text
stringlengths
0
3.53M
meta
dict
Man v. Food Season 5 Food lover, actor and restaurant business veteran Casey Webb is a new man and he is ready to taste the nation's most epic eats in the reboot of "Man v. Food." One of the most popular shows on Travel Channel, the series premieres on Monday, August 7 at 9:00 p.m. ET/PT with Webb as the lead man continuing the pursuit of gastronomic glory - and crisscrossing America to uncover tasty treats and tackle the country's iconic eating challenges.
{ "perplexity_score": 167.9, "pile_set_name": "Pile-CC" }
1 of 7 Thai-Style Kohlrabi Stir-Fry A close cousin of cabbage and kale, kohlrabi has a very distinct appearance—the large bulb (which looks like a root, but is actually a stem!) can be either green, white, or purple, and is crowned with spindly stalks that culminate in large, floppy leaves (it reminds us of the golden snitch from the Harry Potter movies). The leaves and bulb are edible—the stalks are pretty tough, so discard them or save them for the compost pile. This Thai-inspired stir-fry showcases both the leaves and bulb. To make it vegan-friendly, swap out the fish sauce for soy. To make it gluten-free, swap soy for tamari. Advertisement Advertisement 2 of 7 Kohlrabi Fritters If you’ve never tasted kohlrabi, this is the perfect recipe to start with! The kohlrabi bulb is starchy, so it grates into sturdy shreds that hold up well to pan-frying. A food processor makes this super easy, and you can even grate the kohlrabi in advance, because it doesn’t turn brown like potatoes. Paired with a sweet and tangy mixture of sour cream and applesauce, this low-carb riff on latkes makes a great party appetizer. 3 of 7 Kohlrabi and Sausage Skillet Call on your cast-iron skillet to whip up this one-dish dinner. Crunchy kohlrabi brings gut-friendly fiber to the table; lean turkey sausage delivers heart-healthy protein. If you’d like to tame down the heat and make this dish more kid friendly, pick up mild turkey sausage. Serve over your favorite mashed potatoes or quick-sauteed greens. Advertisement 4 of 7 Roasted Kohlrabi With Savory Garlic Sauce Upgrade your steak dinner game by adding this super-savory side. Don’t be scared of anchovy fillets; they’re a mega umami bomb that drenches these oven-tender kohlrabi wedges with rich flavor. When shopping for kohlrabi, choose bulbs that are firm and smooth; they’re the freshest. 5 of 7 Greek Stuffed Dolmades With Kohlrabi Slaw Sturdy kohlrabi leaves stand in for the traditional grape leaves in this riff on the classic beef-and-rice stuffed Greek appetizer—and use the rest to make a delicious side slaw. Although we love using brown rice whenever we can, it's important to use the quicker-cooking white rice here to retain moisture and keep the beef from overcooking. This process is a little time consuming for a weeknight, but it makes a fun weekend cooking project. Whip up the slaw while the dolmades are cooking so everything’s done on time. 6 of 7 Kohlrabi and Apple Quick Pickles Upgrade your pickle game with these crunchy and zesty fast-fix pickles. Great for topping tacos, stir fries, salads, or snazzing up an appetizer board, these crunchy pickles deliver a pop of flavor to everyday dishes. Don’t be alarmed by the amount of sugar in this recipe—just a small amount gets absorbed by the pickles. If you have a mandolin, use it to slice the kohlrabi—it gets the job done much faster than a sharp knife.
{ "perplexity_score": 522.2, "pile_set_name": "Pile-CC" }
Dell PowerEdge The Dell PowerEdge (PE) line is Dell's server computer product line. Most PowerEdge servers use the x86 architecture. The early exceptions to this, the PowerEdge 3250, PowerEdge 7150, and PowerEdge 7250, used Intel's Itanium processor, but Dell abandoned Itanium in 2005 after failing to find adoption in the marketplace. The partnership between Intel and Dell remained close, with Intel remaining the exclusive source of processors in Dell's servers until 2006. In May 2006 Dell announced that it also intended to develop servers using AMD Opteron processors. The first Opteron-based PowerEdge systems, the PowerEdge 6950 and the PowerEdge SC1435, appeared in October 2006. PowerEdge machines come configured as tower, rack-mounted, or blade servers. Dell uses a consistent chip-set across servers in the same generation regardless of packaging, allowing for a common set of drivers and system-images. Original equipment manufacturers (OEMs) and value-added resellers also offer solutions based on PowerEdge servers. Loaded with custom software and with minor cosmetic changes, Dell's servers form the underlying hardware in certain appliances from IronPort, Google, Exinda Networks, and Enterasys. In 2007 the PowerEdge line accounted for approximately 15% of Dell's overall revenue from computer-hardware sales. In subsequent years Dell made the transition from a pure hardware vendor to a solutions-provider and services company, as evidenced, for example, by the acquisition of Perot Systems and KACE Networks and the setup of a special global services department within Dell. PowerEdge RAID Controller Dell uses the name PowerEdge RAID Controller (PERC) for proprietary versions of its RAID computer storage controllers. The related software in the PERC Fault Management Suite offered facilities such as the Background Patrol read, which aims to fix bad sectors on online RAID disks running under some of the PERC controllers around 2006. These cards were equipped with hardware from LSI Corporation or Intel, 256 MBytes of memory (upgradeable on the 5/i to 512 MB), support up to 8x SATA 3.0 Gbit/s drives without the use of expanders. They had an optional Battery Backup Unit (BBU) to allow more flexible use of the memory during writes, enhancing performance in RAID5 and 6, and operate over the PCI Express interface. Chassis systems Although PowerEdge is mainly used to refer to servers there are a few systems where the term PowerEdge refers to systems of which servers are (just) a part. Examples of these usages are: PowerEdge M1000e - the Dell blade-server system where the complete system uses the term PowerEdge, and M1000e refers to the chassis and the complete combination of components in them. The individual non-server components have also their own name in their 'own' family such as PowerConnect M-switches or EqualLogic blade-SAN. PowerEdge VRTX - the converged system consisting of (up to) 4 PowerEdge M-blade servers, the built-in storage solution and the I/O networking module. Model naming convention Since the introduction of the generation 10 servers in 2007 Dell adopted a standardized method for naming their servers; the name of each server is represented by a letter followed by 3 digits. The letter indicates the type of server: R (for Rack-mountable) indicates a 19" rack-mountable server, M (for Modular) indicates a blade server, while T (for Tower) indicates a stand-alone server. This letter is then followed by 3 digits: The first digit refers to the number of CPU sockets in the system: 1 to 3 for one socket, 4 to 7 for two sockets, and 9 for four sockets. 8 can be either two or four sockets depending on generation and CPU maker The second digit refers to the generation: 0 for Generation 10, 1 for Generation 11, and so on. The third digit indicates the maker of the CPU: 0 for Intel or 5 for Advanced Micro Devices (AMD). For example: The Dell PowerEdge M610 was a two-socket server of the 11th generation using an Intel CPU while the R605 was a two-socket AMD-based rack-server of the 10th generation. Prior to the Generation 10 servers, the naming convention was as follows: First digit – Height of the server in rack units Second digit – Generation of server (up to 9th generation) Third digit – Server type (5 for rack server, 0 for tower server, although tower servers could be outfitted with a rack chassis) Fourth digit – Indicated whether blade or independent box (5 for blade, 0 for normal independent box) Example 1: PowerEdge 2650 ( 2 = 2U server, 6 = 6th generation, 5 = rack server, 0 = normal ) Example 2: PowerEdge 6950 ( 6 = 4U server, 9 = 9th generation, 5 = rack server, 0 = normal ) Example 3: PowerEdge 2800 ( 2 = [based on] 2U server 2850, 8 = 8th generation, 0 = tower server, 0 = normal ) Example 4: PowerEdge 1855 ( 1 = 1U server, 8 = 8th generation, 5 = rack server, 5 = blade ) Most servers had a tower equivalent. For example, the PowerEdge 2800 was the tower equivalent of the 2850. The naming applies to the tower version too, but the tower version will usually be between 5U and 6U. See also List of Dell PowerEdge Servers References External links Dell Server Documentation Using a PowerEdge tower on its side in a rack Review Dell PowerEdge R810 Review Dell PowerEdge R815 PowerEdge Category:Server hardware PowerEdge
{ "perplexity_score": 502.9, "pile_set_name": "Wikipedia (en)" }
Raman microscopy and X-ray diffraction, a combined study of fibrillin-rich microfibrillar elasticity. Fibrillin-rich microfibrils are essential elastic structures contained within the extracellular matrix of a wide variety of connective tissues. Microfibrils are characterized as beaded filamentous structures with a variable axial periodicity (average 56 nm in the untensioned state); however, the basis of their elasticity remains unknown. This study used a combination of small angle x-ray scattering and Raman microscopy to investigate further the packing of microfibrils within the intact tissue and to determine the role of molecular reorganization in the elasticity of these microfibrils. The application of relatively small strains produced no overall change in either molecular or macromolecular microfibrillar structure. In contrast, the application of larger tissue extensions (up to 150%) resulted in a markedly different structure, as observed by both Raman microscopy and small angle x-ray scattering. These changes occurred at different levels of architecture and are interpreted as ranging from alterations in peptide bond conformation to domain rearrangement. This study demonstrates the importance of molecular elasticity in the mechanical properties of fibrillin-rich microfibrils in the intact tissue.
{ "perplexity_score": 275.2, "pile_set_name": "PubMed Abstracts" }
Q: Crossfilter producing negative values with positive dataset when sorting data I am using crossfilter wrong but cannot spot where. I have a dataset which I am filtering. When I supply a sorting function to sort the data by day of the week, the result displays negative values. If I skip the sorting, everything works as it should. The data looks something like this dataEg=[{"attr1": "A", "date":" Thu Apr 12 2018 00:00:00 GMT+0100 (BST)", "attr2": "a", "attr3": 25.11, "dayOfWeek": "Thu"}, {"attr1": "B", "date":" Sun Apr 01 2018 00:00:00 GMT+0100 (BST)", "attr2": "b", "attr3": 6.67, "dayOfWeek": "Sun"}]; I use crossfilter to select by attribute var crossFilter = (function () { var filter = {}; filter.ndx = crossfilter(dataEg); filter.attr2Dim = filter.ndx.dimension(function (d) { return d.attr2; }); filter.dayOfWeekDim = filter.ndx.dimension(function (d) { return d.dayOfWeek; }); filter.attr1Dim = filter.ndx.dimension(function (d) { return d.attr1; }); filter.costPerDayOfWeek = filter.dayOfWeekDim.group().reduceSum(function (d) { return d.attr3; }); filter.costPerattr2 = filter.attr2Dim.group().reduceSum(function (d) { return d.attr3 }); filter.costPerattr1 = filter.attr1Dim.group().reduceSum(function (d) { return d.attr3 }); return filter; })(); When filtering for some atteribute crossFilter.attr1Dim.filter(function (d) { return d === "B"; }); everything works unless I sort the date by day first using this filter function DaySorter (keyLocator) { if (keyLocator === undefined) { keyLocator = function (item) { return item; }; } return function (a, b) { var order = { "Mon": 0, "Tue": 1, "Wed": 2, "Thu": 3, "Fri": 4, "Sat": 5, "Sun": 6 }; var aVal = order[keyLocator(a)]; var bVal = order[keyLocator(b)]; var comp = 0; if (aVal > bVal) { comp = 1; } else if (aVal < bVal) { comp = -1; } return comp; }; } However, I do not see where I am making a mistake. The filter seems to work correctly and follows the documentation. A minimal JSFiddle can be found here. A: Finally found the problem. I was sorting the data in the chart so that it is displayed in the order of the Day of Week. However, this somehow interfered with the interals of CrossFilter. Doing a deep copy of the data before sorting it in the chart solved the problem (here using JQuery). data =[]; $.extend(true, data, dataOrg);
{ "perplexity_score": 1836.4, "pile_set_name": "StackExchange" }
Hamstead Lock Hamstead Lock is a lock on the Kennet and Avon Canal, at Hamstead Marshall between Kintbury and Newbury, Berkshire, England. The lock has a rise/fall of 6 ft 5 in (1.96 m). It is a grade II listed building. References See also Locks on the Kennet and Avon Canal Category:Grade II listed buildings in Berkshire Category:Locks on the Kennet and Avon Canal Category:Locks of Berkshire Category:Grade II listed canals
{ "perplexity_score": 89.5, "pile_set_name": "Wikipedia (en)" }
Marko Klasinc Marko Klasinc (born 14 May 1951) is Slovenian chess problemist. He composed almost 200 chess problems, mostly heterodox and retrograde ones (12 included in FIDE Album). He has title FIDE solving master and international judge of FIDE for chess composition. As a good solver he represented Yugoslavia 1982 in Varna, where the team became World Champion solving chess problems. He is the president of Committee for Chess Compositions of Chess Federation of Slovenia. References Notes Bibliography Drinovec, Aleš (editor). Slovenski šah. Šahovska zveza Slovenije, Ljubljana 2002. External links Website PDB Server Category:1951 births Category:Living people Category:Chess composers Category:International Judges of Chess Compositions Category:Slovenian chess players
{ "perplexity_score": 77.1, "pile_set_name": "Wikipedia (en)" }
In a storage area network (SAN), remote computer storage devices such as disk arrays can be made accessible to host computers so that the storage devices appear as if they are locally attached to the host computer's operating system. SANs may be implemented using Small Computer System Interface (SCSI) storage devices, in which SCSI protocol entities perform input/output (I/O) operations (e.g., data reads and writes) and are exposed through a unique identifier such as a logical unit number (LUN) on a path. A given LUN typically corresponds to a logical volume, and may be represented within the host computer's operating system as a device. Interaction with a LUN is initiated by a SCSI initiator port on a host computer, which can issue various I/O request types to the LUN on a target data storage device. The description above is presented as a general overview of related art in this field and should not be construed as an admission that any of the information it contains constitutes prior art against the present patent application.
