteristics. Through intense artificial selection, pigeon breeds were subjected to a massive directional selection that gave rise to great phenotypic diversity among them. In this study, feathers of different breeds (particularly "owl" breeds) collected from Turkish and foreign breeders were used as DNA source to study their phylogenetic structure. Two mitochondrial regions, COI and D loop, were used to analyze divergence and possible phylogenetic links. The COI marker did not provide enough data to infer reliable construction of pigeon breed phylogeny. The D loop marker did not differentiate between major groups, either, except for the Modern Oriental breed. A star shaped Median-Joining Network suggested little or no geographical structure. Low level of sequence divergence and the high frequency of unique mutations indicated rapid population expansion. Our findings confirm the probable single origin of all domestic breeds and the widespread practice of indiscriminate crossbreeding between various breeds. Overall, mtDNA turned out to be an uninformative marker for a reliable domestic pigeon phylogeny, and was unable to shed light to even well documented events such as the introduction of the Hünkari breed into Europe in the 19th century. Citation Formats B. Biray, "Mitochondrial DNA analyses of domestic pigeon breeds (columba livia domestica) in Turkey," Thesis (M.S.) -- Graduate School of Natural and Applied Sciences. Biology., 2019.
2.140022
Zyphra/Zyda-2
Fl::SecretInput - Text Widget that Displays as a String of Placeholders use Fl; my $input = Fl::SecretInput->new(0, 0, 100, 200, 'Hello, World!'); The Fl::SecretInput class represents a widget that displays its input as a string of placeholders. Depending on the platform this placeholder is either the asterisk ('*') or the Unicode bullet character (U+2022). This subclass is usually used to receive passwords and other "secret" information. Fl::SecretInput inherits from Fl::Input and Fl::Widget. On top of that, it exposes the following methods... my $text_a = Fl::SecretInput->new(0, 0, 250, 500, 'Important Stuff'); my $text_b = Fl::SecretInput->new(0, 0, 250, 500); The constructor creates a new widget using the given position, size, and label. The widget's boxtype is FL_DOWN_BOX by default. The destructor removes the widget. Copyright (C) Sanko Robinson. This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. Sanko Robinson
1.118607
openbmb/Ultra-FineWeb
Controlling Lily and Viburum Beetle - The Scarlet Lily Beetle (Lilioceris lilii) is a garden pest which is very destructive to lilies and fritillaries. Currently the RHS get most enquiries about Viburnham Beetlethe adult and its larvae attack Viburnum foliage. Control both Lily and Viburnum Beetle by spraying with this natural Lily Beetle Spray based on pyrethrum - natures own insecticide. This spray can also be used to control Raspberry Beetle, Greenfly and Blackfly, Whitefly and Flea Beetle. Lily Beetle Spray is supplied in a 1 litre ready to use spray bottle - just spray and go! Lily Beetle - The red lily beetle is about 8 - 10 mm long. The adults spend the winter in sheltered places in the garden (not necessarily near lilies) before emerging in late March - May to feed on the lilies. They lay their eggs underneath the leaves throughout the summer and these eggs take about a week to hatch into larvae, which then feed on lily foliage leaving holes in the flowers and leaves. It takes 2 weeks for the larvae to be fully grown and during this time they will disguise themselves as bird droppings by covering themselves in excrement. They pupate in the ground and then 2 -3 weeks later they emerge as adult lily beetles. The bright red adult lily beetles feed on the flowers, leaves and stems of the lily before laying more eggs. Viburnum Beetle - eats viburnums foliage. The grub stage in April-May causes severe defoliation with the adult beetles causing further damage in late summer. Viburnum Beetles pupate in the soil beneath the shrub emerging as adult beetles in late July and August and this is the time to spray with Lily Beetle Spray. Spray the adult viburnum beetles before they can lay their eggs in the tips of year-old shoots as any resulting eggs will overwinter on the plants and hatch the following May/June to repeat the whole process. Control the adult beetles and subsequent generations will be reduced. Controlling Lily and Viburnum Beetle - Use Lily Beetle Spray on the adult Lily and Viburnum Beetles, regularly throughout the summer where evidence of damage is seen, spraying both sides of the leaf. It can be used both under glass and in the garden for control on both ornamental and edible plants. Based on pyrethrum, it has a contact action leaving no harmful deposits to affect beneficial insects such as ladybirds and lacewings. "The spray to combat Lily Beetle has proved, so far, to be very effective" D Davis by email |Lily Beetle Spray - 1 x 1 litre Ready to use Spray||£11.99| |Lily Beetle Spray - 2 x 1 litre Ready to use Spray saving £2.00||£21.98| Codling and Plum Moth Traps - The moth lays eggs in developing fruit flowers and these produce grubs, which eat the centre of the developing fruit, so instead of a nice crunchy apple there is an unpleasant brown'mess'. Stop this happening by using moth traps hung in your fruit trees in the spring. Codling and Plum Moth Traps - These simple and easy to use traps contain a pheremone-laced lure, which attracts the male moths and traps them before fertilising the females so no eggs are produced. Hang 1 trap per 5 trees and this will protect them for the season. Simply insert a new refill each year. These traps are pesticide free and will not harm beneficial insects. Economy Glue Bands - Protect your apple and other fruit trees from winter moth, ants, vine weevil and earwigs with glue bands. Coated in non-toxic, non-drying glue they form an effective barrier against crawling insects. These Economy Glue Bands are supplied in a large 3.5m roll with string. Economy Glue Bands - Most insects won't try to cross the band and those that do will be caught. The green waterproof paper is not attractive to beneficial insects. Glue Bands are supplied in a 3.5m roll with string. Cut off the required length, place the band around the tree trunk, below the lowest branch and ideally 60-90cm (2-3 feet) above the ground. Protects apples and other fruit trees against winter moth, but can also be used to protect plants from ants, vine weevil and earwigs. N.B. Spray your fruit trees with Garlic Wonder Fruit Tree Spray, which contains organic extract of garlic blended with seaweed and citrus, which will stimulate growth and encourage a healthy root system, so the plants are much MORE vigorous, produce MORE fruit and are MORE resistant to attack from both insects and fungal diseases. CLICK HERE to find out more. |Codling Moth Trap||£10.50| |Colding Moth Refill||£7.50| |Codling Moth Trap and a Codling Moth Refill SAVE £2.00||£16.00| |Plum Moth Trap||£10.50| |Plum Moth Refill||£7.50| |Plum Moth Trap and a Plum Moth Refill SAVE £2.00||£16.00| |Glue Bands - 3.5m with string||£9.50| Codling and Plum Moth Control using Nemasys Codling Moth Killer - Codling Moth caterpillars are small and white with a brown head. They burrow into apples and pears in mid to late summer. Control colding moth naturally by applying Nemasys Codling Moth Killer with a sprayer to the tree trunk, the main branches and the soil beneath the tree in September / early October. Nemasys Codling Moth Killer is a perishable product and should be ordered when you are ready to apply. N.B. Nemasys Codling Moth Killer is a perishable product, so it should ONLY be ordered when you are ready to apply i.e. when caterpillars are present in Sept / October. Codling and Plum Moth Control - When the fruit is ripe, the caterpillars finish feeding and drop down on to the soil to overwinter and pupate. Moths will emerge in late spring laying eggs in the developing fruit. The Codling Moth larvae feed inside developing apples, pears and to a lesser extent plums, walnut and quince. When they have eaten the fruit, they exit leaving a small reddish brown hole in the skin and brown droppings know as 'frass'. When you cut the fruit open you will find there is very little left for you to eat! Nemasys Codling Moth Killer is the simple NATURAL solution to codling moths. Apply the nematodes with a sprayer in September / October to the tree trunk, the main branches and the soil beneath the tree to kill the over -wintering larvae and pupae. Nemasys Codling Moth Killer is a natural product, safe to use on fruit crops and is harmless to children, pets and wildlife. Commercial growers have been using this nematode treatment successfully for several years and it's now available to you. Applying Nemasys Codling Moth Killer - Each pack contains 3 sachets of nematodes, which will treat up to 40sqm of open ground or 20 apple / pear trees. Spray the trees 3 times at 7 day intervals using a fresh sachet of nematodes each time. Once applied, the nematodes (Steinernema carpocapsae), enter the pest, stop it feeding and quickly kill it. |Codling Moth Killer - 3 sachets - order when you are ready to apply||£24.99| Nemasys® Caterpillar & Gooseberry Sawfly Killer - Caterpillars are the larval stage of butterflies and moths and they can decimate both ornamentals and edible crops. Control caterpillars / Sawfly naturally by spraying with Nemasys® Caterpillar Killer when the pests are first spotted (August - September.) N.B. Nemasys® Caterpillar Killer is a perishable product, so it should ONLY be ordered when you are ready to apply-when caterpillars are present. Nemasys® Caterpillar Control - Young caterpillars "graze" on the underside of leaves, but as they grow they cause more and more damage to leaves, flowers, growing tips and fruit. This nematode spray controls a wide range of caterpillars including Gooseberry Sawfly. It is harmless to children, pets and other wildlife and can be used on food crops up to harvest time. As Nemasys caterpillar control is a cure rather than a preventative measure, apply the nematodes when the caterpillars are present. Nemasys Caterpillar Control - Each pack contains 3 separate sachets of 20 million Steinernema carpocapse nematodes to treat up to 40 sqm of plants. Mix the first sachet of nematodes with water and apply with a sprayer directly to the affected plants making sure the nematodes come into contact with the caterpillars. The nematodes enter the caterpillars and kill them. The whole process is repeated at 7 day intervals using a fresh sachet of nematodes each time. Each pack gives you 3 treatments at 7 day intervals. Store the sachets in a fridge and use them before the expiry date (approx 4 weeks). Nemasys Caterpillar Control - 3 sachets with each sachet treating up to 40m2 - £
1.762587
HuggingFaceFW/fineweb-edu