{ "perplexity_score": 150.2, "pile_set_name": "USPTO Backgrounds" }
/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ import com.adobe.test.Assert; // var SECTION = "RegExp"; // var VERSION = "as3"; // var TITLE = "https://bugzilla.mozilla.org/show_bug.cgi?id=550269"; // CVE-2008-0674: large number of characters with Unicode code points greater than 255 var utf8RegExp:String = "[^ABCDEFGHIJKLMNOPQRSTUVWXYZÀÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔÕÖØÙÚÛÜÝÞĀĂĄĆĈĊČĎĐĒĔĖĘĚĜĞĠĢĤĦĨĪĬĮİIJĴĶĹĻĽĿŁŃŅŇŊŌŎŐŒŔŖŘŚŜŞŠŢŤŦŨŪŬŮŰŲŴŶŸŹŻŽƁƂƄƆƇƉƊƋƎƏƐƑƓƔƖƗƘƜƝƟƠƢƤƦƧƩƬƮƯƱƲƳƵƷƸƼDŽLJNJǍǏǑǓǕǗǙǛǞǠǢǤǦǨǪǬǮDZǴǶǷǸǺǼǾȀȂȄȆȈȊȌȎȐȒȔȖȘȚȜȞȠȢȤȦȨȪȬȮȰȲȺȻȽȾɁΆΈΉΊΌΎΏΑΒΓΔΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΩΪΫϒϓϔϘϚϜϞϠϢϤϦϨϪϬϮϴϷϹϺϽϾϿЀЁЂЃЄЅІЇЈЉЊЋЌЍЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫЬЭЮЯѠѢѤѦѨѪѬѮѰѲѴѶѸѺѼѾҀҊҌҎҐҒҔҖҘҚҜҞҠҢҤҦҨҪҬҮҰҲҴҶҸҺҼҾӀӁӃӅӇӉӋӍӐӒӔӖӘӚӜӞӠӢӤӦӨӪӬӮӰӲӴӶӸԀԂԄԆԈԊԌԎԱԲԳԴԵԶԷԸԹԺԻԼԽԾԿՀՁՂՃՄՅՆՇՈՉՊՋՌՍՎՏՐՑՒՓՔՕՖႠႡႢႣႤႥႦႧႨႩႪႫႬႭႮႯႰႱႲႳႴႵႶႷႸႹႺႻႼႽႾႿჀჁჂჃჄჅḀḂḄḆḈḊḌḎḐḒḔḖḘḚḜḞḠḢḤḦḨḪḬḮḰḲḴḶḸḺḼḾṀṂṄṆṈṊṌṎṐṒṔṖṘṚṜṞṠṢṤṦṨṪṬṮṰṲṴṶṸṺṼṾẀẂẄẆẈẊẌẎẐẒẔẠẢẤẦẨẪẬẮẰẲẴẶẸẺẼẾỀỂỄỆỈỊỌỎỐỒỔỖỘỚỜỞỠỢỤỦỨỪỬỮỰỲỴỶỸἈἉἊἋἌἍἎἏἘἙἚἛἜἝἨἩἪἫἬἭἮἯἸἹἺἻἼἽἾἿὈὉὊὋὌὍὙὛὝὟὨὩὪὫὬὭὮὯᾸᾹᾺΆῈΈῊΉῘῙῚΊῨῩῪΎῬῸΌῺΏabcdefghijklmnopqrstuvwxyzªµºßàáâãäåæçèéêëìíîïðñòóôõöøùúûüýþÿāăąćĉċčďđēĕėęěĝğġģĥħĩīĭįıijĵķĸĺļľŀłńņňʼnŋōŏőœŕŗřśŝşšţťŧũūŭůűųŵŷźżžſƀƃƅƈƌƍƒƕƙƚƛƞơƣƥƨƪƫƭưƴƶƹƺƽƾƿdžljnjǎǐǒǔǖǘǚǜǝǟǡǣǥǧǩǫǭǯǰdzǵǹǻǽǿȁȃȅȇȉȋȍȏȑȓȕȗșțȝȟȡȣȥȧȩȫȭȯȱȳȴȵȶȷȸȹȼȿɀɐɑɒɓɔɕɖɗɘəɚɛɜɝɞɟɠɡɢɣɤɥɦɧɨɩɪɫɬɭɮɯɰɱɲɳɴɵɶɷɸɹɺɻɼɽɾɿʀʁʂʃʄʅʆʇʈʉʊʋʌʍʎʏʐʑʒʓʔʕʖʗʘʙʚʛʜʝʞʟʠʡʢʣʤʥʦʧʨʩʪʫʬʭʮʯΐάέήίΰαβγδεζηθικλμνξοπρςστυφχψωϊϋόύώϐϑϕϖϗϙϛϝϟϡϣϥϧϩϫϭϯϰϱϲϳϵϸϻϼабвгдежзийклмнопрстуфхцчшщъыьэюяѐёђѓєѕіїјљњћќѝўџѡѣѥѧѩѫѭѯѱѳѵѷѹѻѽѿҁҋҍҏґғҕҗҙқҝҟҡңҥҧҩҫҭүұҳҵҷҹһҽҿӂӄӆӈӊӌӎӑӓӕӗәӛӝӟӡӣӥӧөӫӭӯӱӳӵӷӹԁԃԅԇԉԋԍԏաբգդեզէըթժիլխծկհձղճմյնշոչպջռսվտրցւփքօֆևᴀᴁᴂᴃᴄᴅᴆᴇᴈᴉᴊᴋᴌᴍᴎᴏᴐᴑᴒᴓᴔᴕᴖᴗᴘᴙᴚᴛᴜᴝᴞᴟᴠᴡᴢᴣᴤᴥᴦᴧᴨᴩᴪᴫᵢᵣᵤᵥᵦᵧᵨᵩᵪᵫᵬᵭᵮᵯᵰᵱᵲᵳᵴᵵᵶᵷᵹᵺᵻᵼᵽᵾᵿᶀᶁᶂᶃᶄᶅᶆᶇᶈᶉᶊᶋᶌᶍᶎᶏᶐᶑᶒᶓᶔᶕᶖᶗᶘᶙᶚḁḃḅḇḉḋḍḏḑḓḕḗḙḛḝḟḡḣḥḧḩḫḭḯḱḳḵḷḹḻḽḿṁṃṅṇṉṋṍṏṑṓṕṗṙṛṝṟṡṣṥṧṩṫṭṯṱṳṵṷṹṻṽṿẁẃẅẇẉẋẍẏẑẓẕẖẗẘẙẚẛạảấầẩẫậắằẳẵặẹẻẽếềểễệỉịọỏốồổỗộớờởỡợụủứừửữựỳỵỷỹἀἁἂἃἄἅἆἇἐἑἒἓἔἕἠἡἢἣἤἥἦἧἰἱἲἳἴἵἶἷὀὁὂὃὄὅὐὑὒὓὔὕὖὗὠὡὢὣὤὥὦὧὰάὲέὴήὶίὸόὺύὼώᾀᾁᾂᾃᾄᾅᾆᾇᾐᾑᾒᾓᾔᾕᾖᾗᾠᾡᾢᾣᾤᾥᾦᾧᾰᾱᾲᾳᾴᾶᾷιῂῃῄῆῇῐῑῒΐῖῗῠῡῢΰῤῥῦῧῲῳῴῶῷⲁⲃⲅⲇⲉⲋⲍⲏⲑⲓⲕⲗⲙⲛⲝⲟⲡⲣⲥⲧⲩⲫⲭⲯⲱⲳⲵⲷⲹⲻⲽⲿⳁⳃⳅⳇⳉⳋⳍⳏⳑⳓⳕⳗⳙⳛⳝⳟⳡⳣⳤⴀⴁⴂⴃⴄⴅⴆⴇⴈⴉⴊⴋⴌⴍⴎⴏⴐⴑⴒⴓⴔⴕⴖⴗⴘⴙⴚⴛⴜⴝⴞⴟⴠⴡⴢⴣⴤⴥfffiflffifflſtstﬓﬔﬕﬖﬗ\d-_^]"; var evilRegExp:RegExp = new RegExp(utf8RegExp); evilRegExp.exec("Hello World"); // If testcase runs then we are good, previously this would crash Assert.expectEq( "CVE-2008-0674", true, true ); // CVE-2008-2371 begins with an option and contains multiple branches. var optionsRegExp:String = "(?i)[\xc3\xa9\xc3\xbd]|[\xc3\xa9\xc3\xbdA]"; var evilRegExp2:RegExp = new RegExp(optionsRegExp); evilRegExp2.exec("Hello World"); // If testcase runs then we are good, previously this would crash Assert.expectEq( "CVE-2008-2371", true, true );
{ "perplexity_score": 41589.4, "pile_set_name": "Github" }
The influence of soil characteristics on the extractability of Cd, Pb and Zn in upland and moorland soils. A study was undertaken to investigate the feasibility of using existing data sets of total soil metal concentrations and soil parameters, such as pH, to predict available metal concentrations on a regional or national basis. The attraction of such an approach is that it would provide valuable data for initiatives requiring information on the availability and mobility of metals in soils without the need for costly soil sampling and analysis. Ninety-seven topsoil and subsoil samples were collected from 6 soil series in a catenary sequence in north Wales to provide data for the development of an empirical model. These were analysed for total, 0.01 M CaCl2-extractable and porewater metal concentrations and for a range of soil properties including pH, solid and dissolved organic matter and cation exchange capacity. Regression analysis showed that, of the soil parameters measured, pH was the most important predictor variable for the estimation of CaCl2-extractable Cd, Pb and Zn. pH accounted for up to 86% of the variance in the proportion of 'total' metals which were extracted by CaCl2, a reagent that is commonly used to estimate plant uptake of elements. However, the relationships recorded between soil parameters and Kd (total metal/porewater metal) were much weaker, indicating that porewater metal concentrations can less readily be predicted from total soil metal concentrations and soil properties.
{ "perplexity_score": 397.7, "pile_set_name": "PubMed Abstracts" }
/*------------------------------------------------------------------------- * * buffile.c * Management of large buffered temporary files. * * Portions Copyright (c) 1996-2020, PostgreSQL Global Development Group * Portions Copyright (c) 1994, Regents of the University of California * * IDENTIFICATION * src/backend/storage/file/buffile.c * * NOTES: * * BufFiles provide a very incomplete emulation of stdio atop virtual Files * (as managed by fd.c). Currently, we only support the buffered-I/O * aspect of stdio: a read or write of the low-level File occurs only * when the buffer is filled or emptied. This is an even bigger win * for virtual Files than for ordinary kernel files, since reducing the * frequency with which a virtual File is touched reduces "thrashing" * of opening/closing file descriptors. * * Note that BufFile structs are allocated with palloc(), and therefore * will go away automatically at query/transaction end. Since the underlying * virtual Files are made with OpenTemporaryFile, all resources for * the file are certain to be cleaned up even if processing is aborted * by ereport(ERROR). The data structures required are made in the * palloc context that was current when the BufFile was created, and * any external resources such as temp files are owned by the ResourceOwner * that was current at that time. * * BufFile also supports temporary files that exceed the OS file size limit * (by opening multiple fd.c temporary files). This is an essential feature * for sorts and hashjoins on large amounts of data. * * BufFile supports temporary files that can be shared with other backends, as * infrastructure for parallel execution. Such files need to be created as a * member of a SharedFileSet that all participants are attached to. * * BufFile also supports temporary files that can be used by the single backend * when the corresponding files need to be survived across the transaction and * need to be opened and closed multiple times. Such files need to be created * as a member of a SharedFileSet. *------------------------------------------------------------------------- */ #include "postgres.h" #include "commands/tablespace.h" #include "executor/instrument.h" #include "miscadmin.h" #include "pgstat.h" #include "storage/buf_internals.h" #include "storage/buffile.h" #include "storage/fd.h" #include "utils/resowner.h" /* * We break BufFiles into gigabyte-sized segments, regardless of RELSEG_SIZE. * The reason is that we'd like large BufFiles to be spread across multiple * tablespaces when available. */ #define MAX_PHYSICAL_FILESIZE 0x40000000 #define BUFFILE_SEG_SIZE (MAX_PHYSICAL_FILESIZE / BLCKSZ) /* * This data structure represents a buffered file that consists of one or * more physical files (each accessed through a virtual file descriptor * managed by fd.c). */ struct BufFile { int numFiles; /* number of physical files in set */ /* all files except the last have length exactly MAX_PHYSICAL_FILESIZE */ File *files; /* palloc'd array with numFiles entries */ bool isInterXact; /* keep open over transactions? */ bool dirty; /* does buffer need to be written? */ bool readOnly; /* has the file been set to read only? */ SharedFileSet *fileset; /* space for segment files if shared */ const char *name; /* name of this BufFile if shared */ /* * resowner is the ResourceOwner to use for underlying temp files. (We * don't need to remember the memory context we're using explicitly, * because after creation we only repalloc our arrays larger.) */ ResourceOwner resowner; /* * "current pos" is position of start of buffer within the logical file. * Position as seen by user of BufFile is (curFile, curOffset + pos). */ int curFile; /* file index (0..n) part of current pos */ off_t curOffset; /* offset part of current pos */ int pos; /* next read/write position in buffer */ int nbytes; /* total # of valid bytes in buffer */ PGAlignedBlock buffer; }; static BufFile *makeBufFileCommon(int nfiles); static BufFile *makeBufFile(File firstfile); static void extendBufFile(BufFile *file); static void BufFileLoadBuffer(BufFile *file); static void BufFileDumpBuffer(BufFile *file); static void BufFileFlush(BufFile *file); static File MakeNewSharedSegment(BufFile *file, int segment); /* * Create BufFile and perform the common initialization. */ static BufFile * makeBufFileCommon(int nfiles) { BufFile *file = (BufFile *) palloc(sizeof(BufFile)); file->numFiles = nfiles; file->isInterXact = false; file->dirty = false; file->resowner = CurrentResourceOwner; file->curFile = 0; file->curOffset = 0L; file->pos = 0; file->nbytes = 0; return file; } /* * Create a BufFile given the first underlying physical file. * NOTE: caller must set isInterXact if appropriate. */ static BufFile * makeBufFile(File firstfile) { BufFile *file = makeBufFileCommon(1); file->files = (File *) palloc(sizeof(File)); file->files[0] = firstfile; file->readOnly = false; file->fileset = NULL; file->name = NULL; return file; } /* * Add another component temp file. */ static void extendBufFile(BufFile *file) { File pfile; ResourceOwner oldowner; /* Be sure to associate the file with the BufFile's resource owner */ oldowner = CurrentResourceOwner; CurrentResourceOwner = file->resowner; if (file->fileset == NULL) pfile = OpenTemporaryFile(file->isInterXact); else pfile = MakeNewSharedSegment(file, file->numFiles); Assert(pfile >= 0); CurrentResourceOwner = oldowner; file->files = (File *) repalloc(file->files, (file->numFiles + 1) * sizeof(File)); file->files[file->numFiles] = pfile; file->numFiles++; } /* * Create a BufFile for a new temporary file (which will expand to become * multiple temporary files if more than MAX_PHYSICAL_FILESIZE bytes are * written to it). * * If interXact is true, the temp file will not be automatically deleted * at end of transaction. * * Note: if interXact is true, the caller had better be calling us in a * memory context, and with a resource owner, that will survive across * transaction boundaries. */ BufFile * BufFileCreateTemp(bool interXact) { BufFile *file; File pfile; /* * Ensure that temp tablespaces are set up for OpenTemporaryFile to use. * Possibly the caller will have done this already, but it seems useful to * double-check here. Failure to do this at all would result in the temp * files always getting placed in the default tablespace, which is a * pretty hard-to-detect bug. Callers may prefer to do it earlier if they * want to be sure that any required catalog access is done in some other * resource context. */ PrepareTempTablespaces(); pfile = OpenTemporaryFile(interXact); Assert(pfile >= 0); file = makeBufFile(pfile); file->isInterXact = interXact; return file; } /* * Build the name for a given segment of a given BufFile. */ static void SharedSegmentName(char *name, const char *buffile_name, int segment) { snprintf(name, MAXPGPATH, "%s.%d", buffile_name, segment); } /* * Create a new segment file backing a shared BufFile. */ static File MakeNewSharedSegment(BufFile *buffile, int segment) { char name[MAXPGPATH]; File file; /* * It is possible that there are files left over from before a crash * restart with the same name. In order for BufFileOpenShared() not to * get confused about how many segments there are, we'll unlink the next * segment number if it already exists. */ SharedSegmentName(name, buffile->name, segment + 1); SharedFileSetDelete(buffile->fileset, name, true); /* Create the new segment. */ SharedSegmentName(name, buffile->name, segment); file = SharedFileSetCreate(buffile->fileset, name); /* SharedFileSetCreate would've errored out */ Assert(file > 0); return file; } /* * Create a BufFile that can be discovered and opened read-only by other * backends that are attached to the same SharedFileSet using the same name. * * The naming scheme for shared BufFiles is left up to the calling code. The * name will appear as part of one or more filenames on disk, and might * provide clues to administrators about which subsystem is generating * temporary file data. Since each SharedFileSet object is backed by one or * more uniquely named temporary directory, names don't conflict with * unrelated SharedFileSet objects. */ BufFile * BufFileCreateShared(SharedFileSet *fileset, const char *name) { BufFile *file; file = makeBufFileCommon(1); file->fileset = fileset; file->name = pstrdup(name); file->files = (File *) palloc(sizeof(File)); file->files[0] = MakeNewSharedSegment(file, 0); file->readOnly = false; return file; } /* * Open a file that was previously created in another backend (or this one) * with BufFileCreateShared in the same SharedFileSet using the same name. * The backend that created the file must have called BufFileClose() or * BufFileExportShared() to make sure that it is ready to be opened by other * backends and render it read-only. */ BufFile * BufFileOpenShared(SharedFileSet *fileset, const char *name, int mode) { BufFile *file; char segment_name[MAXPGPATH]; Size capacity = 16; File *files; int nfiles = 0; files = palloc(sizeof(File) * capacity); /* * We don't know how many segments there are, so we'll probe the * filesystem to find out. */ for (;;) { /* See if we need to expand our file segment array. */ if (nfiles + 1 > capacity) { capacity *= 2; files = repalloc(files, sizeof(File) * capacity); } /* Try to load a segment. */ SharedSegmentName(segment_name, name, nfiles); files[nfiles] = SharedFileSetOpen(fileset, segment_name, mode); if (files[nfiles] <= 0) break; ++nfiles; CHECK_FOR_INTERRUPTS(); } /* * If we didn't find any files at all, then no BufFile exists with this * name. */ if (nfiles == 0) ereport(ERROR, (errcode_for_file_access(), errmsg("could not open temporary file \"%s\" from BufFile \"%s\": %m", segment_name, name))); file = makeBufFileCommon(nfiles); file->files = files; file->readOnly = (mode == O_RDONLY) ? true : false; file->fileset = fileset; file->name = pstrdup(name); return file; } /* * Delete a BufFile that was created by BufFileCreateShared in the given * SharedFileSet using the given name. * * It is not necessary to delete files explicitly with this function. It is * provided only as a way to delete files proactively, rather than waiting for * the SharedFileSet to be cleaned up. * * Only one backend should attempt to delete a given name, and should know * that it exists and has been exported or closed. */ void BufFileDeleteShared(SharedFileSet *fileset, const char *name) { char segment_name[MAXPGPATH]; int segment = 0; bool found = false; /* * We don't know how many segments the file has. We'll keep deleting * until we run out. If we don't manage to find even an initial segment, * raise an error. */ for (;;) { SharedSegmentName(segment_name, name, segment); if (!SharedFileSetDelete(fileset, segment_name, true)) break; found = true; ++segment; CHECK_FOR_INTERRUPTS(); } if (!found) elog(ERROR, "could not delete unknown shared BufFile \"%s\"", name); } /* * BufFileExportShared --- flush and make read-only, in preparation for sharing. */ void BufFileExportShared(BufFile *file) { /* Must be a file belonging to a SharedFileSet. */ Assert(file->fileset != NULL); /* It's probably a bug if someone calls this twice. */ Assert(!file->readOnly); BufFileFlush(file); file->readOnly = true; } /* * Close a BufFile * * Like fclose(), this also implicitly FileCloses the underlying File. */ void BufFileClose(BufFile *file) { int i; /* flush any unwritten data */ BufFileFlush(file); /* close and delete the underlying file(s) */ for (i = 0; i < file->numFiles; i++) FileClose(file->files[i]); /* release the buffer space */ pfree(file->files); pfree(file); } /* * BufFileLoadBuffer * * Load some data into buffer, if possible, starting from curOffset. * At call, must have dirty = false, pos and nbytes = 0. * On exit, nbytes is number of bytes loaded. */ static void BufFileLoadBuffer(BufFile *file) { File thisfile; /* * Advance to next component file if necessary and possible. */ if (file->curOffset >= MAX_PHYSICAL_FILESIZE && file->curFile + 1 < file->numFiles) { file->curFile++; file->curOffset = 0L; } /* * Read whatever we can get, up to a full bufferload. */ thisfile = file->files[file->curFile]; file->nbytes = FileRead(thisfile, file->buffer.data, sizeof(file->buffer), file->curOffset, WAIT_EVENT_BUFFILE_READ); if (file->nbytes < 0) { file->nbytes = 0; ereport(ERROR, (errcode_for_file_access(), errmsg("could not read file \"%s\": %m", FilePathName(thisfile)))); } /* we choose not to advance curOffset here */ if (file->nbytes > 0) pgBufferUsage.temp_blks_read++; } /* * BufFileDumpBuffer * * Dump buffer contents starting at curOffset. * At call, should have dirty = true, nbytes > 0. * On exit, dirty is cleared if successful write, and curOffset is advanced. */ static void BufFileDumpBuffer(BufFile *file) { int wpos = 0; int bytestowrite; File thisfile; /* * Unlike BufFileLoadBuffer, we must dump the whole buffer even if it * crosses a component-file boundary; so we need a loop. */ while (wpos < file->nbytes) { off_t availbytes; /* * Advance to next component file if necessary and possible. */ if (file->curOffset >= MAX_PHYSICAL_FILESIZE) { while (file->curFile + 1 >= file->numFiles) extendBufFile(file); file->curFile++; file->curOffset = 0L; } /* * Determine how much we need to write into this file. */ bytestowrite = file->nbytes - wpos; availbytes = MAX_PHYSICAL_FILESIZE - file->curOffset; if ((off_t) bytestowrite > availbytes) bytestowrite = (int) availbytes; thisfile = file->files[file->curFile]; bytestowrite = FileWrite(thisfile, file->buffer.data + wpos, bytestowrite, file->curOffset, WAIT_EVENT_BUFFILE_WRITE); if (bytestowrite <= 0) ereport(ERROR, (errcode_for_file_access(), errmsg("could not write to file \"%s\": %m", FilePathName(thisfile)))); file->curOffset += bytestowrite; wpos += bytestowrite; pgBufferUsage.temp_blks_written++; } file->dirty = false; /* * At this point, curOffset has been advanced to the end of the buffer, * ie, its original value + nbytes. We need to make it point to the * logical file position, ie, original value + pos, in case that is less * (as could happen due to a small backwards seek in a dirty buffer!) */ file->curOffset -= (file->nbytes - file->pos); if (file->curOffset < 0) /* handle possible segment crossing */ { file->curFile--; Assert(file->curFile >= 0); file->curOffset += MAX_PHYSICAL_FILESIZE; } /* * Now we can set the buffer empty without changing the logical position */ file->pos = 0; file->nbytes = 0; } /* * BufFileRead * * Like fread() except we assume 1-byte element size and report I/O errors via * ereport(). */ size_t BufFileRead(BufFile *file, void *ptr, size_t size) { size_t nread = 0; size_t nthistime; BufFileFlush(file); while (size > 0) { if (file->pos >= file->nbytes) { /* Try to load more data into buffer. */ file->curOffset += file->pos; file->pos = 0; file->nbytes = 0; BufFileLoadBuffer(file); if (file->nbytes <= 0) break; /* no more data available */ } nthistime = file->nbytes - file->pos; if (nthistime > size) nthistime = size; Assert(nthistime > 0); memcpy(ptr, file->buffer.data + file->pos, nthistime); file->pos += nthistime; ptr = (void *) ((char *) ptr + nthistime); size -= nthistime; nread += nthistime; } return nread; } /* * BufFileWrite * * Like fwrite() except we assume 1-byte element size and report errors via * ereport(). */ void BufFileWrite(BufFile *file, void *ptr, size_t size) { size_t nthistime; Assert(!file->readOnly); while (size > 0) { if (file->pos >= BLCKSZ) { /* Buffer full, dump it out */ if (file->dirty) BufFileDumpBuffer(file); else { /* Hmm, went directly from reading to writing? */ file->curOffset += file->pos; file->pos = 0; file->nbytes = 0; } } nthistime = BLCKSZ - file->pos; if (nthistime > size) nthistime = size; Assert(nthistime > 0); memcpy(file->buffer.data + file->pos, ptr, nthistime); file->dirty = true; file->pos += nthistime; if (file->nbytes < file->pos) file->nbytes = file->pos; ptr = (void *) ((char *) ptr + nthistime); size -= nthistime; } } /* * BufFileFlush * * Like fflush(), except that I/O errors are reported with ereport(). */ static void BufFileFlush(BufFile *file) { if (file->dirty) BufFileDumpBuffer(file); Assert(!file->dirty); } /* * BufFileSeek * * Like fseek(), except that target position needs two values in order to * work when logical filesize exceeds maximum value representable by off_t. * We do not support relative seeks across more than that, however. * I/O errors are reported by ereport(). * * Result is 0 if OK, EOF if not. Logical position is not moved if an * impossible seek is attempted. */ int BufFileSeek(BufFile *file, int fileno, off_t offset, int whence) { int newFile; off_t newOffset; switch (whence) { case SEEK_SET: if (fileno < 0) return EOF; newFile = fileno; newOffset = offset; break; case SEEK_CUR: /* * Relative seek considers only the signed offset, ignoring * fileno. Note that large offsets (> 1 GB) risk overflow in this * add, unless we have 64-bit off_t. */ newFile = file->curFile; newOffset = (file->curOffset + file->pos) + offset; break; case SEEK_END: /* * The file size of the last file gives us the end offset of that * file. */ newFile = file->numFiles - 1; newOffset = FileSize(file->files[file->numFiles - 1]); if (newOffset < 0) ereport(ERROR, (errcode_for_file_access(), errmsg("could not determine size of temporary file \"%s\" from BufFile \"%s\": %m", FilePathName(file->files[file->numFiles - 1]), file->name))); break; default: elog(ERROR, "invalid whence: %d", whence); return EOF; } while (newOffset < 0) { if (--newFile < 0) return EOF; newOffset += MAX_PHYSICAL_FILESIZE; } if (newFile == file->curFile && newOffset >= file->curOffset && newOffset <= file->curOffset + file->nbytes) { /* * Seek is to a point within existing buffer; we can just adjust * pos-within-buffer, without flushing buffer. Note this is OK * whether reading or writing, but buffer remains dirty if we were * writing. */ file->pos = (int) (newOffset - file->curOffset); return 0; } /* Otherwise, must reposition buffer, so flush any dirty data */ BufFileFlush(file); /* * At this point and no sooner, check for seek past last segment. The * above flush could have created a new segment, so checking sooner would * not work (at least not with this code). */ /* convert seek to "start of next seg" to "end of last seg" */ if (newFile == file->numFiles && newOffset == 0) { newFile--; newOffset = MAX_PHYSICAL_FILESIZE; } while (newOffset > MAX_PHYSICAL_FILESIZE) { if (++newFile >= file->numFiles) return EOF; newOffset -= MAX_PHYSICAL_FILESIZE; } if (newFile >= file->numFiles) return EOF; /* Seek is OK! */ file->curFile = newFile; file->curOffset = newOffset; file->pos = 0; file->nbytes = 0; return 0; } void BufFileTell(BufFile *file, int *fileno, off_t *offset) { *fileno = file->curFile; *offset = file->curOffset + file->pos; } /* * BufFileSeekBlock --- block-oriented seek * * Performs absolute seek to the start of the n'th BLCKSZ-sized block of * the file. Note that users of this interface will fail if their files * exceed BLCKSZ * LONG_MAX bytes, but that is quite a lot; we don't work * with tables bigger than that, either... * * Result is 0 if OK, EOF if not. Logical position is not moved if an * impossible seek is attempted. */ int BufFileSeekBlock(BufFile *file, long blknum) { return BufFileSeek(file, (int) (blknum / BUFFILE_SEG_SIZE), (off_t) (blknum % BUFFILE_SEG_SIZE) * BLCKSZ, SEEK_SET); } #ifdef NOT_USED /* * BufFileTellBlock --- block-oriented tell * * Any fractional part of a block in the current seek position is ignored. */ long BufFileTellBlock(BufFile *file) { long blknum; blknum = (file->curOffset + file->pos) / BLCKSZ; blknum += file->curFile * BUFFILE_SEG_SIZE; return blknum; } #endif /* * Return the current shared BufFile size. * * Counts any holes left behind by BufFileAppend as part of the size. * ereport()s on failure. */ int64 BufFileSize(BufFile *file) { int64 lastFileSize; Assert(file->fileset != NULL); /* Get the size of the last physical file. */ lastFileSize = FileSize(file->files[file->numFiles - 1]); if (lastFileSize < 0) ereport(ERROR, (errcode_for_file_access(), errmsg("could not determine size of temporary file \"%s\" from BufFile \"%s\": %m", FilePathName(file->files[file->numFiles - 1]), file->name))); return ((file->numFiles - 1) * (int64) MAX_PHYSICAL_FILESIZE) + lastFileSize; } /* * Append the contents of source file (managed within shared fileset) to * end of target file (managed within same shared fileset). * * Note that operation subsumes ownership of underlying resources from * "source". Caller should never call BufFileClose against source having * called here first. Resource owners for source and target must match, * too. * * This operation works by manipulating lists of segment files, so the * file content is always appended at a MAX_PHYSICAL_FILESIZE-aligned * boundary, typically creating empty holes before the boundary. These * areas do not contain any interesting data, and cannot be read from by * caller. * * Returns the block number within target where the contents of source * begins. Caller should apply this as an offset when working off block * positions that are in terms of the original BufFile space. */ long BufFileAppend(BufFile *target, BufFile *source) { long startBlock = target->numFiles * BUFFILE_SEG_SIZE; int newNumFiles = target->numFiles + source->numFiles; int i; Assert(target->fileset != NULL); Assert(source->readOnly); Assert(!source->dirty); Assert(source->fileset != NULL); if (target->resowner != source->resowner) elog(ERROR, "could not append BufFile with non-matching resource owner"); target->files = (File *) repalloc(target->files, sizeof(File) * newNumFiles); for (i = target->numFiles; i < newNumFiles; i++) target->files[i] = source->files[i - target->numFiles]; target->numFiles = newNumFiles; return startBlock; } /* * Truncate a BufFile created by BufFileCreateShared up to the given fileno and * the offset. */ void BufFileTruncateShared(BufFile *file, int fileno, off_t offset) { int numFiles = file->numFiles; int newFile = fileno; off_t newOffset = file->curOffset; char segment_name[MAXPGPATH]; int i; /* * Loop over all the files up to the given fileno and remove the files * that are greater than the fileno and truncate the given file up to the * offset. Note that we also remove the given fileno if the offset is 0 * provided it is not the first file in which we truncate it. */ for (i = file->numFiles - 1; i >= fileno; i--) { if ((i != fileno || offset == 0) && i != 0) { SharedSegmentName(segment_name, file->name, i); FileClose(file->files[i]); if (!SharedFileSetDelete(file->fileset, segment_name, true)) ereport(ERROR, (errcode_for_file_access(), errmsg("could not delete shared fileset \"%s\": %m", segment_name))); numFiles--; newOffset = MAX_PHYSICAL_FILESIZE; /* * This is required to indicate that we have deleted the given * fileno. */ if (i == fileno) newFile--; } else { if (FileTruncate(file->files[i], offset, WAIT_EVENT_BUFFILE_TRUNCATE) < 0) ereport(ERROR, (errcode_for_file_access(), errmsg("could not truncate file \"%s\": %m", FilePathName(file->files[i])))); newOffset = offset; } } file->numFiles = numFiles; /* * If the truncate point is within existing buffer then we can just adjust * pos within buffer. */ if (newFile == file->curFile && newOffset >= file->curOffset && newOffset <= file->curOffset + file->nbytes) { /* No need to reset the current pos if the new pos is greater. */ if (newOffset <= file->curOffset + file->pos) file->pos = (int) (newOffset - file->curOffset); /* Adjust the nbytes for the current buffer. */ file->nbytes = (int) (newOffset - file->curOffset); } else if (newFile == file->curFile && newOffset < file->curOffset) { /* * The truncate point is within the existing file but prior to the * current position, so we can forget the current buffer and reset the * current position. */ file->curOffset = newOffset; file->pos = 0; file->nbytes = 0; } else if (newFile < file->curFile) { /* * The truncate point is prior to the current file, so need to reset * the current position accordingly. */ file->curFile = newFile; file->curOffset = newOffset; file->pos = 0; file->nbytes = 0; } /* Nothing to do, if the truncate point is beyond current file. */ }