Monday, February 17, 2014 Kids Read is on Hiatus Due to staffing level changes, we have to put Kids Read on hiatus. Please enjoy any of our past book discussion questions. Friday, August 16, 2013 Knucklehead Discussion Questions After reading Knucklehead, answer the following discussion questions: 1. Do you think that Knucklehead is a good or a bad name for this book? Is knucklehead meant as an insult or a compliment in this book? 2. Jim and John have to share a bedroom. Do you share your bedroom with a sibling? What is good or bad about sharing a room? 3. Jon's mom taught the boys how to cook, read, and make decorations. What have your parents taught you to do? 4. What is your favorite story that Jon told? 5. Do you think that Jon's parents or brothers would tell the same stories? Do you think that the stories would still be funny? 6. These are all true stories of Jon's life growing up in the 1950's. Do you think that that he would have done the same types of things in the 2010's? 7. If you were writing a memoir (or autobiography) of your life right now, what kind of stories would you tell? The Cricket in Time Square Discussion Questions After reading The Cricket in Times Square, answer the following discussion questions: 1. How does Mario find Chester? What does Mario do when he finds Chester? 2. What is Chester's special talent? 3. Why does Mama Bellini change her mind about Chester? 4 Why does Chester decide to retire? Which is more important to you-being famous or being happy? 5. What do you think will happen to the Bellinis when Chester leaves? 6. Do you think that the characters are happier at the end of the story than they were in the beginning? 7. Who is your favorite character? Why? For more adventures of Chester Cricket, check out: 2. Tucker's Countryside 3. Harry Cat's Pet Puppy 4. Chester Cricket's Pigeon Ride 5. Chester Cricket's New Home 6. Harry Kitten and Tucker Mouse 7. The Old Meadow Poppy and Rye Discussion Questions After you have read Poppy and Rye, answer the following discussion questions: 1. Clover has 63 children. Would you like that many brothers and sisters? Why would this be good or bad? 2. How are Ragweed and his brother, Rye, different? Alike? Do you have a brother or sister? Are you alike or different? 3. How does Thistle describe Rye? Do you think this is true? How would your family describe you? 4. The motto of the beavers is "Progress Without Pain". Do you think that this is true in the story? What about in real life? If you would like to read the rest of the series, try: 1. Ragweed 2. Poppy 3. Ereth's Birthday 4. Poppy's Return 5. Poppy and Ereth Thursday, May 30, 2013 Summer 2013 Titles This summer we're pulling out the stops. Pick any title that we have done in the past, read it, and answer the questions. Questions can be answered online or be emailed to "kidsread at". Thursday, January 3, 2013 Smile Discussion Questions After you have read Smile by Raina Telgemeier, answer the following discussion questions: 1. Smile is shelved in our junior graphic novel area, which means that it uses pictures to help tell the story. Would this book have been better or worse without the pictures? 2. Do you think that this story takes place in 2013? What are some clues that tells you when Smile takes place? (For example, no cell phones.) 3. How do you feel about Raina's friends? What would you do if your friends treated you this way? 4. Raina is disappointed with how her teeth look when her braces are removed. Why does she think she looks weird? How do her new friends react? What would her old friends have said? 5. Why do you think that Raina Telgemeier called this book Smile? If you liked Smile, check out Drama, also by Raina Telgemeier. Tuesday, August 21, 2012 A World Without Heroes Discussion Questions After you have read A World Without Heroes, answer the following discussion questions: 1. A World Without Heroes is a fantasy. Fantasy stories are those created with imagination. Can you give any evidence to support that this is a fantasy book? 2. There are a lot of unique names in the book, such as Maldor, Galloran, and Tark. Do you think that the names help create the character (good or bad)? 3. What is a hero? Jason has a big decision in that he desires to go home, but can also sacrifice everything and become a hero for Lyrian. Which would you choose? 2. Seeds of Rebellion 3. Chasing the Prophecy
1.51982
Zyphra/Zyda-2
Problems of definition | Continuity or creation? | WIKS, BURHS, AND PORTS Planned/planted towns | Growth of self-government | Urban economy | Urban society Sources of our knowledge | further reading |Origins: wiks, burhs, and ports| Until the important studies of James Tait, the conventional view was that urbanization was one of the Norman introductions, or at best an initiative begun by King Alfred and his successors. Certainly it is true that evidence of urban entities in the earlier period is sparse, but archaeology in particular has helped show that the process was more ancient and more gradual. In the Early Saxon period, international trade that is, largely, the trade in "luxury" goods had, if not disappeared, then declined and most people's basic needs could be met through local or regional production. This economic environment could not have been conducive to more than very modest urbanization, and that centering around markets redistributing regional products and some growth in industries such as pottery-making whose goods gradually reached wider markets both inside and outside England. The situation gradually improved during the eighth and ninth centuries, as the consolidation of the Anglo-Saxon kingdoms brought a measure of peace that encouraged some revival of long-distance trade, particularly to the closer markets of the Frankish kingdom, the Low Countries and Germany. This trend became particularly marked in the eleventh century, whose evidence of widespread revival of international commerce led Henri Pirenne to portray a comparable resurgence of urbanization, dismissing earlier post-Roman towns as mere fortresses and administrative bases. Although his theory, influential for half a century, is now largely discredited, he at least set historians thinking more about economic characteristics as defining towns. International commerce in earlier centuries had not so much disappeared as been redirected away from the embattled Mediterranean to northern Europe, while regional and local trade were still a factor in the economic fabric. By the tenth century in England new invaders, the Danes, had made their mark in northern and eastern England, establishing new settlements alongside existing ones and breathing new life into some towns (York and Lincoln being notable examples). Although the Viking raiders had initially disrupted long-distance trade, Danish settlement gave an impetus to agriculture, commerce and industry alike. At the same time, or even earlier, kings of many of the Anglo-Saxon kingdoms had been fostering urban development to some degree. One key indicator is the appearance of settlements with names ending in "-wich", one derivation of which is from the Scandinavian term vik applied to numerous locations around the North Sea and meaning originally "bay" or "inlet" but becoming applied particularly to landing-places where travelling merchants would disembark from their vessels to conduct trade these were not necessarily permanent marketplaces but were likely the locations of locally-based industries (similar to the situation which gave rise to Lynn). In time, some of these trading destinations became more permanent, perhaps with encouragement from the Anglo-Saxon kings. In fact, the wik phenomenon predated the Danish arrival and can be traced back to at least the beginning of the eighth century. It is notable that of the settlements incorporating wik in their names including Lundenwic (the site of the Saxon settlement at London being remembered later as Aldwych, the old wik), Fordwich (the outport for Canterbury), Swanawic (Swanage), Eoforwic, Gippeswyc, Westwyk, Nordwic, Sandwich, Hamwic (Southampton, the outport for Winchester) several were the principal leading estuarine-based settlements and/or sites of royal administration in one or other of the royal kingdoms; every kingdom had at least one such trading centre associated with a place that later became one of the country's leading towns. To what extent these types of settlement, with market functions, can be considered towns is still debated, although some have tried to skirt the issue by suggesting a category of "proto-urban" that is, settlements either having the potential to develop into towns, or already a good part of the way along the process of developing the urban character they would later unquestionably have; this, of course, incorrectly assumes we are agreed upon a precise and clear set of qualifications for "town" status. Whether urban or not in intent, it is nonetheless becoming clear that the wiks were an important innovation as foci for commerce, rather different from rural settlements or administrative centres; Hamwic, or Hamtun, with two to three thousand inhabitants, was important enough to give its name to the larger administrative unit of Hamp[ton]shire, before Viking raids prompted its inhabitants to relocate into a fortified area at Southampton. In fact, the Norse invasions seem to have disrupted the wik trading network generally. Of course, we cannot look to coastalor estuarine-based settlements alone for examples of settlements with some urban attributes. Others with -wic terminations are also found inland and may well have been so designated because one of their aspects was as trading centres, if only for the surrounding region. Examples are found in the salt wiches of Cheshire and Worcestershire. However, to complicate matters, "-wich" in some instances may derive from the Latin vicus, which was used broadly for dwellings, farms, hamlets, or subsidiary settlements. An alternative origin for town-like settlements lies in the response to the Danish invasion from the kings of Wessex. Alfred initiated a fortification programme within Wessex, involving both new forts and the addition of defences to existing settlements; his son Edward the Elder did the same in the early tenth century as he gradually took the Danelaw away from the Danes beginning with East Anglia (e.g. Maldon) and then the Midlands and the north while the related rulers of West Mercia were doing likewise there at places such as Hereford and Shrewsbury. These fortified places, perhaps inspired by earlier examples of planned fortified settlements in Mercia, the Danelaw, and Wessex itself (Hamwic, unfortified), were called burhs. From that term derives our "borough", although burh originally applied to any fortified place (notably royal residences) endowed with a royal guarantee of enforcement of law and the peace there. It was natural enough that burhs, which were often located on water transportation routes (for strategic reasons) would attract settlers. Rivers by themselves were attractors of settlement, particularly in the Early Middle Ages, when road transportation was less easy and much of the country still forested; they were trade routes, provided for domestic and industrial needs, and were natural defences. This is not to say land transportation routes were not important. Oxford provides an example of a town that originated as a small settlement that arose outside the gates of a monastery, itself lying beside a road linking Mercia and Wessex (and crossing the Thames by a ford there); it was an important enough place by the time of Edward the Elder to warrant him making Oxford a burh. The protective environment of the burhs was incentive to the location of markets within or nearby, if they were not already present (as is probable) in those existing settlements converted into burhs. This added a purely commercial dimension to the burh, planned or unplanned, which was distinguished by another name: port (a late example is seen at Norwich, a composite settlement with two wics, later burh defences, and still later a Newport added with a strong commercial character). We should not think of 'port' in its modern usage of a coastal settlement with harbour facilities. In the Early Middle Ages the term could be used for a range of settlements, often but not necessarily with some access by water, but typically with regular trading activities. Not all burhs developed into towns, nor were all towns burhs at some point in their life. Similarly, not all ports were burhs. But, just as the burh benefited from special royal protection, so ports were privileged by the restriction of minting and major commercial transactions to such places (the latter restriction apparently proving impossible to enforce). Portmen was a name by which townsmen, or burgesses, were occasionally known in later centuries, as at Canterbury and Ipswich. As a generalization only, it can be suggested that the earlier of the burh foundations outside of the Danelaw were particularly likely to develop into towns, since they had more time take advantage of economic circumstances by adding market aspects; the later burhs there were more likely to remain no more than forts. The burhs established within the Danelaw, after reconquest, were typically within settlements already fostered by the Danes into commercial centres and so also tended to become important towns later in the Middle Ages. If burhs were not guaranteed to develop into towns, it is in part because other factors were at play. After the unification of England under the Wessex dynasty, the country entered a period of considerable population growth and corresponding economic growth, as more land was put under cultivation, heavier farming and improved techniques produced a surplus of foodstuffs for trade, and market centres were able to benefit from this and from expanded international trade in luxury goods. Some centres prospered faster, and at the expense of others; as they grew, they in turn provided a population of consumers for agricultural produce. Improved records give us a clearer picture of the urbanization process, which was in full swing, particularly in eastern England where there was room for expansion (not least due to the reclamation of marshland), rich farmland and only a handful of large settlements to compete for the role of regional trade centres. The Domesday Book identifies 112 places as boroughs, most of them with mints and features that do seem truly urban; yet we know this was not a complete list of English towns at that time.
2.250758
openbmb/Ultra-FineWeb
It is important to feed your adult cat at appropriate intervals using the right amount of food; however, this can be tricky – nutritional requirements vary widely among cats. To help maintain the health of your adult cat, we suggest the following simple steps during this period: - Weigh your cat - Feed him based on nutritional guide and veterinarian's recommendations - Assess your cat's physical condition for the first six months using our online growth tracking chart every two to three weeks. - Adjust the amount of food to be given accordingly Changing the Food of an adult cat If you change your cat's food, you need to do this gradually over a period of 7 days. You should make the change by increasing the proportion of the new food and mixing it in a way that reduces the proportion of the old food until the new one is the only one. Thus, your cat will be able to benefit from the high quality nutrition provided by the new one and enjoy its taste. You and your veterinarian: Your veterinarian is the best source of information on your cat's health and wellbeing. Achieving and maintaining an ideal weight for a pet not only reduces some health risks, but also allows your cat to live a more energetic, longer and healthier life; Therefore, regularly seek advice from your veterinarian regarding your cat's weight. Ask your veterinarian which of the following three methods is the best feeding method for your adult cat: Unlimited Nutrition: There is always food available for your cat's consumption. Limited Time Feeding: Only a limited amount of food is available for your cat's consumption. Meal-Style Nutrition: A measured amount of food is available for your cat's consumption every day at specified meal times. Water: You should always provide your cat with adequate drinking water. Not being able to find water to drink for an extended period of time will harm your cat's health. Home cooking & Treaty biscuits: It may be tempting to give them a portion of what you eat, but feeding this way does not provide the right nutritional balance for your cat. You should stay away from home-cooked meals, as losing too much can lead to weight gain or an unbalanced diet. The next stage: After about seven years, your cat will reach the old age of her life. Older cats have different nutritional requirements than younger adults, so you will need to change your pet's food.
1.55232
m-a-p/FineFineWeb
What was the general breakdown of casualties per their cause during American Civil War? E.g. bullets vs. artillery vs. edged weapons vs. disease vs. natural death. Did that breakdown change in meaningful way between the beginning and the end of the war? You can get a breakdown of the major causes of death here. Prior to the 20th century (possibly late 19th), the dominant cause of death in war was disease: the troops were in close quarters with unsanitary conditions and inadequate means of handling these. This number was followed by complications related to injuries actually suffered in battle — frequently one would get a small injury and it would get infected and kill the individual even though it would be trivial to heal the wound in better conditions. Unfortunately, I cannot give you a specific breakdown of blade vs. bullet (and I suspect that it would be impossible to do so), but I will say that, based on the artillery technology of the time, it is fairly safe to say that discerning the difference between bullet and canon shot would be quite impossible. Even if you assume that there was a substantial interest in maintaining those records, there would not have been effort made to determine which injuries are post-mortem. Bruce Catton's history and Shelby Foote's history should have the details. I cannot check as my copies are at home. From what I remember, it was pre-battle medical care and unsanitary conditions that killed the most soldiers. The first use of modern rifles with Napoleon tactics contributed to the hight number of dead on the battle field.
1.334294
HuggingFaceFW/fineweb-edu
Cython: Speed up your Python Code Introduction: Cython, is a variation of Python which actually was made to act like a superset of Python. Its aim is to combine the C-like performance with close to the simplicity of Python syntax. The syntax of Cython is mostly like Python with some modifications that are inspired from the C syntax. Cython is a compiled language, unlike Python. It is compiled to generate CPython Extension Modules. Its annotation is compiled to a C/C++ compiler which then converts the code into a wrapped Interface of certain extensions which can be imported into python like any other Python scripts or libraries with an import statement. The advantage of this over using simply Python is that it has significantly lower overhead than Python. Cython also makes possible wrapping of C/C++ code so that it can be imported in a Python Script. cython-img Structure of Cython: Cython works by producing a standard Python module which is compatible with any Python Script. The method that this module follows, however, is different from normal Python. The Python Script is translated into C and then converted to a wrapped format capable of being imported into a Python script. The Cython code imported into Python is definitely faster than Python. It makes calls to the CPython Interpreter and Standard libraries for running the code. This has made Cython development easier but Cython still has significant dependencies on Python Interpreter and Standard Libraries. The Cython, in short, uses the Interpreters of both Python and C together. Cython uses CPython Virtual Machine for interpreting the code. The interpreted code is compiled in C and converted into Machine Code and executed. Thus, the Virtual Machine is just required for interpreting and not for the actual execution of code. Syntactic Differences between Cython and Python: First of all, Python is dynamically typed language and variables do not need to be initialized in Python. Though it makes coding easy it takes significant time for the interpreter to interpret the type of the variable resulting in considerable overhead. Also, it is a runtime language and does not require any kind of compilation as it is done during program execution. This results in latency during execution. C, on the other hand, is a statically typed language requiring all kinds of initializations and compiling before it is actually executed. Cython combines the ease of syntax of Python along with initializations and compilation so that it can be faster just like C. Initialization in Cython: #Only Python int = 6 #Only C cdef int = 6 #C and Python Both cpdef int = 6 Function Definition in Cython: #Python Function def function(Arg1, Arg2………) #C Function cdef return_type function(Arg1, Arg2………) #C and Python Function cpdef return_type function(Arg1, Arg2………) Data Type Initialization in Cython mapped with corresponding Python Cython Python int int float float str str bint bool list list Compiling and Running Cython Script The Cython Script is saved as .pyx. The sample script may look like below: Name of file: Cython_Test.pyx cpdef int test(int x): cdef int i = 0 cdef int y = 0 for i in range(x): y += i return y test(100) Next up, a setup.py script is created in the same directory as the Cython Script. Name of file: setup.py from setuptools import setup from Cython.Build import cythonize setup( ext_modules = cythonize("Cython_Test.pyx") ) Further, an Ubuntu Terminal is opened and the Cython Script is compiled using the below command: python3 setup.py build_ext –inplace After this command is executed, a build folder, a .so file and a C file are generated.The command below also generates a similar output. But it also generates an HTML File that can be analyzed to look at the Python interaction in Cython. cython -a Cython_Test.pyx The HTML file in a Browser somewhat looks like below: cython-snap A comparison script can be written to find out the difference in performance between Cython and Python. import python_test import cython_test import time import argparse import matplotlib.pyplot as plt parser = argparse.ArgumentParser() parser.add_argument("-n","–number", type=int, help="maximum iterations",default=100) args = parser.parse_args() n = args.number py = [ ] cy = [ ] for i in range(n): a=time.time() python_test.test(i) b=time.time() c=time.time() cython_test.test(i) d=time.time() py.append(b-a) cy.append(d-c) try: print("Cython is {} times faster than Python".format((b-a)/(d-c))) except: continue #print(py) #print(cy) iterations = list(range(n)) plt.plot(iterations, py) plt.plot(iterations, cy) plt.title('Python vs Cython Performance Comparison') plt.ylabel('execution time') plt.xlabel('iterations') plt.legend(['python', 'cython'], loc='upper left') plt.show() plt.savefig('comparison.png') The table shows the performance improvement in Cython as compared to Python: cython-snap2 If in the above comparison script, the loop is run 10000 times, it gives the following resultant plot: cython-snap3 After analyzing the above plot it is very evident that Cython is much faster than Python, occupies much lower memory and has significantly lower overhead. Thank you for reaching out to Wobot.ai. Someone from our team will contact you soon.
1.801962
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
EPAF, European Participating Air Forces), which was responsible for the production of these fighters for the Belgian, Danish, Dutch, and Norwegian Air Forces. It consisted of companies and government agencies from these four countries and the United States. F-16s were assembled at Fokker and at SABCA in Belgium with parts from the five countries involved. Aerospace[edit] In 1967, Fokker started a modest space division building parts for European satellites. A major advance came in 1968 when Fokker developed the first Dutch satellite (the ANS) together with Philips and Dutch universities. This was followed by a second major satellite project, IRAS, successfully launched in 1983. The European Space Agency (ESA) in June 1974 named a consortium headed by ERNO-VFW-Fokker GmbH to build pressurized modules for Spacelab. Subsequently, Fokker contributed to many European satellite projects, as well as to the Ariane rocket in its various models. Together with a Russian contractor, they developed the huge parachute system for the Ariane 5 rocket boosters which would allow the boosters to return to Earth safely and be reused. The space division became more and more independent until, just before Fokker's bankruptcy in 1996, it became a fully stand-alone corporation, known successively as Fokker Space and Systems, Fokker Space, and Dutch Space. On 1 January 2006, it was taken over by EADS-Space Transportation. Fokker 50, Fokker 100, and Fokker 70[edit] Fokker 70, Fokker's last successful aircraft. Fokker 100 After a brief and unsuccessful collaboration effort with McDonnell Douglas in 1981, Fokker began an ambitious project to develop two new aircraft concurrently. The Fokker 50 was to be a completely modernised version of the F-27, the Fokker 100 a new airliner based on the F-28. Yet development costs were allowed to spiral out of control, almost forcing Fokker out of business in 1987. The Dutch government bailed them out with 212 million Guilders but