{ "perplexity_score": 2486.1, "pile_set_name": "Github" }
Pages Tuesday, February 11, 2014 Pismo Beach, PCH2 I awoke to a beautiful ocean sky resting peacefully atop a calm ocean, the world still for a moment. I stepped out of my car to stretch and take in the beauty. The waves gent ally crashed into the rocks below, seagulls sat perched on the concrete barrier, awaiting the tide to recede so they could dig up their next meal. I sat on the hood of my car and let the cold ocean breeze waft over my body as the sun slowly moved along it’s daily trek. The view from where I slept. It was still early when I hit the road, but traffic was already slugging along as I reached the outskirts of Santa Barbara. The town was still yawning as I drove thru downtown, shopkeepers were casually opening up for the day, as bikers sped along to work. I nestled into a cafe and had breakfast, watching as the empty diner filled up with morning patrons and then emptied again. I had planned on spending the day in Santa Barbara, but the city, which I had been to multiple times before, seemed dull so I headed up the coast, back along the Pacific Coast Highway. For no particular reason I choose Pismo Beach as my next stop, about a two hour drive to the north. Once again the PCH turned inland, but this time instead of being surrounded by small towns, I was engulfed in a mountainous nothingness. Farmland stretched from the side of the highway to the foot of the mountains, the fresh vegetables adding a pleasant aroma to the cooler mountain air. The temperature had dropped 15 degrees from the coast to this inland valley, an amazing change for such an insignificant distance. The landscape remained unchanged for miles, until eventually the road turned back west and the Ocean laid in the distance, beckoning me back to her shores. It was only midday when I reach Pismo Beach, a quaint beach town built along a sandy coastline, the economy obviously based on tourism. I continued on through town, having seen a sign for a place called Dinosaur Cave Park. Any park with the word Dinosaur in the title instantly has my attention and I excitedly cruised through town, confused as to what the coast of California could possibly have to do with dinosaurs. The PCH meanders through Pismo Beach and it’s sister communities, the roadside a row of specialty shops and restaurants catering to the tourist who frequent the city. Pismo was filled with tourists, which was a strange change from my weeks on the road, where I had been all but alone. The masses of RVs struck me, but I just attributed it to the beautiful weather and continued on. Then I came to a bend in the road and I realized why everyone was here. Cars were parked along the side of the highway, people running across the highway with cameras. the sky was covered with the fluttering of gentle wings. A kaleidoscope of butterflies drifted back and forth from one tree to another, searching for a mate. Thousands of orange and black monarchs flew blissfully in the warm summer sun. This was part of the famed Monarch Butterfly Migration, and according to a sign the grove at Pismo Grove this spot was home to the largest wintering population of Monarchs. The tree branches were covered, clusters of butterflies looking like leaves hanging onto the branches. Overhead the sky was filled with a ballet of delicate wings. I stood in awe of the massive display around me, couples of butterflies fell to the ground as the male tried to convince the female of his worth. If and when she excepted the male would hoist her up, carrying her high into the trees, above the largest clusters and would consummate the agreement. I had read that the butterfly migration was this time of year, but in the masses of information I had stuffed into my mind I had forgotten, letting it be another pleasant surprise of life on the road. I continued on down the road to Dinosaur Cave Park, only to discover it was simply a bluff side park. The reason for the name is that it had in the mid 20th century served as a tourist attraction, where the owner had built a dinosaur that served as the entrance to the cave. The cave collapsed in the 1970’s and the dinosaur burned down at some point, but the park’s legacy lives on in the name. The view from the park was amazing, seals laid in the sun on rocky outcrops as sea otters swam around in beds of seaweed, hunting and playing around. I walked down to the beach where tidal pools, filled with stagnant sea water in the low tide, housed an array of snails, crabs and giant sea slugs. The waves cashed against rocks in the small cove, spraying the beach. I sat on a large rock and watched pelicans hunting in the calmer waters away from shore. It was magnificently warm, the sun cascading on the beach causing the fragments of shells, the only thing left by the group of shell hunting ladies who combed the sands, to glisten on the beach. A couple of men sat in the shade, casting their lines into the surf hoping to snag a fish. Above on the top of the bluffs, families snapped pictures with the coastline behind them. I was getting hungry and decided to head back into Pismo Beach for lunch, a small cafe announced it had world famous Clam Chowder, a lofty claim, and one I was destined to investigate. The cafe was packed, and the prices were amazingly inexpensive, especially considering it’s proximity to the beach and the Pismo Beach Pier. I ordered a sandwich and some chowder and sat and waited. A group of teenage boys flirted with the girls making sandwiches until an older male employee, who I assumed to be a manager, came over and asked them to leave. The girls blushed as the boys scurried out the door. One of the aforementioned blushing girls brought out my soup and sandwich and I dug in. The sandwich was made with amazingly thick cuts of pastrami and the chowder was thick, each bite contained fresh bits of clams, the famous Pismo Clams that are themselves a tourist draw in the area. I scarfed down the sandwich, sad they I hadn’t savored the flavor more, and headed out along the pier. The pier was nearly empty save for a few fisherman standing along the sides. Surfers were out catching the last of the days waves. Out in the distance fog started to roll in, the only clouds in the sky were those hugging the ocean off in the distance, a wall of white approaching and sweeping over some of the mountains to the north. I decided to drive back to Dinosaur Cave Park for sunset, and found an empty bench at the top of the bluffs, where I watched the sun disappear into the fog cloud in the distance. This is a butterfly, not a picture of elaborate fog. I had decided to put in a little more driving before settling in and need to go up the coast a little ways to my campsite. As I drove the fog reached land, and soon I was driving in a cloud, the only visible landscape that to in my immediate vicinity, soon I entered the park and was instantly in a forest of ancient looking frees, the fog coursing between the dense foliage. The road drifted back and forth, taking me closer to the shoreline, the fog receding with each mile. Soon I found the campsite, the bright moon provided the only light as I set up my tent. The moonlight illuminated the remaining fog, obscuring the figures of the trees around the campsite. After a short stroll I tucked in for the night. I have never spent a night alone in a tent, and each noise roused me from my dreams. The cadence of the wind flapping my tent sounded early like footsteps, but the sound of the waves crashing against the shore just down the way drowned up most sound and I drifted off to sleep for good.
{ "perplexity_score": 372.1, "pile_set_name": "Pile-CC" }
Q: Upload Image to server in android by Httppost How to upload image at server by gallary or camera? I try this link's code but it shows error like this Error:(329, 24) error: cannot access AbstractBody class file for org.apache.james.mime4j.message.AbstractBody not found A: You can upload image to the server using http post multi-part. Here is the link which will help you out. https://vikaskanani.wordpress.com/2011/01/11/android-upload-image-or-file-using-http-post-multi-part/ http://www.codejava.net/java-se/networking/upload-files-by-sending-multipart-request-programmatically And one more way to uploading image is, convert it into Base64 and than upload. Check the below link. Android upload image to server using base64
{ "perplexity_score": 1353.4, "pile_set_name": "StackExchange" }
INTRODUCTION ============ The human placenta has both maternal and fetal blood circulations, which exchange gases, nutrients and waste through the surface of the villous tree without mixture \[[@R1]\]: the maternal blood from the uterine arteries flows slowly into the intervillous space and returns to the uterine veins while the fetal blood from the umbilical arteries flows into arteries within the chorionic plate, circulates through blood vessels in the villous tree, and returns to the umbilical veins. The influence of the maternal and fetal blood flows on the transport of substances has been reported previously \[[@R2], [@R3]\]. The villous tree is composed of stem villi, intermediate villi, terminal villi and mesenchymal villi. Stem villi are the main support of the villous tree between the two bounding surfaces of the placenta. The stem villi have the contractile cells, which surround the arterial and venous vessels and run along the longitudinal axis of the branch \[[@R4]-[@R11]\]. The contraction of the stem villi has been observed *in vitro* \[[@R5], [@R12]-[@R14]\], which is expected to help the circulations of the maternal and fetal bloods. The maximum velocity of the contraction was much smaller than that of uterus, and the peak isometric tension was 1.39 kPa for electrical tetanus and 1.32 kPa for KCl exposure on average \[[@R14]\]. The contraction directly assists the fetal blood flow in the vessels of the stem villi because the contractile cells surround the vessels axially. However, the fetal blood in the capillary of the villous tree and the maternal blood in the intervillous space are not surrounded by the contractile cells directly, and similarity in the directions between the blood flow and the contractile cells has not been clear. In the meantime, the mechanical properties of the human placenta were evaluated by tensile, compression and shear \[[@R15]\]: The elastic moduli measured by shear were much smaller than those by tensile and compression. The shear stress was less than 1 kPa when the strain was 1 (strain velocity \< 0.04 /s). Considering that the blood vessels were aligned with the direction of the force \[[@R15]\], the shear elastic moduli in the surroundings of the blood vessels would be much less than 1 kPa. Comparing the tension of the contractile cell with the shear elastic moduli, the displacement and its propagation in the placenta would occur although neither direct measurement nor prediction for the displacement is possible. The conditions of the placenta, concerning the blood flow, are non-invasively observed by ultrasound and magnetic resonance (MR). The velocity of the blood flow in the umbilical artery is measured by ultrasound Doppler velocimetry and described as flow velocity waveforms (FVWs). The histological characteristics in the villous tree, including the distribution of the villous types and vascularization, can be estimated by FVW at end diastolic: positive, absent or reverse \[[@R16]-[@R18]\]. The oxygen environment, which is evaluated by oxygen-enhanced MRI and BOLD MRI \[[@R19]\], influenced the bifurcation pattern of the villous tree: hypoxia enhances the bifurcation \[[@R20], [@R21]\]. The magnitude of the perfusion in the placenta can be expressed as relative values by three-dimensional (3D) power Doppler \[[@R22]\] and contrast-enhanced MR images \[[@R23]\], but the direction is hardly measured. In general, the normal mature placenta shows legions in some degree, such as infarctions, which can prevent the blood circulations in the placenta. 