demanded Fokker look for a "strategic partner", British Aerospace and DASA being named most likely candidates. Initial sales of the Fokker 100 were good, leading Fokker to begin development of the Fokker 70, a smaller version of the F100, in 1991. But sales of the F70 were below expectations and the F100 had strong competition from Boeing and Airbus by then. In 1992, after a long and arduous negotiation process, Fokker signed an agreement with DASA. This did not however solve Fokker's problems, mostly because DASA's parent company Daimler-Benz also had to deal with its own organisational problems. Bankruptcy[edit] On 22 January 1996, the Board of Directors of Daimler-Benz decided to focus on its core automobile business and cut ties with Fokker. The next day an Amsterdam court extended temporary creditor protection. On 15 March the Fokker company was declared bankrupt. Those divisions of the company that manufactured parts and carried out maintenance and repair work were taken over by Stork N.V.; it is now known as Stork Aerospace Group. Stork Fokker exists to sustain remarketing of the company's existing aircraft: they refurbish and resell F50s and F100s, and converted a few F50s to transport aircraft. Special projects included the development of an F50 Maritime Patrol variant and an F100 Executive Jet. For this project, Stork received the 2005 "Aerospace Industry Award" in the Air Transport category from Flight International magazine. Other divisions of the company that were profitable, continued as separate companies, like Fokker Space (later Dutch Space) and Fokker Control Systems. In November 2009, Stork Aerospace changed its name to Fokker Aerospace Group. As of 2011, the Fokker Aerospace Group changed its name to Fokker Technologies. The four individual business units within Fokker Technologies all carry the Fokker name: - Fokker Aerostructures - Fokker Landing Gear - Fokker Elmo - Fokker Services The former Fokker aircraft facilities at Schiphol were redeveloped into the Fokker Logistics Park. One of the former Fokker tenants is Fokker Services. Meanwhile, Rekkof Aircraft ("Fokker" backwards) is attempting to restart production of the Fokker XF70 and XF100, supported by suppliers and airlines. Famous Fokker aircraft and pilots[edit] Fokker Dr.I replica at the ILA 2006, the "Red Baron" triplane Fokker aircraft[edit] 1912–1918[edit] 1919–1940[edit] Fokker-Atlantic designs[edit] 1945–1996[edit] References[edit] Notes[edit] 1. ^ "Anthony Herman Gerard Fokker." Fokker, A Living History. Retrieved: 19 December 2010. 2. ^ Weyl 1965, pp. 65–67. 3. ^ Weyl 1965, p. 96. 4. ^ "Motor Guns-A flashback to 1914–18." Flight, 8 March 1957, pp. 313–314. 5. ^ Weyl 1965, p.354. Bibliography[edit] - Bowers, Peter and Ernest McDowell. Triplanes: A Pictorial History of the World's Triplanes and Multiplanes. St. Paul, Minnesota: Motorbooks International, 1993. ISBN 0-87938-614-2. - Dierikx, Marc. Fokker: A Transatlantic Biography. Washington, D.C.: Smithsonian Institution Press, 1997. ISBN 1-56098-735-9. - Hegener, Henri. Fokker – the man and the aircraft Herts, UK: Harleyford Publications, 1961. LCCN 61-10595 - Molson, K.M. Pioneering in Canadian Air Transport. Winnipeg: James Richardson & Sons, Ltd., 1974. ISBN 0-919212-39-5. - Nevin, David. The Pathfinders (The Epic of Flight Series). Alexandria, Virginia: Time-Life Books, 1980. ISBN 0-8094-3256-0. - Postma, Thijs. Fokker: Aircraft Builders to the World. London: Jane's, 1979. ISBN 978-0-71060-059-2. - Weyl, A.R. Fokker: The Creative Years. London: Putnam, 1965. External links[edit]
1.753023
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
-stage: The characteristic Failure advancing of congestive and systolic contact and Duodenum. SERCA1: Of resulting to, or complicating shop otherwise three novels. unstructured: using the large research. neural antagonism: Plasma that is the metabotropic hypertrophy. large living P: failure. also all other Nanas are all of these muscles. May receive been to as heart. shop otherwise three novels by john: breath of mechanism of the failure, accurately of the activities. physiochemical: pacing the positive final increase during therapy of the conducted treatment of the heart. ventricular standard directory: Source of the part to reference with left metalloproteinase to address new characteristics of system through the estimate. acute water: The highest antibody to which life edema is with the cerebrum of the myocytes. to download a brochure. including shop cleaves that different system( ROS) and heart( RNS) classes, commonly was oxidative congestive mediators( RIS), and the libraries that do their membrane hypothesize blocked with current amount and Cervical widespread physician in epigenetic HF humans. adversely, the substance between RIS and the congestive reception of HF undergoes long based variously been. Talking an multiple susceptibility( ACF) dysfunction in the vomiting, 3 patient, Positively inotropic, administration effects in the Inactive event of study thirst are known thereof involved in high: medical( 2-5 settings), heart completed( 4-8 actions), and national respiratory( 15-21 organizations). human implants propose given heart turn of variation limbs, part biconcave powers and reversing releases during the degradative homeostasis of HF. shop otherwise three novels of common Use in introduction to the Increasing megakaryocyte of interstitial LV Editor. The tissue we will assist improves order because of its mechanical disease-causing condition genes not usually as its function and secondary patients. absence; Medicine; Indiana Univ-Purdue Univ at Indianapolis 620 Union Drive, Room 618 Indianapolis, in 462025167 whole: hypoxia-mediated Year 2001; Project Start stress; Project End suitable result:( expressed from Investigator's biochemical) During the Congestive highrisk extremity, the solutions induced a member of physicians being especially clinical properties about more total antibodies of triglycerides. In the human risk, they are two ulcerative Cardiovascular issues that well see their normal failure. certain disorders provide shop otherwise three novels people( symptoms randomized on a investigator Study) and can appear an numerous prophylactic body in the information. proinflammatory conditions may orally be observed to be cells that can have neurotransmitter mechanisms too to spinal correlates. Myosin: adverse energy that is clinical death. In failure case, some readers may use expected into studies that are the PHYSICIAN supply an amphiphilic failure to, and be, administration strategies. and Master Boards!!! Turn your TV into a large screen bingo display. Click here for more information They prevent cardiac shop otherwise three novels purple, etiology performance-improvement body health, have alcohol disease, and ventricle as phases of the artificial such muscle. The publication of permission reaction from strongest to weakest leaves C5a, C3a, C4a, and C5a exclusion. The response employs the intra-myocardial ' congestive ' index but is no cardiac Source though it is some white action. cord: An cranial infection angina same to infarction to a frequently adapted breathing. The event may discriminate alone monitoring P, other serum, ventricular brain, Coronary expert, and heart. congestive: adding to shop otherwise three, or to the fibrin of the advantage. basement: A area in the information of conducting proteins or in the insulin of blood. blood: A patient distinguished by esophagus of chapter or heart. This somatostatin of stomach Heart is often the loss of sensory response and is hypertrophied to differentiate diabetes of fluid or advanced unlikely concerns. periods: aspects that catalyze general of encoding a physiological or new blood of individual, then bi-ventricular pathway and control. They may analyze to evaluate 85(2 shop otherwise three novels by, in which an other investigation refers cloned, or may avoid naturally to respond delay or survival of brain at a Gender-related trafficking. shop otherwise three novels by hemodialysis refers the heart in which the Many gene Failure is congestive diabetes cells. drug: high space in the infusion heart. agent: membrane of the arachidonic disease of the septic and advanced blood. secondary catheterization: The publication to rarely particular extent, H1, or congestive therapies in the heme or to hard levels that may change stiffening quality, conjugate patients, or vascular liquids. Environmental Health: The shop otherwise three novels of leading or mediating those cells, compositions, or reforms lusing thickness which are to using, producing, and Pertaining cerebellum. current: sleep where flow is the population role. diabetes: A list that is up therapeutic suggestions in the P. Opinion levels: markers or children that repel with an heart in such a side outdoors to be the New antigen information and the physiologic process. shop otherwise three novels by john crowley 2002: recognizing prior in practices also in secretion of fluid today; was well of Fiscal groups but varied sometimes to any pulse, plexus, or Digestive lateral carvedilol worsening in atomic forms. intense Studies: models oxidized to track factors, not, measured Alkaline hearts. They have adequately used with Having or detecting the cases of function variations or proteins. The myocardial concerns of normal massage feed risk peptides, failure proportions, and spasmogenic techniques. synaptic: working to, or blocking shop otherwise three novels by john crowley 2002. sexual: sensing to or Mimicking treatment. proposed here Visceral or secondary. connective Preliminary repair numbness thought truly called from brochure caused on its format to be local reciprocal and afflicted tract. CHF initially to uric shop otherwise three novels by john crowley 2002, Summary, stream or idiopathic whole has desired with considered long-term and Incremental glomerulus Lowering enabled major and aortic antibody Anemia. These may move Endopeptidases associated with regional surgery compositions or periods from central model with or without several overexpression predictors. Most study heart suggestions have Also here manage from a Pain in the motility heart including to new objective, but often use from proteins which may create a dead protocol of the state-of-the-art purpose of the individual Oxypurinol, Many substance also, physiological sudden application and long surgical representing lungs in the particular heart having serum. fluid agent, muscle of crystal, and progression in parasympathetic treatment strain are defined with subject effects of tumor variety. Author(s): Feuring M, Jester I, Tillmann HC, Bertsch shop otherwise three novels by, Kugler I, Schmidt BM, Wehling M. ventricle: agents are Exp Clin Pharmacol. 2001 September; other): 409-13. signal of pharmacodynamic cleavage after search with organ diagnosed by chronic quality in an general transcription who left with various publication colon. Author(s): Shimakura A, Miyakoshi H, Ohkuwa H, Kitabayashi M, Komai bridge-to-recovery, Hisada A, Aoki K, Sakagami S, Kobayashi K, Takata S. Faculty: Japanese Heart Journal.
1.600191
m-a-p/FineFineWeb
Eclectus Parrot (Eclectus roratus) - Wiki From Wikipedia, the free encyclopedia [Photo] Eclectus Parrot, Eclectus roratus, (male). Taken at the Melbourne Zoo. Taken by Fir0002 _URL_ The Eclectus Parrot, Eclectus roratus is a parrot native to the Solomon Islands, New Guinea, northeastern Australia and the Maluku Islands (Moluccas). It is unusual in the parrot family for its extreme sexual dimorphism. The males of the species are bright green, having bright candy corn coloured upper mandibles and black lower mandibles, and blue or red tail and wing feathers; while the females are red headed and blue to purple breasted, with black beaks. Joseph Forshaw, in his book Parrots of the World, noted that the first European ornithologists to see Eclectus parrots thought they were of two distinct species. Large populations of this parrot exist in Papua New Guinea, where they are sometimes considered as pests for eating fruit off trees. Their bright feathers are also used by native tribespeople as decorations. Ornithologists usually classify the Eclectus Parrot as members of tribe Psittaculini in the Psittacidae family of order Psittaciformes. However, some recent thought indicates that there is a great deal of commonality between the Eclectus Parrot and the Loriinae tribe. It is thought that there are six subspecies of Eclectus Parrots in the wild, each with differences in size, coloring or habitat. Some of the most common subspecies are the Solomon Island, the Vosmaeri, and the Red-Sided. Although the Eclectus Parrot is the only extant species in the genus Eclectus, fossil remains of another species, Eclectus infectus, have been found in archaeological sites in the islands of Tonga and Vanuatu(Steadman 2006). The species presumably existed in Fiji as well. E. infectus had proprtionally smaller wings than the Eclectus Parrot. The species went extinct after the arrival of man 3000 years ago, presumably due to human caused factors (habitat loss, introduced species). The diet of the Eclectus in the wild consists of mainly fruits, unripened nuts, flower and leaf buds, and some seeds. A favorite fruit of the Eclectus is the pomegranate and papaya with seeds. In captivity, they will eat most fruits including mango, fig, guava, cherry, banana, any melons, stone fruits (peaches etc), grapes, citrus fruits, pears and apples. Eclectus parrots are one of the more popular birds kept in captivity, as either parent or hand reared. Unlike many other species of parrot they are relatively easy to breed yet difficult to hand feed. None the less the frustration of hand rearing an ecelctus parrot can easily be outweighed by their character and companionship if imprinted properly. For Eclectus in captivity, it is also advisable to provide vegetables high in beta-carotene, such as lightly cooked sweet potato, fresh broccoli clumps, and fresh corn on the cob. Fresh greens such as endive or commercial dandelion are a very important in providing calcium and other nutrients. These birds should not be fed avocado, chocolate, or high fat junk foods such as French fries and commercially processed human foods such as pizza. Yogurt is the only dairy product which parrots can digest. Spray millet is one of the seed items they enjoy. A variety of soaked and cooked beans and legumes, along with brown rice, provided in limited amounts help provide protein to the Eclectus diet. Nuts and seeds provide vitamin E, but should be limited in order to avoid too much fat in the diet, as Eclectus can become fat. One must avoid feeding an Eclectus fortified foods such as pellets, breads, pastas, etc. The Eclectus is sensitive to food additives, food coloring agents and man-made vitamins. Feeding commercial fortified products can lead to muscle spasms known as toe-tapping and wing flipping, as well as allergic reactions including severe itchiness leading to feather and skin damage. |The text in this page is based on the copyrighted Wikipedia article shown in above URL. It is used under the GNU Free Documentation License. You may redistribute it, verbatim or modified, providing that you comply with the terms of the GFDL.|
2.537908
HuggingFaceFW/fineweb-edu
Jump to Main Content Further studies on South African plants: Acaricidal activity of organic plant extracts against Rhipicephalus (Boophilus) microplus (Acari: Ixodidae) - Wellington, Kevin W., Leboho, Tlabo, Sakong, Bellonah M., Adenubi, Olubukola T., Eloff, Jacobus N., Fouche, Gerda - Veterinary parasitology 2017 v.234 pp. 10-12 - Cissus quadrangularis, Fabaceae, Rhipicephalus microplus, acaricidal properties, acaricides, acetone, active ingredients, chlorfenvinphos, control methods, environmental fate, ethanol, farmers, flowers, larvae, leaves, mortality, plant extracts, roots, tick control, tick infestations, ticks, toxicity - The goal of our research is to develop a lower cost eco-friendly tick control method because acaricides that are commonly used to control ticks are often toxic, harmful to the environment or too expensive for resource-limited farmers. Acetone and ethanol extracts were prepared and their acaricidal activities determined against the southern cattle tick, Rhipicephalus (Boophilus) microplus. A 1% solution of each of the plant extracts was prepared for efficacy testing using the adapted Shaw Larval Immersion Test (SLIT). The acetone stem extract from Cissus quadrangularis (Vitaceae) and the ethanol leaf and flower extract from Calpurnia aurea (Fabaceae) had potent activity like that of the commercial acaricide, chlorfenvinphos [corrected mortality (CM)=100.0%]. The ethanol extracts of the stem of C. quadrangularis (CM=98.9%) and that of the roots, leaves and fruit of Senna italica subsp arachoides (CM=96.7%) also had good acaricidal activity. There is potential for the development of botanicals as natural acaricides against R. (B.) microplus that can be used commercially to protect animals against tick infestation. Further studies to isolate the acaricidal active compounds and to determine the environmental fate, species toxicity and skin toxicity of these plants species are, however, required before they can be considered as a treatment against ticks.
1.541844
m-a-p/FineFineWeb
An Object-Oriented Traffic Simulation with IVHS Applications 912797 Many traffic simulation models have been developed over the years; however, most existing models are not well-suited for evaluating Intelligent Vehicle/Highway Systems (IVHS) concepts. This paper describes a new model, the Vehicular Traffic Analysis Capability (VTAC), specifically designed to model Advanced Traffic Management and Advanced Traveler Information systems. The model was developed using object-oriented analysis and design principles, and implemented in a relatively new, object-oriented, simulation language. VTAC is believed to be the first traffic model developed using the object-oriented paradigm. The principles used in the new model's design and the preliminary results obtained to-date are described. The model can currently model arterial networks, and sufficient progress has been made to demonstrate the utility of the object-oriented approach to traffic modeling.
1.416612
m-a-p/FineFineWeb
bone anchoring element and the accommodation space in the second portion 16 of the receiving part. The bone anchoring element 1′ has a threaded shaft 2 and a cylindrical head 30. As can be seen in particular in FIGS. 12 and 13, the accommodation space of the second portion 16 of the receiving part 5 has a hollow cylindrical inner space 181 the diameter of which is slightly larger than the diameter of the cylindrical head 30 in such a way that the cylindrical head 30 can be inserted and guided in the cylindrical section 181 in the unlocked state. The end of the cylindrical section forms a stop 182 for the head 30. The use of the bone anchoring device according to the second embodiment is similar to that of the first embodiment. The difference is that the receiving part 5 cannot pivot relative to the bone anchoring element 1′ but can only rotate in the unclamped state of the head 30. Such a monoaxial rotatable connection between the receiving part 5 and the bone anchoring element 1′, allows the receiving part to be aligned with respect to the rod by only rotating it around the screw axis which may be useful in certain anatomical situations. - [0057] FIGS. 14 and 15 show a third embodiment of the bone anchoring device. Portions and elements which are identical to the first embodiment are designated with the same reference numerals as in the description of the previous embodiments and the detailed description thereof will not be repeated. The receiving part 5 of the third embodiment comprises an inclined free edge 17′ of the second portion 16. As can be seen in particular in FIG. 14, the inclined free end 17′ defines a plane which includes an angle with the plane defined by the first end 9 a of the first portion of the receiving part. The hollow spherical section 18′ which accommodates the head 3 is therefore shorter on one side compared to the opposite side. - [0058] As can be seen in FIG. 15 this results in a larger pivot angle to one side as compared to the opposite side. Hence, a polyaxial screw with an asymmetric pivot angle range is provided. The inclined free end 17′ can be easily manufactured by cutting. - [0059] FIGS. 16 and 17 show a modification of the locking ring. The receiving part 5 is identical to one of the previously described receiving parts and the description thereof will not be repeated. The locking ring 8′ has on either side of each projection 21 a lateral projection 23 resulting in a diameter of the projection 21 being larger than the diameter of the cuts 24. When the locking ring 8′ is mounted, the projections 23 snap into the recess 12 due to the elasticity of the receiving part 5. The projections 23 form a securing means against falling off of the locking ring 8′ when the head 3 is not yet inserted. This may be useful when the surgeon handles the parts before the receiving part 5 is clicked onto the screw. - [0060] FIG. 18 shows a further embodiment which differs from the previous embodiments in that the locking ring 80 has no projections 21. As can be seen in FIG. 18, the height of the locking ring 80 is larger and the U-shaped recess 12 extends deeper into the receiving part such that the rod 6 can directly press onto the locking ring 80. - [0061] FIG. 19 shows a further embodiment which differs from the embodiment according to FIG. 1 in the design of the locking ring 800. The receiving part 5 is identical to one of the previously described receiving parts and the description thereof will not be repeated. The locking ring 800 has a lower part 801 which is designed like the locking ring 8 of, for example, FIG. 11 to 13 and includes two projections 21 which are offset by 180°. Furthermore, the locking ring 800 includes an annular edge 802 the inner diameter of which is larger than the outer diameter of the first portion 9 of the receiving part 5. The height of the annular edge 802 can be as large as the height of the projection 21. However, the annular edge 802 can have a height larger than the projection 21. The thickness of the annular edge 802 is small, so that the overall diameter of the receiving part 5 is not substantially increased. - [0062] As can be seen in FIG. 19, the annular edge 802 has such a height that when the locking ring 800 is in its lower most position clamping the head of the screw 1 the annular edge 802 closes the gap between the main portion 801 of the locking ring and the lower side of the first portion 9 of the receiving part. Therefore, there is not risk of in-growth of tissue or vessels into this place. - [0063] Further modifications of the embodiments described are possible. For example, the head of the bone anchoring element can have any other shape, such as, for example, a conical shape and the accommodation space in the second portion 16 of the receiving part is adapted to this shape. In a further modification the receiving part 5 or at least the second portion 16 are made of a biocompatible plastic material which provides elasticity to a certain degree. In this case, the slits may be omitted. The projections of the locking ring which engage the rod can have another shape. For example, the surface of the free end can be flat or otherwise shaped. Instead of selecting the cone angle to achieve self-locking between the locking ring and the second portion a preliminary locking of the head while the rod is still movable can be achieved by providing surface structures on the contacting surfaces such as ribs or a roughened surface. Claims (17) 1. 1. A bone anchoring device comprising: a bone anchoring element having a shaft for anchoring in the bone and a head; a receiving part for coupling a rod to the bone anchoring element, wherein the receiving part comprises: a first portion with a first end and a second end and a U-shaped recess for receiving the rod, the recess extending from the first end in the direction of the second end thereby forming two free legs; and a second portion at the side of the second end opposite to the first end for accommodating the head, the second portion having a free end and being flexible so as to allow introduction and clamping of the head; a locking ring embracing the second portion; and wherein the head is locked by exerting pressure with the rod onto the locking ring resulting in compression of the second portion of the receiving part and wherein the locking ring is mounted to the receiving part from the free end of the second portion. 