3D power Doppler indicated that the perfusion in the normal placenta was kept through the gestational ages, from 15 to 40 weeks \[[@R24]\]. In the meantime, the diameter, branching patterns and generation of the stem villi were previously reported \[[@R1], [@R25]\] so that a computational model of the villous tree with active contractions can be developed. If the displacement caused by the contraction is corresponding to the perfusion evaluated by 3D power Doppler or MRI, the direction of the blood flow can be estimated by changing the distribution of the shear elastic moduli as the pattern of the displacement in the placenta agrees with that of the perfusion. Assuming that the contraction force and shear elastic moduli of the region surrounding the stem villi are representative of the placental conditions, the results of the computation can be translated properly. In this study, a computational model of the villous tree in the human placenta with active contractions was developed for estimating the blood flow condition. The shape of the stem villi was based on the previous reports \[[@R1], [@R25]\], and the surroundings of the stem villi were assumed as one continuum, where the displacement caused by the contraction propagated because the branching pattern of the villi around the stem villi, and the shape of the intervillous space, which is the space surrounded by the villi and the maternal blood passes through, are complicated. By using this model, it was examined whether or not the contraction could assist the fetal blood flow in the capillary and the maternal blood flow in the intervillous space. Moreover, the influence of the mechanical properties in the villous tree on the pattern of the displacement was also examined. COMPUTATIONAL MODEL =================== Stem Villi ---------- The stem villi are categorized into the three groups: truncus chorii, next to the chorionic plate; rami chorii, next to the truncus chorii; ramuli chorii, between the rami chorii and the basal plate \[[@R1], [@R25]\]. The diameter gradually becomes smaller from the chorionic plate to the basal plate, and branches are found in all the groups except the truncus chorii. The branching pattern of the ramuli chorii is not equally dichotomous. The generations of branches in the rami chorii and ramuli chorii are up to 4, and from 1 to 30, respectively. Table **[1](#T1){ref-type="table"}** shows the size and branching pattern in the stem villi model. In this model, the chorionic and basal plates, and the boundaries between the categories (truncus chorii, rami chorii and ramuli chorii) were parallel to each other. Firstly, how to use the centripetal and centrifugal orders at the branch to describe the branching pattern in Table **[1](#T1){ref-type="table"}** is explained. Figs. (**[1a](#F1){ref-type="fig"}** and **[1b](#F1){ref-type="fig"}**) show a simple branching pattern designated by the centripetal order and centrifugal order: the tip and trunk are designated as 1 and maximum, respectively, at the centripetal order, and vice versa at the centrifugal order. The centripetal order is used to evaluate dichotomy \[[@R26], [@R27]\]. The bifurcation ratio, *R~b~*, is defined as the following equation: R b = N u N u \+ 1 where *N~u~* is the number of branches at the centripetal order *u*. If *R~b~* is 2, the branching is equally dichotomous. Assuming that *R~b~* is constant, *N~u~* is a geometrical series given as: N u = R b ( u max − u ) where *u~max~* is the maximum centripetal order. Hence, ln N u = ( u max − u ) ln R b *R~b~* of the branches was calculated by the method of least squares. Table **[1](#T1){ref-type="table"}** shows that *R~b~* in the rami chorii was 2, but that in the ramuli chorii was not equal to 2. These values indicate that the branching patterns in the rami chorii and ramuli chorii are equally and unequally dichotomous, respectively. The centrifugal order at the tip, *C~f~*, in Table (**[1](#T1){ref-type="table"}**), corresponds to the generation of the branches. While *C~f~* in the rami chorii was constant, that in the ramuli chorii was varied. That is because the branches in the ramuli chorii were not symmetric. The diameter range in each category was as follows: truncus chorii, 900 -- 3000 μm; rami chorii, 300 -- 1000 μm; ramuli chorii, 50 -- 500 μm \[[@R25]\]. Table **[1](#T1){ref-type="table"}** shows that the diameter ranges agree with the aforementioned one. The change of the diameter at the truncus chorii was much larger than those at the rami chorii and ramuli chorii. For the smooth connection between the truncus chorii and rami chorii, the derivative of the radius with respect to the *z* coordinate should be zero at the boundary. Hence, the following equation was used to determine the radius of the branch at the truncus chorii: r = r max − ( r max − r min ) z tr { z tr 2 − ( z − z tr ) 2 } where *r~max~* and *r~min~* are the maximum and minimum radii in the truncus chorii, and *z~tr~* is the boundary between the truncus chorii and rami chorii (*z~tr~* = 2.9 mm). In the rami chorii, the radius was decreased as the distance along the axis was longer. The radius of the branch in the ramuli chorii became larger as the centripetal order increased. The radii of the branches at the connecting point were modulated as all the branches showed the same radius. The branches in the rami chorii were equally dichotomous as well as symmetric, and 16 branches were connected to those in the ramuli chorii at the boundary. The branches in the ramuli chorii should be unequally dichotomous. For making unequally dichotomous branches, the 2D diffusion-limited aggregation (DLA) models \[[@R28]\] were made by the free-software, dla-nd, which was developed by the Dr. Mark J. Stock (<http://markjstock.org/dla-nd/>). Because the path between the branching points was not smooth in this model, the line between the branching points was set as an axis of a branch. As Table (**[1](#T1){ref-type="table"}**) shows, the longest distance from the chorionic plate in the model was 24.5 mm. According to the previous reports, the thickness of the human placenta and chorioamniotic membrane, the surface of the placenta, were 25 mm \[[@R1]\] and 243 μm \[[@R29]\] on average, respectively. It is calculated that the distance between the chorionic and basal plates is 24.8 mm. The longest distance from the chorionic plate in the model was close to the calculated distance between the chorionic and basal plates, based on the previous reports \[[@R1], [@R29]\]. In the meantime, the cross section of the model, parallel to the chorionic plate, had the bounding rectangle, whose size was 23.8 mm × 22.6 mm (width × height). The previous report \[[@R1]\] indicated that the placenta at term, whose diameter was 220 mm, had 60 -- 70 villous stems. The area based on this diameter is 3.80 × 10^4^ mm^2^ so that the average cross section of the villous trees is 5.42 × 10^2^ - 6.33 × 10^2^ mm^2^, whose corresponding diameter is 26 -- 28 mm. The size of the cross section in the model was close to that based on the previous report \[[@R1]\]. Figs. (**[1c](#F1){ref-type="fig"}**-**[1e](#F1){ref-type="fig"}**) show the villous tree model developed in this research. The size was 34.8 × 34.8 × 24.5 \[mm\] (1200 × 1200 × 847 \[pixels\], 29 μm/pixel).The Cartesian coordinate system, whose *z* axis was perpendicular to the chorionic plate, was used to describe the position in the model. Its origin was also on the chorionic plate. Contraction Direction --------------------- The contractile cells run along the longitudinal axis of the branch \[[@R4]-[@R11]\]. Each point at the boundary surface between the stem villi and the surroundings has two tangential directions as Fig. (**[2](#F2){ref-type="fig"}**) shows. The tangential direction, closer to the axis of the branch than the other, was decided as the contraction direction. At the truncus chorii, the axis of the branch was parallel to the *z* axis and its radius was largely changed as Equation (4) shows. The angle between the *z* axis and tangential direction (*φ~o~*) and the differentiation of Equation (4) by *z* are as follows: φ o = atan ( dr dz ) dr dz = r max − r min z tr z − z tr z tr 2 − ( z − z tr ) 2 Considering that the direction of the contraction at the axis of the branch was (0, 0, -1), φ o = π \+ atan ( dr dz ) When the angle between the point at the surface and the *x* axis in the *xy* plane is *θ~o~*, the tangential direction is (*sinφ~o~cosθ~o~*, *sinφ~o~sinθ~o~*, *cosφ~o~*). Comparing the rami chorii with the truncus chorii at Table (**[1](#T1){ref-type="table"}**), the diameter change at the rami chorii was 25% of that at the truncus chorii. In addition, the rami chorii showed the range of the *z* coordinate, which was about 3.7 times larger than that at the truncus chorii. The change of the diameter at the rami chorii was much smaller than that at the truncus chorii. Hence, the tangential direction at the surface was parallel to the axis of the branch at the rami chorii. Because the change of the diameter was also small at the ramuli chorii, the tangential direction was determined in the same way. Displacement ------------ As Figs. (**[1c](#F1){ref-type="fig"}**-**[1e](#F1){ref-type="fig"}**) show, assuming that the surroundings of the stem villi were one continuum in this model, the propagation of the displacement in the placenta was evaluated by the model. A wave equation is generally described as below: ρ ∂ 2 u ∂ t 2 = μ ∇ 2 u \+ ( λ l \+ μ ) ∇ ( ∇ ⋅ u ) where ***u*** is displacement vector, *ρ* is density, *λ~l~* and *μ* are Lamé's constant. *μ* also shows a shear elastic modulus. Generally, biological tissue is incompressible, so that the second term in Equation (8) is zero. Hence, ρ ∂ 2 u ∂ t 2 = μ ∇ 2 u Hence, the shear wave (transverse wave), whose propagation is normal to the vibration and carried out in solid, was evaluated in this computation. The displacement caused by the shear wave is described as follows \[[@R31]\]: u = ξ o cos ( kr − 𝜛t ) where *ξ~o~* is the amplitude, *k* is the wave number (*k* = 2π/*λ*, *λ* is wave length), *r* is the distance from the surface of the stem villi, *t* is time, and *ω* is angular frequency. *ξ~o~* was 0.1 μm in all the computational conditions. The shear elastic modulus, *μ*, is described as follows \[[@R32]\]: μ = 𝜛 2 k 2 ρ Considering that *k* = 2π/*λ* and *ω*=2π*ν* (*ν*, frequency), μ = ρ λ 2 v 2 *ρ* was 1.0 × 10^3^ kg/m^3^ because of biological tissues \[[@R32]\]. ν was 1.0 Hz, and *λ* was 0.29, 0.58 or 1.45 mm (10, 20 or 50 pixels) in the computation so that the shear moduli were 8.41 × 10^-5^, 3.36 × 10^-4^ and 2.10 × 10^-3^ Pa. The displacement is attenuated by viscoelastic properties so that the maximum distance for the propagation was 1.45, 2.9 and 4.35 mm (50, 100 and 150 pixels). In order to simplify the problem, *t* was set for zero. That is, the computation did not consider the time effect on the displacement. The maximum distance for the propagation was not dependent on the position. *λ* was kept constant in the surroundings, or became longer as the distance from the surface of the stem villi was longer. In the latter case, *λ* was increased from 0.29 mm to 1.45 mm every one-third of the maximum distance from the surface. Hence, there were 12 conditions in this computation. RESULTS ======= Characteristic Positions and Visualization ------------------------------------------ The displacement of the surroundings of the stem villi is described by the polar coordinate system (magnitude, *φ* (0° ≤ φ ≤ 180°) and *θ* (-180° ≤ θ \< 180°)) because the coordinate system was useful to separate the displacement into its magnitude and direction. Fig. (**[3](#F3){ref-type="fig"}**) shows the results when *λ* and the maximum distance for the propagation were 1.45 mm and 4.35 mm, respectively. Fig. (**[3a](#F3){ref-type="fig"}**) shows that the displaced area was gradually increased as the *z* coordinate became larger. The long and steep slope was observed from the truncus chorii to the rami chorii. The same features were observed in all the computational conditions. Figs. (**[3b](#F3){ref-type="fig"}**, **[3c](#F3){ref-type="fig"}** and **[3d](#F3){ref-type="fig"}**) show the mean and standard deviation (SD) of each parameter: magnitude, *φ* and *θ*. The mean and SD were calculated for all the points in the displaced area, whose magnitude was more than zero. When the displacement is perpendicular to the chorionic plate, the value of *θ* cannot be determined. Hence, such a critical point was not included for the calculation of the mean and SD in *θ*. Fig. (**[3b](#F3){ref-type="fig"}**) shows that the SD normalized by the mean was calculated in order to evaluate the magnitude range of the displacement in each *z* coordinate. The peak of the normalized SD was observed around the boundary between the truncus chorii and rami chorii, which is named as *z~d~*. The mean and SD about the direction of the displacement in each *z* coordinate are shown in Figs. (**[4c](#F4){ref-type="fig"}** and **[4d](#F4){ref-type="fig"}**). As Fig. (**[4c](#F4){ref-type="fig"}**) shows, the mean of *φ* was kept around 90 degrees, but the SD of *φ* indicated two peaks, whose positions are named as *z~φ1~* and *z~φ2~*, respectively. Fig. (**[3d](#F3){ref-type="fig"}**) shows that the mean of *θ* slightly decreased around the boundary between the rami chorii and ramuli chorii, which is named as *z~θ~*, while the SD of *θ* was kept around 90°. These characteristic *z* coordinates, *z~d~*, *z~φ1~*, *z~φ2~*, and *z~θ~*, were observed at all the computations. Fig. (**[4](#F4){ref-type="fig"}**) shows the images which visualizes the magnitude, *φ*, and *θ* in each characteristic *z* coordinate and the middle *z* coordinates of the truncus chorii (*z~t~*), rami chorii (*z~r~*), and ramuli chorii (*z~rl~*) under the same computational condition as Fig. (**[3](#F3){ref-type="fig"}**) shows. The displaced area became larger as the *z* coordinate was increased. The magnitude of the displacement was almost kept constant at every *z* coordinate although the magnitude in the limited area at *z~d~* was high. The distributions of *φ* and *θ* were largely changed along the *z* coordinate as shown in Figs. (**[3c](#F3){ref-type="fig"}** and **[3d](#F3){ref-type="fig"}**) The visualization of the displacement and direction like Fig. (**[4](#F4){ref-type="fig"}**) is useful to find out critical points and important points for analysis. Magnitude of the Displacement ----------------------------- As Fig. (**[4](#F4){ref-type="fig"}**) shows, the magnitude of the displacement was kept almost constant except the magnitude was high near the stem villi at *z~d~*. 