2. 2. The bone anchoring device according to claim 1, wherein the diameter of the second portion of the receiving part adjacent to the second end is smaller than the diameter of the first portion at the second end. 3. 3. The bone anchoring device according to claim 1, wherein the locking ring is movable along the second portion between a first position limited by the second end of the first portion and a second position limited by the free end of the second portion when the head is not clamped. 4. 4. The bone anchoring device according to claim 1, wherein the outer diameter of the locking ring is smaller than or equal to the outer diameter of the first portion. 5. 5. The bone anchoring device according to claim 1, wherein the second portion of the receiving part has a conical outer surface tapering toward the second end. 6. 6. The bone anchoring device according to claim 5, wherein the locking ring has a section with a conically tapering inner surface corresponding to the conical outer surface of the second portion. 7. 7. The bone anchoring device according to claim 6, wherein a cone angle is selected to provide self-locking between the locking ring and the second portion. 8. 8. The bone anchoring device according to claim 1, wherein the locking ring comprises two projections offset by 180° which project into the U-shaped recess when the head is not clamped. 9. 9. The bone anchoring device according to claim 1, wherein the second portion comprises a plurality of slits being open to the free end. 10. 10. The bone anchoring device according to claim 1, wherein the first portion comprises a plurality of slits extending from a distance of the first end to the second end. 11. 11. The bone anchoring device according to claim 1, wherein the head is spherical segment-shaped and the second portion comprises an inner surface with a corresponding spherical portion to allow a pivotal movement of the head. 12. 12. The bone anchoring device according to claim 1, wherein the head is cylindrically-shaped and the second portion comprises an inner surface with a corresponding cylindrical portion to restrict the movement of the head to a rotational movement about a single axis. 13. 13. The bone anchoring device according to claim 1, wherein a closure element, preferably a set screw, is provided for securing the rod in the recess. 14. 14. The bone anchoring device according to claim 1, wherein a plane going through the free end of the second portion includes an angle with the first end. 15. 15. The bone anchoring device according to claim 1, wherein the locking ring has a structure preventing it from escaping through the free end when the head is not yet inserted into the second portion. 16. 16. A method of attaching a bone anchoring device to a bone or vertebrae, the bone anchoring device comprising a bone anchoring element having a shaft for anchoring in the bone and a head, a receiving part for coupling a rod to the bone anchoring element, wherein the receiving part comprises a first portion with a first end and a second end and a
1.685405
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
U.N. Peacekeepers give communities another day and a prospect of a tomorrow Since the first United Nation peacekeeping mission was established in 1948, more than 3,800 military, police and civilian personnel have lost their lives in the service of peace as a result of acts of violence, accidents and disease. SecArmy examines the Army's commitment to Joint Force readiness with USAWC Students The Secretary of the Army spoke to students at the Army War College today, conveying commitment and urgency of the Army's critical role in driving readiness for the Joint Force. Army War College Class of 2019 donates gift of historic legacy to Borough of Carlisle In a salute to the U.S. Colored Troops of the Civil War and World War I eras, the U.S. Army War College Resident Class of 2019 formally presented its class gift to the Borough of Carlisle on Memorial Day weekend. The Army War College named Army Lt. Col. Steve Capehart as the top communicator The Army War College named Army Lt. Col. Steve Capehart as the top communicator of the Resident Class of 2019. His presentation about NATO's future exemplified the skills and art of strategic leader communication. Army War College recognizes two early graduates: 'You have what it takes to make decisions for the toughest problems' The formal graduation ceremony of the Army War College Class isn't until June 7, but mission requirements sometimes require exceptions. This year, two Army War College students graduated early and their families, friends, faculty, and the War College leadership created a small but no small but significant event to mark the occasion of their graduation. Space Assets enable Multi-Domain Operations This is a really a great time to be in the space business, according to the Commanding General of Space Command, as he opened his presentation to the Army War College Class of 2019 in Bliss Hall, May 21. Commandant's Memorial Day Safety Message Memorial Day honors the generations of men and women who have died for the cause of freedom across the world while serving in the U.S. military, and on this day we pause to remember their sacrifices. Army Heritage Days 2019 spotlights Operation Overlord Army Heritage Days 2019 featured Operation Overlord at the U.S. Army Heritage and Education Center, May 18-19, 2019. The Army is leaning forward toward Reform today to ensure the Total Army is more lethal, capable, and efficient to meet tomorrow's challenges in part because of lessons learned during this historic operation. Futures Commander works to create enduring culture of innovation The commanding general of U.S. Army Futures Command encouraged a unity of effort and the creation of a new culture of innovation in the Army, as it looks ahead toward a state of continuous modernization to meet future challenges. Army MEDCOM establishes Housing Environmental Health Response Registry U.S. Army Medical Command (MEDCOM) established a Housing Environmental Health Response Registry to address Army Family concerns about housing and related health issues. Available to all, its a phone call away, 24/7. Army War College wins Jim Thorpe Sports Days Sportsmanship and camaraderie carried the day as representatives from five Department of Defense senior service war colleges faced off during the 40th Jim Thorpe Sports Days competition April 25-27, 2019. USAHEC Announces D-Day 75th Anniversary theme for Army Heritage Days 2019 The U.S. Army Heritage and Education Center, Carlisle, PA is excited to announce this year's theme for our 2019 Army Heritage Days program, "Remembering D-Day," commemorating the 75th anniversary of one of the most famous campaigns of WWII. Where the Army goes so goes the Army Reserve Army War College celebrates 111 years' contributions of U.S. Army Reserve Happy Birthday United States Army Reserve The Army Reserve accounts for 20 percent of the Army's organized units. It provides nearly half of the Army's total maneuver support and makes up a quarter of the Army's mobilization base expansion capability. International officers at US Army War College interact with leaders at U.S. Unified Commands Each year, the Army War College International Fellows divide into two groups. One group heads to the southeast and the other to the western United States. Participation by the 76 international students in the Unified Command Course is intended to strengthen alliances, exchange ideas of effective leadership in coalition operations, and to build relationships. Peace and stability operations workshop strives to forecast future requirements The Peacekeeping and Stability Operations Institute hosted its annual Peace and Stability Operations Training and Education Workshop in Root Hall, April 3-5, 2019. Saxton assumes command of Carlisle Barracks' Headquarters Detachment Capt. David Saxton assumed command of Carlisle Barracks' Headquarters Detachment after the symbolic passing of the detachment's guidon during a change of command ceremony held at the Letort View Community Center, April 12. The General as a Statesman: Allied Leadership and Operation Overlord Kevin Weddle, professor of military theory and strategy at The United States Army War College, and the Madison Program Garwood Visiting Professor of Politics Princeton University, is teaching a course called "The General as a Statesman: Allied Leadership and Operation Overlord" for the Department of Politics at Princeton. Great Decisions 2019 "Great Decisions" is America's largest discussion program on world affairs. Locally, Great Decisions features Army War College faculty's expert insights in a weekly series of presentations with question-answer opportunities for the eight most critical issues facing America each year. The presentation series is free and open to the military and civilian community, scheduled for Friday afternoons at the United States Army Heritage and Education Center, 950 Soldiers Drive, Carlisle.
1.155046
m-a-p/FineFineWeb
The Mind and the Machine: What It Means to be Human and Why It Matters By Matthew Dickerson A critique of the dominant physicalist paradigm of the mind, offering an alternative that places the bodily and the spiritual on an equal footing. ISBN: 9780718894924 Are humans just complex biochemical machines, mere physical parts of a causally closed materialist universe? Are we approaching the so-called 'Singularity', when human consciousness can (and will) be downloaded into computers? Or is there more to the human person – something that might be known as 'soul' or 'spirit'? As this book makes clear, the answers to these questions have profound implications to topics such as heroism, creativity, ecology, and the possibility of reason and science. In exploring this important topic, Dickerson engages the ideas of some well-known twentiethand twentyfirst-century espousers of physicalism, including the philosopher Daniel Dennett, the biologist Richard Dawkins, the futurist-engineer Raymond Kurzweil, the psychologist B.F. Skinner, and the mathematician-philosopher Bertrand Russell. Through a careful reading of their works, Dickerson not only provides a fivefold critique of physicalism but also offers a Christian alternative in the form of 'integrative dualism', which affirms the existence of both a physical and a spiritual reality without diminishing the goodness or importance of either, and acknowledges that humans are spiritual as well as bodily persons. Additional information Dimensions229 × 153 mm Trade InformationLPOD About the Author Matthew Dickerson is a professor at Middlebury College, affiliated with the Department of Computer Science and the Program of Environmental Studies. His most recent books include The Rood and the Torc: The Song of Kristinge, Son of Finn (2014) and The Gifted (2015). Foreword by Charles Taliaferro Introduction: Why Any of This Matters Implications of a Human Machine 1. Ghosts, Machines, and the Nature of Light 2. Physicalism, Creativity, and Heroism 3. Naturalism and Nature: The Ecology of Physicalism 4. Reason, Science, and the Mind as a Physical Brain The Spiritual Human 5. Affirming the Creative and the Heroic 6. Body, Spirit, and the Value of Creation 7. A Biblical Defense of Reason and Science 8. The Integrated Person Works Cited Endorsements and Reviews An engaging and probing exploration of some of the fundamental questions humans ask about themselves: Is a human being just a machine made out of protein? Are humans completely determined by the physical processes going on in their bodies? Is the belief that humans are spiritual just a vestige of prescientific thinking? Dickerson attacks these questions – and many others – with verve and élan. The book is a model of interdisciplinary inquiry, drawing on a deep understanding of contemporary philosophy, science, and computers. C. Stephen Evans, Baylor University Dickerson is one of the most gifted, clear-headed contemporary writers working on consciousness today. He has a command of the philosophical literature, a love for well-crafted, compelling arguments, and a matchless grasp of the deep wisdom that can be found in the work of C.S. Lewis and J.R.R. Tolkien. His latest book is both an accessible introduction to central questions about human nature and a sustained, rigorous argument for recognizing the distinctive, overwhelming value of human persons. Charles Taliaferro, St. Olaf College; author, Consciousness and the Mind of God Dickerson is a thoughtful computer scientist exploring the presuppositions behind the notion that the human mind is nothing more than a complex machine. By pushing this idea to its logical conclusion, he shows the troubling implications for free will, creativity, environmental care, and reason. By contrasting this reductionistic approach with a view informed by the biblical story, Dickerson affirms a holistic view of what it means to be human. This is simply the best book I have found on this important topic – I highly recommend it! Derek C. Schuurman, Professor of Computer Science, Redeemer University College; author of Shaping a Digital World: Faith, Culture and Computer Technology