90% of the displaced area showed that the magnitude relative to the maximum one was less than 0.17 for the maximum distance for the propagation = 1.45 mm and λ increasing as the distance from the surface of the stem villi, and 0.06 for other results. The SD normalized by the mean was large at *z~d~*, but the high magnitude was in the limited area. Hence, the maternal and fetal blood circulations in the villous tree and intervillous space would be influenced by the constant distribution of the displacement in the placenta. Because the shape of the stem villi directly influences the displacement pattern, the model whose shape near the high magnitude is changed will be developed and used for the computation to examine whether or not such a high magnitude is inevitable. Direction of the Displacement (*φ* and *θ*) ------------------------------------------- Figs. (**[5a](#F5){ref-type="fig"}**-**[5e](#F5){ref-type="fig"}**) show the distribution of *φ* at the characteristic *z* coordinates (*z~φ1~*, *z~φ2~*) and the middle *z* coordinate in each category (*z~t~*, *z~r~*, *z~rl~*) for the same condition as shown in Fig. (**[3](#F3){ref-type="fig"}**). The area fraction, which is the area for each *φ* normalized by all the displaced area, was used to evaluate the distribution of *φ*. The area fraction around *φ* = 90° (*φ* = 45° - 135°) was largest at *z~φ1~* (Fig. **[5b](#F5){ref-type="fig"}**) and smallest at *z~φ2~* (Fig. **[5d](#F5){ref-type="fig"}**). The same characteristics were observed in all the computations. For all the computational conditions, the mean and SD of the area fraction at *φ* = 45° - 135° were calculated at each *z* coordinate. As the average values in Fig. (**[5f](#F5){ref-type="fig"}**) show, more than 90% of the displaced area showed *φ* from 45° to 135° at *z~φ1~*. The area with the same range of *φ* was around 10% at *z~φ2~*. Considering that the *φ* = 90° means the direction parallel to the *xy* plane, most of the displacement was parallel to the *xy* plane at *z~φ1~*, and parallel to the *z* axis at *z~φ2~*. Fig. (**[5f](#F5){ref-type="fig"}**) shows that the mean of the area fraction at the other positions was around 0.3. Hence, *φ* did not have a preferred direction there. The displacement could help the maternal blood to go to the chorionic plate at *z~φ2~*, spread parallel to the chorionic plate and the basal plate at *z~φ1~*, and go toward the basal plate at *z~φ2~*. In the meantime, the branches in the stem villi around *z~φ1~* and *z~φ2~* had the axes largely different from the directions of the displacement there: the axis of the branch in the truncus chorii is perpendicular to the chorionic plate, and that in the rami chorii was largely changed because of its curvature. The displacements at *z~φ1~* and *z~φ2~* could assist the fetal blood to pass through the vessels in the stem villi. Moreover, the maternal and fetal bloods could be homogenized by the displacement at *z~t~*, *z~r~* and *z~rl~*. The SD was largest at *z~t~*, and smallest at *z~φ1~*. The SD at *z~rl~* was larger than that at *z~φ1~*, but much smaller than those at the other characteristic positions. Considering that *λ* and the maximum distance for the propagation are corresponding to the mechanical properties of the surroundings of the stem villi, *φ* at *z~φ1~* and *z~rl~* would be hardly influenced by the mechanical property of the surroundings, but *φ* at the truncus chorii would be vulnerable to it. Figs. (**[6a](#F6){ref-type="fig"}**-**[6d](#F6){ref-type="fig"}**) show the distribution of *θ* at the characteristic *z* coordinates (*z~θ~*) and the middle *z* coordinate in each category (*z~t~*, *z~r~*, *z~rl~*) for the same condition as Fig. (**[3](#F3){ref-type="fig"}**) shows. The area fraction, the area for each *θ* normalized by all the displaced area, was used for describing the distribution. Figs. (**[6a](#F6){ref-type="fig"}** and **[6b](#F6){ref-type="fig"}**) show that the similar distribution pattern was observed every 90° at *z~t~* and *z~r~*. The result agreed with the mean of *θ* at *z~t~* and *z~r~*, around zero. Fig. (**[6c](#F6){ref-type="fig"}**) shows the distribution of *θ* at *z~θ~*, where the area fraction at *θ* = -180° - 90° (the third quadrant) and *θ* = 0° - 90° (the first quadrant) was larger than that at *θ* = -90° - 0° (the fourth quadrant) and *θ* = 90° - 180° (the second quadrant). This result agreed with the decrease of the mean at *z~θ~* in Fig. (**[3d](#F3){ref-type="fig"}**). As Table (**[1](#T1){ref-type="table"}**) shows, the branches in the ramuli chorii were unequally dichotomous as well as asymmetric while those in the rami chorii were equally dichotomous as well as symmetric. Because the rami chorii had 16 branches connecting to those in the ramuli chorii, 16 types of the branching pattern were used in the ramuli chorii. *z~θ~* was located around the boundary between the rami chorii and ramuli chorii. The branches of the ramuli chorii at *z~θ~* were almost parallel to the *z* axis in the second and fourth quadrant, but those in the first and third quadrants were not. The angle of the branch at *z~θ~* would cause the characteristic distribution of *θ* at *z~θ~*. The similar distribution pattern was observed at *z~rl~*, but each peak was much smaller than that at *z~θ~* as Fig. (**[6d](#F6){ref-type="fig"}**) shows. Because *z~rl~* was placed on the middle of the ramuli chorii, the feature caused at *z~θ~* would be weakened by the branches which showed various angles. All the computational results showed the same characteristics as Figs. (**[6a](#F6){ref-type="fig"}**-**[6d](#F6){ref-type="fig"}**) show. The SD of the area fraction in each interval (each value of *θ*) (*SD~in~*) was calculated in order to evaluate the uniformity of the distribution in *θ* for all the computations. Fig. (**[6e](#F6){ref-type="fig"}**) shows that the average value of *SD~in~* at *z~θ~* was largest and that at *z~rl~* was smallest, among all the positions. The distribution of *θ* was most uniform at *z~rl~*, and most fluctuated at *z~θ~* in all the positions. The distribution of *θ* at *z~θ~* would be influenced by the angle of the branches in the ramuli chorii. Because *θ* at *z~rl~* did not have a preferred value, the maternal and fetal bloods could be homogenized. The SD values of *SD~in~* at *z~t~* and *z~θ~* was much larger than those of other two positions, and that at *z~rl~* was smallest in all the positions. The results show that the mechanical properties of the villus tree would strongly influence *θ* at *z~t~* and *z~θ~*, but hardly influence that at *z~rl~*. Even if the mechanical properties of the villous tree are changed, the homogenization of the bloods around the ramuli chorii would be kept. DISCUSSION ========== In this study, the computational villous tree model was developed, and used to evaluate the displacement in the human placenta caused by the contraction of the stem villi. The magnitude of the displacement was almost homogeneous, and the direction was useful for the fetal and maternal blood circulations. This tendency was maintained even if the mechanical properties of the placenta were changed. The experimental results such as MRI and 3D power Doppler angiography are described by scalar values so that the magnitude of the displacement could be directly compared with them. The resolution in the computation of this model was much higher than that in MRI or 3D power Doppler. Hence, representative values such as mean and SD will be necessary if the comparison between the experimental data and the computational result is carried out. In the computation, every point in the stem villi contracted at the same time. Hence, the result in this study indicated that the displacement caused by the contraction would be helpful for the blood circulations when each contractile cell in the stem villi contracts at the same time. How to control the timing of the contraction for the effective blood circulation in the placenta can be investigated by this villous tree model. This investigation will be carried out in the future. The effect of the displacement on the maternal and fetal blood flows would be influenced by the directions of these blood flows. A computational model and method are necessary to investigate this effect. Developing them, with considering the usage of FWVs, will be the important topic to evaluate the blood circulation in the placenta. CONCLUSION ========== In this study, the computational model of the villous tree with active contractions was developed. The results based on this model show that the contraction could assist the maternal and fetal blood circulations in the placenta, and its effect would maintain even if the mechanical circumstances are changed. The combination between this computational model and non-invasive measurements will be useful to evaluate the condition of the placenta. Declared none. CONFLICT OF INTEREST ==================== The author confirms that this article content has no conflict of interest. ![Villous tree model developed in this study. The branching pattern in the stem villi of the model was indicated by the centripetal and centrifugal orders at the branches, whose example is indicated by **(a)** and **(b)**, respectively. **(c-e)** show the side views of the model: the stem villi, white; the villi except the stem villi, blue; the intervillous space, which the maternal blood passes through, blue. As **(d)** and **(e)** show, this model is between the chorionic and basal plates. The *z* axis of the Cartesian coordinate system is perpendicular to the chorionic plate. The size of this model is 34.8 × 34.8 × 24.5 \[mm\] (1200 × 1200 × 847 \[pixels\], 29 μm/pixel).](TOBEJ-11-36_F1){#F1} ![Contraction directions at the branches of the rami chorii. Arrows show the directions of the contractions. Each branch in the stem villi contracts along its axis and toward the junction.](TOBEJ-11-36_F2){#F2} ![Displacement caused by the contraction of the stem villi. *λ* = 1.45 mm, and the maximum distance for the propagation = 4.35 mm. All the parameters at each *z* coordinate are shown. While **(a)** shows the displaced area, the magnitude **(b)** and direction (*φ*, *θ*) **(c, d)** of the displacement were described by the representative values, the mean and standard deviation (SD) for the displaced area. The solid and dotted lines in **(c)** and **(d)** are the mean and SD, respectively. The triangles show the characteristic positions, which were observed at all the computations. *z~d~*, *z~φ1~*, *z~φ2~*, and *z~θ~* are the *z* coordinates for these characteristic positions.](TOBEJ-11-36_F3){#F3} ![Displacement patterns in the characteristic positions. *λ* = 1.45 mm, and the maximum distance for the propagation = 4.35 mm. In addition to the characteristic positions in each parameter, *z~d~*, *z~φ~*~1~, *z~φ2~*, and *z~θ~,* the representative positions of the truncus chorii, rami chorii and ramuli chorii appear: *z~t~*, *z~r~* and *z~rl~*, which are the middle *z* coordinates of the truncus chorii, rami chorii, and ramuli chorii, respectively.](TOBEJ-11-36_F4){#F4} ![Distribution of *φ* in the characteristic positions for the displacement at *λ* = 1.45 mm and the maximum distance for the propagation = 4.35 mm. **(a-e)** show the distributions of *φ* at the following characteristic positions, *z~t~*, *z~φ1~*, *z~r~*, *z~φ2~* and *z~rl~*. The area fraction of *φ*, from 45° to 90°, for all the computation results is indicated in **(f)**.](TOBEJ-11-36_F5){#F5} ![Distribution of *θ* for the displacement at *λ* = 1.45 mm and the maximum distance for the propagation = 4.35 mm. **(a-d)** show the distribution of *θ* in the characteristic positions, *z~t~*, *z~r~*, *z~θ~* and *z~rl~*. The SD of the area fraction in each class interval for all the computations (*SD~in~*) is indicated in **(e)**.](TOBEJ-11-36_F6){#F6} ###### Size and branching pattern in the stem villi model. Parameter Truncus chorii Rami chorii Ramuli chorii -------------------- ---------------- ---------------------- ------------------- ----------- **Branch** *d* \[mm\] 1 - 3 0.5 - 1 0.3 - 0.5 *z* \[mm\] 0 - 2.9 2.9 - 13.5 13.5 - 24.5 **Axis** *L~c~* \[mm\] 0 (*z* = 2.9) 8.99 (*z* = 13.5) \- *L~b~*\[mm\] \- 0 (*z* =2.9) \* 0.29 (*z* = 3.9) 1.74 (*z* = 4.7) 4.64 (*z* = 5.8) *r* \[mm\] \- (*L~b~*\< 1.74) 1.74 \- (*L~b~*≥1.74) 8.99 *R~b~* \- 2 2.22 - 6.02 *C~f~* \- 4 4 - 20 The stem villi model was set in the space, whose size was 34.8 × 34.8 × 24.5 \[mm\] (*x* × *y* × *z*): the *z* coordinate shows the distance from the chorionic plate; *d*, the diameter of the branch; *L~c~*, the distance from the center of the space in each *z* coordinate (17.4 mm, 17.4 mm, *z*) to the axis of the branch at the boundary between the categories; *L~b~*, the distance from the center of the space in each *z* coordinate to the bifurcation; \*, each branch bifurcated differently; *r*, the radius of curvature *R~b~*, bifurcation ratio; *C~f~*, the centrifugal order at the tip.
{ "perplexity_score": 687.7, "pile_set_name": "PubMed Central" }
Pages Monday, December 2, 2013 Christmas Cards! I absolutely adore this time of the year! Choosing just the right Christmas card, stamps and return address labels are something I start thinking about in oh...October...and this year was no exception. Since I feel as big as a house, I knew I wasn't going to do a picture that focused around the belly. {No offense to those of you who have done that, are doing that or plan to do that, it's totally just my personal preference because I feel giant!} We took our pictures in August {when we took our pregnancy announcement photos} and they went out in the mail Saturday to ensure people would start receiving them today. So without any further aideu, here's our 2013 Christmas card. Simple, just the way I like it. From our family to yours, Merry Christmas.
{ "perplexity_score": 643.8, "pile_set_name": "Pile-CC" }
Home Basics Steel Hairdryer Holder Hook Subscriptions Store and organize your bathroom essentials in this over the door organizer. Made from powder coated steel. Rust resistant. Hangs easily on most standard sized cabinet doors. 1 spring to hold a brush or a hairdryer.
{ "perplexity_score": 1496.8, "pile_set_name": "Pile-CC" }
GETTY French Prime Minister Manuel Valls is to clamp down on radical islam calling it 'poison' FREE now and never miss the top politics stories again. SUBSCRIBE Invalid email Sign up fornow and never miss the top politics stories again. We will use your email address only for sending you newsletters. Please see our Privacy Notice for details of your data protection rights. The comments come following the murder of 86-year-old French Catholic priest Father Jacques Hamel who was killed on the altar during morning mass last Tuesday and three separate massacres in the country in just over a year. In a newspaper interview Prime Minister Valls says the Republic has been forced to intervene to drive out the "poison" of radical Islamism. And he has announced plans to shut down mosques supporting Salafism, an ultra-orthodox religious-political ideology based on a belief in "physical" jihadism practised by some followers of the Sunni faith. GETTY Muslims pay tribute to Father Hamel who was killed in Normandy ISIS fighters Fri, March 25, 2016 Iraq and Syrian jihadists, including the Paris and Brussels attacks suspects. Play slideshow PH 1 of 47 Belgian national Salah Abdeslam who masterminded the Paris attacks He said: "All Salafists are not jihadists ... but almost all are jihadist Salafists... "A terrible poison has spread. "Slowly, insidiously, on a background of influences from abroad and rising communalism, developed against a model of society, a model against the Republic and its values. "Many Muslims in France are taken hostage by the fundamentalist Salafism, who worship a weapon against others. "The places of worship that house preachers will be closed systematically. "It is necessary to rethink the training of imams and chaplains completely. "France must become a European centre of excellence in the teaching of Islamic theology." The people of Saint-Etienne-du-Rouvray have united in their revulsion at the murder of Father Jacques who served on the town's interfaith committee. He will be buried this morning following a public funeral in the 12th Century Rouen cathedral, in Normandy. GETTY Leaders from the Mosque in Saint-Etienne-du-Rouvray will not bury attackers It is necessary to rethink the training of imams and chaplains completely Prime Minister Manuel Valls And the town's Muslim community have refused to bury the 19-year-old men responsible for the heinous crime. Mohammed Karabila, imam of one of the town's mosques, told Le Parisien: "We're not going to taint Islam with this person. "We won't participate in preparing the body or the burial." The French public took to the streets of Paris following the murder of Father Jacques in Normandy last week. Many were openly furious when Mr Valls visited a memorial service to remember the victims of the Nice terror attack. He was booed as he signed the book of condolence on the Promenade des Anglais where 84 people died and scores more were injured during the Bastille Day massacre. GETTY Former President Nicolas Sarkozy wants terror suspects placed under house arrest
{ "perplexity_score": 278.7, "pile_set_name": "OpenWebText2" }
John Erardi [email protected] Billy Hamilton ran a long way for that bases-loaded "dying quail" (might as well use the old-school term, considering what's to come) on Wednesday in San Diego. It was difficult to tell on TV how far "in" he had been playing at the time, but it looked like he ran a lot farther to his left than he did "in" to try to get to that ball in shallow right-center. Before the Reds departed for the long road trip to the West Coast by way of Chicago, Hamilton told me that the Reds pitchers, particularly the starters, like him playing shallow. Mike Leake reiterated that after his gutty performance over Toronto two Saturdays ago . "If there's a ball hit over his head (especially at Great American Ball Park), it's either off the wall or over the fence," Leake said. "When you have that speed, you can cheat a little bit. He's good at going back on balls." Over the years, the same has been true with all the great center fielders, from Willie Mays to Jim Edmonds and Andruw Jones and the Reds' Eric Davis. But it goes back even farther than that. I related an anecdote to Hamilton that dates back to 1937. New York Yankees pitching great Lefty Gomez was talking to rookie center fielder Joe DiMaggio one day after a game the Yankees had lost on a deep drive that one-hopped the center field wall at Yankee Stadium. Gomez: "How come you were playing so shallow on that one, Joe?" DiMaggio: "I'm gonna make 'em forget Tris Speaker." Gomez: "You keep playing there, you're gonna make 'em forget Lefty Gomez." News flash to Lefty: They've already forgotten you -- or at least Hamilton has; he didn't seem to recognize the name, and I'm not sure he even recognized the name of DiMaggio, either -- but he laughed at the story, because he got the point. Almost four score years later, the Gomez-DiMaggio story still resonates. Hamilton has gone to most of the Reds pitchers and told them that he'd like to play shallow. "They've all said, 'Do it,'" recalled Hamilton. "Cueto and Homer (Bailey) have told me point blank, 'If they hit it over your head, it's my fault.' That gives me the confidence to play shallow. The pitchers hate the cheapies. They'd rather give up something hit hard than a broken-bat blooper." If the Major League Baseball All-Star Game really was -- at its heart -- a battleground to determine which league will get home-field advantage in the World Series, Hamilton would be on the National League team, because he's a potential difference-maker late the game coming off the bench to run the bases or play center field. Of course, home-field in the World Series really isn't what the All-Star Game is all about. That it partly sells itself as such is going to go down in history as one of the goofier things Commissioner Bud Selig has done on a long list of mostly good things. But for all of the misplaced emphasis, baseball still has the best All-Star Game of all the major sports. And, as good a year as Todd Frazier and Hamilton are having (I believe Hamilton will end up National League Rookie of the Year, especially if he has as good a second half as he did first half), I'd rather see them make the All-Star Game next year, because next year the All-Star Game is in Cincinnati. Still, Frazier deserves it this year, and it will be shame if the fallacy of the fan voting winds up keeping him out. Meanwhile, the Mississippi Kid reminds me of DiMaggio in another way besides playing shallow. Hamilton so rarely has to dive for a ball, that when he does, you know he's run a country mile to get there. He has his pitchers thinking ''can of corn'' even when the batters hit a bolt into the gap. Anything less than a laser, Hamilton is going to get there. Another true story… This from a longtime visitor to Yankee Stadium, circa 1950: ''DiMaggio isn't that great of a center fielder. I been coming here for 14 years and he ain't had a tough chance yet.'' So it is with Hamilton. He makes the difficult look easy, and the next-to-impossible look expected. But as we were reminded Wednesday, even Hamilton with his speed and instincts can't always get to everything. He has the occasional tough chance. By his incredibly high standards, he should have had that dying quail last Wednesday -- and he knows it. The ground didn't dislodge that ball from his glove; the ball hit the heel of his glove and was gone before his arm ever hit the ground. The most interesting thing about that play is that we all thought he could and should have had it – even though for the past 12-14 years, various Reds pedestrian center fielders would have gathered that ball up on the second hop and nobody would have thought twice about it. "I don't take my at-bats out to the outfield," Hamilton explained. "That's why I'm so aggressive out there. I know the other team is trying to keep me off the bases -- trying to keep me from getting my hits -- so why shouldn't do everything I can to keep their guys off the bases? You get me out, I'm going to do everything I can to get you out." Hamilton said that being able to contribute so much defensively has calmed him down at the plate a little bit, because he's able to help the pitchers even on days when might not get a hit. "Me and Hatch (outfield coach Billy Hatcher) talk about it all the time," Hamilton said. "A good defensive center field can play the game a long time. I figure if I can keep improving my defense, good things are going to happen." Besides, trying to pin the blame for Wednesday's loss in San Diego on Hamilton would be wrongheaded, anyway. The Reds offense was held scoreless for the second time in three days. It wouldn't have mattered who had been pitching for the Reds -- Koufax, Johnson (either of them) or Mathewson. They'd have gone 0-3 with that lack of run support. OK, I told Hamilton, how about we bring the historical comparisons a little more up-to-date? I told him the Reds center fielder he reminds me of most is Eric Davis. Hamilton's eyes lit up. Now there was a "comp" to which he could relate. Davis has been one of Hamilton's mentors. Davis was signed as a shortstop also, but the Reds quickly moved him to center field because of his speed. And, yet, Davis – just like Hamilton does today -- played center field like a shortstop. Why? Because of his arm and instinct. I mentioned to Hamilton the play Davis made in Pittsburgh in the 1990 National League Championship Series, when he came out of nowhere (he was playing left field that day), and backed up center fielder Billy Hatcher on a blast to center, taking the carom off the wall like a shortstop and gunning out the runner at third. "Eric is one of the main guys who has helped me," said Hamilton, smiling. "Soon as they told me they wanted to switch me to center field, I went straight to E.D. He's made it a lot easier for me than I thought it was going to be." Hamilton admits he didn't like at first being told he was being switched to center. "I'd been playing shortstop my whole life," he said. "But when they said, 'It will help you get to the big leagues quicker,' I thought, 'OK, that's what I'm here for.' And now I like it. "It feels good out there. Got a lot of space. But I'll admit it: I miss shortstop every now and then. Who knows, I might get a shot at shortstop in the late innings someday." If it happens, just hope the hitter doesn't hit a dying quail to right-center. Only one Red has a chance to make the play, and his name is Billy Hamilton.
{ "perplexity_score": 332.4, "pile_set_name": "OpenWebText2" }
Q: What is meant by an HTML5 application? Since HTML5 is still only a markup language, what is meant when people say "HTML5 application"? Please explain. A: An HTML5 application is an application that uses HTML5/Javascript/CSS3 as its primary means of achieving a User Interface. The term is significant, largely because this is considered a platform-independent way to get an application onto as many different mobile devices as possible. Android and iOS are pretty much completely different, but both platforms will work with applications written in HTML5/Javascript/CSS3. All you need is an HTML5 compliant browser.
{ "perplexity_score": 464.3, "pile_set_name": "StackExchange" }
35-year-old Greg Horn (pictured) whipped his two teen daughters with the cable so hard they had welts on their legs with open wounds. Detectives noted that Horn struck his children while they were visiting him at his house in Fotip Lane. Their mother notified police after seeing the injuries. The 30-second video of Horn beating his daughters has sparked strong outcry. “No matter what those kids did, no one deserves to be beaten to that extent. How can you keep going when your child is screaming like that?,” one commenter on the video asked. Watch Horn hitting his girls here: Another viewer blamed the girls’ behavior on their father. “If he treated them better to begin with maybe they wouldn’t have stepped so far out of line. I’m glad my kids will never see me lose control like this.” According to Children’s Services, abuse cases are up by over 4,702 cases since last year, almost 100 more cases than in 2011. Kevin Lavoie of the Montgomery County Children’s Services says they hope to reduce that number. “We don’t want people to have any reservations about calling 224- KIDS and letting us know about a circumstance or a concern,” Lavoie said. As for Horn, his court date is scheduled for April 16th. Co-incidentally, his indictment comes during the first week of Child Abuse Awareness Month.
{ "perplexity_score": 382.6, "pile_set_name": "Pile-CC" }
Loccitane almond delicious hand cream 30ml £6.00 Enriched with Almond milk and Almond oil, the silkysmooth cream Almond Delicious Hand helps to nourish and soften the hands while enveloping them with the subtle and mouthwatering scent of fresh Almonds. Our nongreasy formula has a creamy texture, perfect for hydrating hands throughout the day.The almond nut, which grows protected in a beautifully soft and green velvet shell, is renowned for its ability to soften and smooth the skin. LamprsquoOCCITANE is committed to purchasing almonds from producers in the South of France so that the almond tree, which had long been forgotten in the region, once again becomes a familiar element in the Provenampccedilal landscape. Most popular LOccitane Loccitane almond delicious hand cream 30ml on other UK sites Enriched with Almond milk and Almond oil, the silkysmooth cream Almond Delicious Hand helps to nourish and soften the hands while enveloping them with the subtle and mouthwatering scent of fresh Almonds. Our nongreasy formula has a creamy texture, perfect for hydrating hands throughout the day.The almond nut, which grows protected in a beautifully soft and green velvet shell, is renowned for its Enriched with almond milk and almond oil, the silky-smooth cream Almond Delicious Hand helps to nourish and soften the hands while enveloping them with the subtle and mouth-watering scent of fresh Almonds. Our non-greasy formula has a creamy texture, perfect for hydrating hands throughout the day. L&rsquo;Occitane&rsquo;s best selling Shea Butter Hand Cream is a super smoothing synergy of 20% shea butter honey and sweet almond extract that&rsquo;s been blended with the light and alluring aromas of jasmine and ylang-ylang essences. Inviting even the most hard working hands to a fresh beginning L&rsquo;Occitane Shea Butter Hand Cream smells delicious as the silky treatment Designed to keep your hands looking and feeling young and soft, this Hand Cream Trio Collection by LOccitane boasts three varied hand creams. Perfect as a gift, this set it a must have. K.D. This set contains the following products: LOccitane Cherry Blossom Hand Cream 30mlEnriched with shea butter and vitamin E, LOccitane Cherry Blossom Hand Cream nourishes and protects hands from daily With an efficient 180 W motor and simple to use design, the cream KitchenAid 5KHB2571BA Hand Blender delivers excellent performance when you need to chop and blend ingredients in your kitchen. Hand held blending Boasting a stainless steel S-blade, the KitchenAid Hand Blender is small, yet robust and can power through most ingredients with ease. With five speed settings available, this hand blender Light hydrating moisturiser to balance and protect sensitive skin.; A mild unperfumed hydrating day and night cream made from a base of the finest Almond and Plum oils. The light, quickly absorbed cream leaves the skin feeling fresh, supple and smooth. This mild formula calms irritation-prone skin and deliver lasting moisture to sensitive hands. The protective shell of the organic almond enfolds a precious oil-rich kernel. In just the same way Almond Sensitive Skin Hand Cream protects the sensitive skin of your hands. The mild formula, with organic almond oil, reinforces the skin’s own protective function and therefore defends Masculine to the core. DKNY Be Delicious men brings together the raw lushness of nature with the powerful sophistication of the big city with crisp, wet greens, modern woods, green apples and intoxicating coffee. Loccitane almond delicious hand cream 30ml on other UK sites Loccitane almond delicious hand cream 30ml on USA sites Enriched with Almond milk and Almond oil, this silky-smooth cream helps to nourish and soften the hands while enveloping them with the subtle and mouthwatering scent of fresh Almonds. Size: 1 ounce Quantity: One (1) Targeted area: hand Skin/hair type: all skin types Active ingredients: N/A We cannot accept returns on this product. Due to manufacturer packaging changes, Almond and plum kernel oils are a match made in organic heaven and have been beautifully brought together in Weleda&rsquo;s Almond Soothing Facial Cream to replenish dry or sensitive skin to leave your skin feeling soft supple and protected. This creamy moisturiser soothes your skin and protects it from the effects of the environment supporting natural regeneration. Weleda Almond Soothing Are you tired of giving multi-dose treatments and cleaning up diarrhea for 3-5 days? See results within 24 hours with just 1 syringe of DiaGel for Dogs 5 mL (61-120 lbs) . Common uses include but are not limited to garbage gut, changes in diet and/or water, stress and environment changes like boarding, breeding, traveling and showing. DiaGel is palatable, easy to give and approved by the NASC. Were rather pleased with this reversible boxy sweatshirt shaped sweater because with a button through back you can switch it round to wear as a clever cardigan. Knitted from lightweight cotton it’s the perfect summer weight knit.