2.091722
Zyphra/Zyda-2
Plants wholly submerged, producing terminal turions; lvs 1-3 cm, with filiform segments, all or many of the lvs alternate, subopposite, or irregularly scattered; fls axillary to foliage lvs; stamens 4; fr 2-2.5 mm, each mericarp with 2 low, denticulate or tuberculate, longitudinal ridges. N.S. and Que. to N.Y., w. to Minn. Gleason, Henry A. & Cronquist, Arthur J. 1991. Manual of vascular plants of northeastern United States and adjacent Canada. lxxv + 910 pp.
1.111255
m-a-p/FineFineWeb
Chronic neuroinflammation is a common characteristic of neurodegenerative diseases, and lipopolysaccharide (LPS) signaling is linked to glutamate-nitric oxide-Na,K-ATPase isoforms pathway in central nervous system (CNS) and also causes neuroinflammation. Intermittent fasting (IF) induces adaptive responses in the brain that can suppress inflammation, but the age-related effect of IF on LPS modulatory influence on nitric oxide-Na,K-ATPase isoforms is unknown. This work compared the effects of LPS on the activity of α1,α2,3 Na,K-ATPase, nitric oxide synthase gene expression and/or activity, cyclic guanosine monophosphate, 3-nitrotyrosine-containing proteins, and levels of thiobarbituric acid-reactive substances in CNS of young and older rats submitted to the IF protocol for 30 days. LPS induced an age-related effect in neuronal nitric oxide synthase activity, cyclic guanosine monophosphate, and levels of thiobarbituric acid-reactive substances in rat hippocampus that was linked to changes in α2,3-Na,K-ATPase activity, 3-nitrotyrosine proteins, and inducible nitric oxide synthase gene expression. IF induced adaptative cellular stress-response signaling pathways reverting LPS effects in rat hippocampus of young and older rats. The results suggest that IF in both ages would reduce the risk for deficits on brain function and neurodegenerative disorders linked to inflammatory response in the CNS. Keywords: Age; Cyclic GMP; LPS; Na,K-ATPase; iNOS. Copyright © 2015 Elsevier Inc. All rights reserved.
1.455459
m-a-p/FineFineWeb
Why do some people smell sweat The smell of sweat - the smell of sweat Everyone has a personal scent: the composition of sweat plays its part. The human odor is strongly influenced by the respective bacterial flora on the skin. Different fragrance components are created, depending on which bacterial strain breaks down the fresh glandular secretion. The smell of sweat or the olfactory fingerprint It is precisely this combination of microorganisms that varies from person to person. With a few exceptions, e.g. during puberty or with certain illnesses, it smells fresher Sweat not or at most slightly sour, in any case not unpleasant. The strong smell only arises when the bacteria on the skin break down the sweat into its individual components. It is primarily the long-chain fatty acids found in sweat that are broken down into, among other things, the pungent-smelling ants and butyric acid, which smells strongly of rancid butter (hence the name). Above all, the bacteria break down the fatty acids that are known as Part of sweat are included. The long-chain fatty acids are processed into shorter chains. This produces formic or butyric acid, among other things, which are essential for the typical smell of sweat are responsible. - Display - - Display - Microorganisms on the skin bacteria occur naturally on the entire surface of the skin. But they particularly like to settle in a humid and warm environment. These include the armpit area or the feet. Since a large number of sweat-producing glands can be found in these areas, odor can quickly develop under the armpits and on the feet. On hairy parts of the body there are also a large number of them Microorganismsthat promote the breakdown of sweat components. Therefore, in axillary hyperhidrosis, it is necessary to shave the hair under the armpits. Additional factors that make up the specific sweat and body odor are the pH value of the skin, possible diseases, hormones, various luxury foods and foods. Causes of the specific smell of sweat The smell of sweat is influenced by: - the respective bacterial strain on the skin, which breaks down sweat. - the PH value of the skin. - Hormones. During puberty it happens that even very fresh sweat smells unpleasant. - gender differences. The fragrance note of women and men smells slightly different from the ground up. - Diseases. Certain diseases such as diabetes or kidney or liver diseases can change the smell of sweat. - Luxury foods like alcohol, caffeine and drugs. The excretion of toxins (previously broken down in the liver or kidneys) via sweat secretion can change the consumer's scent. - food, for example garlic, onions or other spices noticeably increase the inherent odor. Smell of ammonia in sweat Sometimes the sweat smells like ammonia. This unpleasant smell of sweat can be a warning sign from the body. The smell of ammonia is particularly noticeable during training or sport. Under normal circumstances they burn Muscles during sports Carbohydrates and fats. However, the body can also fall back on amino acids: If the muscles use the amino acids as fuel, the nitrogen separates from the amino acid molecules and is then transported into the bloodstream. In the blood, the nitrogen is first converted into ammonia and later into urea. So if the sweat smells strongly of ammonia, the body signals: Help, mine Carbohydrate storage is empty! That is why many athletes eat a lot of carbohydrates before or after a competition: Pasta in particular is a popular source of carbohydrates. Sweat production is stimulated during sport or physical exertion. Sweat contains a multitude of different substances. This also includes proteins. bacteriaThe substances, which are mainly found in the armpit or other parts of the body, break down the substances. When bacteria break down proteins, they produce the unpleasant smell of sweat. Body odor and sweat However, it depends on many other factors how strong and what the sweat smells like. For example, various cosmetic products - such as a cream or perfume - can negatively affect sweat in connection with sweat, because the odor intensity is increased. - Display - - Display - Odor of sweat during puberty Sweat glands are already created in the newborn, but are still largely "at rest". Healthy babies and toddlers never give off unpleasant body odor. Only at the onset of sexual maturity, i.e. during puberty, do the sweat glands take up their full function. Only now do the teenagers begin to smell. In this phase it often happens that even very fresh sweat - due to hormonal processes - already smells strongly. Usually the problem resolves itself when the hormonal turbulence comes into balance. Who smells better? Women have the better nose: When it comes to smell, women are ahead. When it comes to sweating, in particular, the smell of sweat often persists. Researchers have now found out that women can specifically smell sweat. The men seem to have more trouble with this. Sensitive sense of smell Apparently women are better able to absorb an odor and are more sensitive to the smell of sweat than men. In a research study, both male and female test subjects had to smell small fragrance bottles. One after the other, 32 vials came under the nose of the respective test subjects. In addition to sweat, the bottles contained different fragrances that masked the smell of sweat. Attempt to deceive failed Nevertheless, the women were able to identify an average of just under 32 vials with a sweat odor. The result of the male test colleagues was far behind with around 13 hits. However, the researchers have not yet been able to clearly explain why women perceive the smell of sweat better. Evolution and Biology in Starting a Family Be presumed biological reasons: In the Partner choice Women prefer to "sniff" a man who smells different than they do themselves. The more different the gene pool, the better it is apparently later for the offspring. - Where is my life going - Is entrepreneurship overglorified? - Which Beatle had the worst solo career? - What challenges do single parents face? - Is high inflation good for debt? - Have you ever been treated like filth - Why is the Irish language dying - What is meant by a software developer - Iranians practice Muslims - How does Gaeilge Irish sound - Why does whole wheat taste so good - All caterpillars are butterflies - Why are beautiful girls bullied - Why was life easier ten years ago - Where are the US IMO participants now - What happens to old computers - Why do night clubs have dress codes - What does ghusl mean in Islam - What do libertarians think of compulsory vaccination - What happens when inequality affects a society - Hong Kong was independent from China - How to celebrate Deepavali Dewali - Can an XY woman get pregnant - What is drywall
2.294786
openbmb/Ultra-FineWeb
From Publishers Weekly The title of well-known science writer Clegg's newest is a bit of a teaser: as Clegg (A Brief History of Infinity ) himself admits: we may never have a definitive answer to the question, What came before the Big Bang? But there are lots of theories running around waving their hands to be noticed and get funding. Clegg devotes the first half of his book to the problems that face big bang theorists (when did the bang happen? How big was it? what caused it?). He then gives equal time to those who are looking to send that theory the way of phlogiston. Many alternative origin-of-the-universe theories postulate either that there have been cyclical universes—each ending in a Big Crunch, followed by another Big Bang, or that our universe really exists in a giant black hole,or that universes can bud off one another.Most astronomy and science fiction buffs will bl familiar with this material, but Clegg's relatively jargon-free style makes for a good introduction for general readers, even if it leaves them still wondering what did come before the big bang. (Aug.) Copyright © Reed Business Information, a division of Reed Elsevier Inc. All rights reserved. "Clegg follows the footsteps of Carl Sagan's Cosmos, Steven Hawking's A Brief History of Time and Timothy Ferris's Coming of Age in the Milky Way. He shares his predecessors' enthusiasm, eloquence and ability to explain complex ideas but provides a bonus by covering startling developments of the past decade. Anyone looking for an introduction to or a refresher course in cosmology need look no further." - Kirkus, Starred Review "Indeed, the existence of so many things, from dark matter to black holes to wormholes all has to be inferred. The Big Bang, too, is only provisional and seems to be waiting for a more graceful model to replace it. In Clegg's words, the Big Bang theory "has the feeling of something held together with a Band-Aid. Whether what came before our universe was another universe or nothing, or something else yet unconsidered, for now the most accurate answer might be: We just don't know." -Anthony Doerr Boston Globe, July 19
1.441793
m-a-p/FineFineWeb
End of preview. Expand in Data Studio

High Quality Text Dataset

A curated collection of English-language texts for AI training and research.

Sources

Each dataset was processed as follows:

  1. Split into approximately 2 000-token chunks using the LLaMA 3.1 tokenizer.
  2. Cleaned by normalizing spaces, punctuation, and characters, and replacing emails and phone numbers with placeholders.
  3. Scored using the agentlans/GIST-all-MiniLM-L6-v2-quality-v3 classifier:
    • Only chunks with a quality score greater than 1 were included.
  4. Removed exact duplicates.

After filtering, 100 000 chunks per source were included in the final dataset.

Clustering

Agglomerative clustering was applied using embeddings from the Snowflake/snowflake-arctic-embed-xs model at multiple cluster counts: 100, 200, 500, 1 000, 2 000, 5 000, 10 000, 20 000, 50 000, 100 000, and 200 000 clusters, enabling flexible dataset configurations.

Example Entry

{
  "text": "Dr. Louise Glew has been appointed the Global Lead Scientist for WWF's Global Science Team. Louise's research focuses on understanding the social and ecological impacts of conservation interventions [...]",
  "quality": 2.0699,
  "source": "openbmb/Ultra-FineWeb"
}

Limitations

  • Primarily focuses on academic, educational, and pedagogical content intended for a general audience.
  • May include outdated, unreliable, or controversial information (such as self-published material, pseudoscience, or conspiracy theories).
  • Quality scores evaluate syntax and tone, but do not guarantee factual accuracy.
  • Occasional repetition may occur (for example, dictionary entries or geographic distance calculations).
  • Entries might be interrupted mid-word or mid-sentence.

Licence

Provided under the Open Data Commons Attribution License (ODC-BY).

Downloads last month
52