{ "perplexity_score": 964.1, "pile_set_name": "Pile-CC" }
20 Kan. App. 2d 361 (1995) ERROL JOE KAMPSCHROEDER, Appellee, v. NORMA W. KAMPSCHROEDER and SHERRYL HOLMES, Appellants. No. 71,720 Court of Appeals of Kansas. Opinion filed January 6, 1995. Gerald L. Cooley, John M. Cooley, and Randall F. Larkin, of Allen, Cooley & Allen, of Lawrence, for appellant Norma W. Kampschroeder. Stephen M. Fletcher, of Overland Park, for appellant Sherryl Holmes. Byron E. Springer, of Barber, Emerson, Springer, Zinn & Murray, L.C., of Lawrence, for appellee. Before GERNON, P.J., ELLIOTT and LEWIS, JJ. LEWIS, J.: Errol Joe Kampschroeder was born to the marriage of Robert and Waneta Kampschroeder. Waneta died in April *362 1980, and Robert married Norma in October 1980. The marriage was not accepted well by Errol Joe and appears to have affected the relationship between the parties from that point on. Robert and Norma remained married until Robert's death in 1990. Upon Robert's death, most of his and Norma's assets were held in joint tenancy with the right of survivorship. Norma placed these assets in her own name and the name of Sherryl Holmes, her daughter. Errol Joe commenced the present action to impose a constructive trust on the jointly held assets. The trial court held in favor of Errol Joe, and Norma and Sherryl appeal. We affirm the decision of the trial court. Litigation of this nature is particularly fact driven. The facts in this case are not, unfortunately, unusual. This lawsuit is between a stepson and his stepmother over property owned by the son's father and stepmother's husband at the time of his death. There was an extensive trial, and the trial court made 32 detailed findings of fact. We have reviewed the record and conclude that all of the trial court's findings of fact are supported by substantial competent evidence. After hearing all the evidence, the trial court held that Norma and Robert agreed, for the convenience of the parties, to hold most of their assets in joint tenancy. This was to allow the properties accumulated by both parties or brought into the marriage by both parties to become the property of their heirs after their death. They intended that "the properties of Robert go to Errol and the properties of Norma go to Sherryl." Although we concede that a different spin might have been put on the evidence, the analysis adopted by the trial court is substantially supported by the record. The trial court found five significant factors in reaching its conclusions: "a. The Antenuptial Agreement showed their original intentions to keep their property separate. "b. Robert's attitude toward Sherryl's son was emphatic that he not receive any of Robert's property and was certainly corroborative of their intent that the properties of Robert go to Errol, and the properties of Norma go to Sherryl. "c. Clearly, the taped conversation of Norma and Nancy corroborates the testimony and position of the Plaintiff. Norma's testimony that she wanted to *363 be fair did not refer to her deciding whether commingled property should be separated because that had already been decided by the parties. That was clear by their intent as indicated on the taped conversation. When Norma indicated she wanted to be fair it is clear from the testimony she was overwhelmed by the process of having to separate the property out, of deciding just what was hers and what was Robert's, and thus would be Errol's. "d. Robert's comment: `Make certain that Norma will be cared for' is not the language or the statement of a man who was leaving his entire estate of some worth to his wife. The fact that he wanted to make certain Norma was cared for indicated to me on his part a confusion as to what the wills would be. "e. Norma's comment: `This will is no good,' certainly again corroborates the testimony or the position that this was — indeed, the intentions of the parties was to make certain that what was Robert's went to Errol, and what was Norma's went to Sherryl." Once again, the analysis of the trial court is well within the evidence shown. The five factors cited by the trial court are clearly supported by substantial competent evidence. In the final analysis, the trial court concluded that the parties had entered into an understanding where each was to have the use of the income from the property of the other until their death, at which time the property would go to their respective children. This understanding formed the basis for the consideration of the agreement. The trial court went on to conclude: "Plaintiff has by clear and convincing standards shown that there was an agreement entered into, and, in fact, always understood by Norma and Robert, that upon the death of the first to die, the income from the property brought into the marriage by that person would be enjoyed by the surviving spouse, and then pass on to the children of Norma or Robert, depending upon the situation." This conclusion is consistent with the trial court's findings of fact. Norma had breached this understanding, which gave rise to the constructive trust imposed. The trial court went on to determine which assets were subjected to the constructive trust. The total value of those assets is $323,233.11. The constructive trust is such that Norma is to receive the income from these assets until her death, at which time they are to be paid to Errol Joe. In appellants' brief is the following statement: "While defendants admit that the trial court's findings of fact are supported by substantial competent evidence in the record, defendants deny *364 that those findings of fact support the trial court's conclusions of law or its judgment." During oral argument before this court, counsel for Norma conceded that the trial court's findings of fact were supported by substantial competent evidence. On the other hand, counsel for Sherryl was unwilling to make such a concession. The problem with Sherryl's position is that her attorney did not file a separate brief. He joined in a single brief filed by the attorney for Norma. Sherryl is not in a position to contradict admissions made in the brief filed. However, we have examined the record, and we conclude that the findings of fact are supported by substantial competent evidence. An oral trust must be proved by clear and convincing evidence. Wehking v. Wehking, 213 Kan. 551, 554, 516 P.2d 1018 (1973). Upon review, we operate under the assumption that the trial court applied the correct standard of proof and was satisfied with the quantum of evidence introduced. A constructive trust arises "`wherever the circumstances under which the property was acquired make it inequitable that it should be retained by the person who holds the legal title.'" Hile v. DeVries, 17 Kan. App.2d 373, 374, 836 P.2d 1219 (1992) (quoting Clester v. Clester, 90 Kan. 638, 642, 135 Pac. 996 [1914]). An essential element of proving a constructive trust is a showing of fraud. However, there are two types of fraud, actual and constructive. "Actual fraud is an intentional fraud, and the intent to deceive is an essential element of the action. Constructive fraud, however, is a breach of a legal or equitable duty which, irrespective of moral guilt, the law declares fraudulent because of its tendency to deceive others or violate a confidence, and neither actual dishonesty of purpose or intent to deceive is necessary. [Citation omitted.]" Moore v. State Bank of Burden, 240 Kan. 382, 389, 729 P.2d 1205 (1986), cert. denied 482 U.S. 906 (1987). In the context in which this issue is presented, we are not dealing with actual dishonesty of purpose or intent to deceive. The evidence indicates Norma was guilty of a breach of duty amounting to constructive fraud. Absent actual fraud, there are two additional elements which are required to be proven. First, there must be a confidential *365 relationship. Secondly, the confidence reposed must be betrayed, or a duty imposed by the relationship must be breached. See Winsor v. Powell, 209 Kan. 292, 302-03, 497 P.2d 292 (1972). A confidential relationship is not presumed, and the burden of proving such a relationship existed rests upon the party asserting its existence. Paul v. Smith, 191 Kan. 163, Syl. ¶ 4, 380 P.2d 421 (1963). The mere fact that a transfer of property occurs between a husband and wife and no valuable consideration passes is not sufficient to raise a trust by implication. Clester v. Clester, 90 Kan. 638, 641, 135 Pac. 996 (1914). Under the facts shown, Errol Joe seeks to impress a trust on property which Norma owns by virtue of a joint tenancy contract with Robert. There is no question but that the property held in joint tenancy may be the subject of a trust. Wehking v. Wehking, 213 Kan. 551, Syl. ¶ 2; Winsor v. Powell, 209 Kan. at 300. The facts of this case are strikingly similar to those in Winsor v. Powell. In that action, the decedent, when discussing his affairs, spoke of his daughter, Sarah, and said, "`She'll do the right thing.'" 209 Kan. at 301. In this action, Robert told Errol Joe that he had $350,000, that Norma would be fair, and that Errol Joe could trust her. Robert told Errol Joe that Norma was to get the interest and, upon her death, Errol Joe was to get the principal. In addition, Norma acknowledged to Errol Joe's wife the necessity of her separating Robert's assets from her own. These facts in Winsor v. Powell were held sufficient to raise a constructive trust, and they are equally sufficient in this action. Norma and Sherryl argue that the agreement found by the court was not proven by clear and convincing evidence. "To be clear and satisfactory, evidence should be `clear' in the sense that it is certain, plain to the understanding, and unambiguous, and `satisfactory' in the sense that it is so believable that persons of ordinary intelligence, discretion, and caution may have confidence in it. Clear and satisfactory evidence is not a quantum of proof, but a quality of proof." Barbara Oil Co. v. Kansas Gas Supply Corp., 250 Kan. 438, Syl. ¶ 7, 827 P.2d 24 (1992). Norma and Sherryl suggest that there was no direct evidence of an agreement between Robert and Norma. However, we note that in the recorded conversation between Norma and Errol Joe's *366 wife, Norma acknowledges the existence of some understanding between her and Robert and indicates that in order to carry out that understanding, she must separate Robert's assets from her own. We consider this to be direct evidence of the existence of an agreement. Indeed, circumstantial evidence may be used to prove the existence of an agreement. Staab v. Staab, 160 Kan. 417, 419, 163 P.2d 418 (1945). Earlier in this opinion, we enumerated the five significant factors relied on by the court in reaching its conclusion. Norma and Sherryl argue that these factors do not show by clear and convincing standards that an agreement existed. We do not review for the quantum of evidence, but rather the quality. "On review, this court considers only the evidence of the successful party to determine whether it is substantial and whether it is of a clear and convincing quality. See Newell v. Krause, 239 Kan. 550, 557, 722 P.2d 530 (1986)." Barbara Oil Co. v. Kansas Gas Supply Corp., 250 Kan. at 448. As we review the evidence in light of our standard of review, we conclude that each of the five factors relied upon by the trial court is supported by evidence of a clear and convincing quality. In the final analysis, this was a factual situation. The facts were resolved in favor of Errol Joe, and we will not engage in factfinding or substitute our judgment on that issue. The element of a confidential relationship is shown by the evidence. Under the trial court's construction of the facts, Robert and Norma entered into an agreement in which each relied on the survivor to see that the assets were properly distributed. Robert placed trust and confidence in Norma to see that Errol Joe received the proper distribution of assets, and it would be inequitable to permit her to disregard the terms of that agreement. Finally, it is suggested that even if there was an agreement and a confidential relationship, Norma did not breach either. The argument is that under the terms of the agreement, Norma was to enjoy the income for her lifetime, and only upon her death was the principal to pass to Errol Joe. It then follows that there cannot be a breach of fiduciary duty or a betrayal of confidence unless and until Norma dies without the necessary provisions in her will. *367 While this argument may have some logical basis, it ignores the realities of the situation. After Robert's death, some of the assets were placed in joint tenancy with Norma's daughter, Sherryl. This was obviously done with the intent that upon Norma's death, these assets would pass to Sherryl. In addition, Norma now denies that any agreement existed and testified, "I never made any commitment to Bob." These facts point to a breach of the agreement by Norma. In summary, the findings of the trial court were supported by substantial competent evidence and the conclusions of law are consistent with and supported by the findings of fact. EXHIBITS 6 AND 14 THROUGH 20 Norma and Sherryl next argue that the trial court erred in admitting into evidence plaintiff's exhibit 6 and plaintiff's exhibits 14 through 20. This argument is principally based upon the premise that an inadequate foundation was shown. The trial court is possessed of discretion when ruling on admissibility of evidence. An attack on an evidentiary ruling requires that the party attacking that ruling show that the trial court abused its discretion. An abuse of discretion exists only when no reasonable person would take the view adopted by the trial court. St. Francis Regional Med. Center, Inc. v. Weiss, 254 Kan. 728, 748, 869 P.2d 606 (1994). K.S.A. 60-407(f) provides that all relevant evidence is admissible unless otherwise provided by statute. Relevant evidence is evidence having "any tendency in reason to prove any material fact." K.S.A. 60-401(b). "It is axiomatic that a foundation must be laid establishing the competency, materiality and relevancy of all evidence prior to admission." Cansler v. Harrington, 231 Kan. 66, 69, 643 P.2d 110 (1982). We conclude that the trial court did not err in admitting the exhibits in question. Exhibit 6 was a photocopy of the schedule "E" of Robert's estate tax return. This exhibit listed all of Robert's jointly held property. In addition to schedule "E," the exhibit contains a listing of separate assets held by Norma at Robert's death. The separate property was identified by Norma on direct *368 examination. We conclude this exhibit was clearly relevant and material and that a proper foundation was laid. Exhibits 14 through 20 consisted of financial records which traced the assets from the time Robert and Norma were married until Robert's death. These exhibits were clearly relevant. One of the principal issues in this action was to identify which assets originated as Robert's separate property and which assets were accumulated during the marriage. Exhibits 14 through 20 were relevant on that issue. Norma and Sherryl also argue about the authenticity of the records. They suggest that these exhibits were admitted without proper foundation, identification, or indicia of trustworthiness. The principal problem with this particular argument is that the parties stipulated as to the authenticity of the records prior to trial. We see no need to describe with particularity the evidence purported to be shown by each exhibit. It seems to us that one of the principal issues in the admission of evidence of this sort is its authenticity. The parties stipulated as to the authenticity of those records, and we find no error on the part of the trial court in admitting exhibits 6 and 14 through 20. JUDGMENT AGAINST SHERRYL HOLMES Sherryl takes issue with the trial court's finding of fact No. 32. This finding identifies assets which were brought into the marriage by Robert and later transferred by Norma into joint tenancy between herself and Sherryl. Sherryl argues that this finding of fact is not supported by substantial competent evidence. We disagree and have previously indicated our decision that all of the trial court's findings of fact were supported by substantial competent evidence. Our earlier comments are also relevant concerning the position of Sherryl in arguing that the findings of fact were not supported by substantial competent evidence. Sherryl also argues that no findings of fact remain which would support the judgment entered against her. The trial court does not suggest that Sherryl was culpable in procuring the transfers to her mother and herself as joint tenants. *369 Culpability is not the issue. The stark fact is that Sherryl is a joint tenant on a substantial amount of assets on which the trial court has imposed a constructive trust. "If the trustee in breach of trust transfers trust property and no value is given for the transfer, the transferee does not hold the property free of the trust, although he had no notice of the trust." Kline v. Orebaugh, 214 Kan. 207, Syl. ¶ 6, 519 P.2d 691 (1974). The fact that Sherryl did not procure the transfer of the property does not entitle her to hold it free of trust nor warrant a conclusion that the judgment against her is invalid. Norma testified that she wanted Sherryl to have access to the joint tenancy accounts in case they were needed to take care of Norma. In addition, Norma testified that she intended Sherryl to get the accounts upon her death. We hold that the trial court did not err in entering judgment against Sherryl. The findings of fact made by the trial court support that judgment. Affirmed.
{ "perplexity_score": 324.1, "pile_set_name": "FreeLaw" }
Operations Local Press Highlights Limo Vehicles At LCT-NLA Show East First Class Customs owner and CEO Jay Glick and his wife, Denise, were photographed inside on of their vehicles on the show floor to LCT-NLA Show East at Harrah's Atlantic City, Monday, Nov. 9, 2015. (Press of Atlantic City) ATLANTIC CITY, N.J. — The new Waterfront Converence Center at Harrah’s Resort was a makeshift showroom Monday for dozens of tricked-up, super-sized and even understated variations on the limousine, because Harrah’s is hosting an annual industry trade show that runs through Tuesday.
{ "perplexity_score": 472.1, "pile_set_name": "Pile-CC" }
Facebook n’a trouvé aucune trace d’ingérence étrangère dans le mouvement des « gilets jaunes », qui est né et s’est organisé en grande partie sur le réseau social. Les autorités françaises s’inquiétaient du rôle éventuel d’une puissance étrangère qui aurait pu, en sous-main, instrumentaliser la contestation. Trois mois plus tard, l’enquête interne au réseau social n’a rien découvert de suspect, a expliqué Nathaniel Gleicher, directeur de la cybersécurité de Facebook, dans un entretien accordé au Monde jeudi 4 avril. Lire l’entretien : le plan de Facebook pour protéger les élections européennes Des habituels « discours clivants » Ce cadre de l’entreprise californienne – qui dirige les équipes chargées de contrer les opérations de propagande – a cependant reconnu, sans les nommer, que certains acteurs avaient profité de la contestation pour diffuser leurs habituels « discours clivants » comme « à chaque fois qu’il y a un mouvement politique majeur ». « Mais savoir si nous avons détecté quelque chose d’inauthentique dans le mouvement en lui-même, c’est une question différente et nous n’avons rien repéré sur ce point. Nous n’avons rien vu d’inauthentique dans le mouvement. Nous continuons à surveiller la situation, puisque notre travail consiste justement à repérer ce genre d’activité », a encore expliqué M. Gleicher. Depuis 2016, le réseau social fait la chasse aux comportements « inauthentiques », c’est-à-dire à des comptes ou des pages Facebook qui ne sont pas ce qu’ils prétendent être et tentent de diffuser des messages pour influencer le débat politique. Le secrétariat général à la défense nationale français avait, au début de décembre, diligenté des vérifications sur les réseaux sociaux après avoir repéré l’apparition de nombreux comptes suspects et très actifs sur le sujet des « gilets jaunes », notamment sur Twitter. La question de l’ingérence politique de puissances étrangères par le biais des réseaux sociaux est un risque pris très au sérieux par les autorités françaises depuis quelques années. En particulier depuis que la Russie a mené une opération d’envergure contre l’élection présidentielle américaine, en 2016. La Russie a d’ailleurs été critiquée par certains experts dans le cadre du mouvement des « gilets jaunes ». Article réservé à nos abonnés Lire aussi « Gilets jaunes » : soupçons de manipulation sur les réseaux sociaux
{ "perplexity_score": 868.2, "pile_set_name": "OpenWebText2" }
Q: Resizeing a crystal report I have one crystal report. In this report I have 10 sections in report footer. report footer1 .... report footer10; Every section contains data. I have suppress formula at each section base on data. Ex. this formula is for one of my section " {#RTotal8} = 0 " So until here every thing is ok. If I don't have data in each section, that section does not appear it hides. But if every 10 sections hide or most of them, I have white space. I want for each section that hide, my report resize. (I want default size with consider of all section, and if all section appear so we have no white space, but if each section hide i want my report resize too) A: You can suppress the blank section In section expert there is option to suppress blank section of the report
{ "perplexity_score": 1668.6, "pile_set_name": "StackExchange" }
Q: What exactly is a "Console"? I am trying to writing a console application. It has its original console, let's name it console A. And I want this application to do the following things via C#: Open another console B in another thread, then get input from A and output it to B; type a command in A, such as dir, and show the output in B; while doing the above things (still not done yet. X_X ), I find myself lack a through understanding of what a console window is, and how it is assigned to a console application, especially the very first console when my console application starts to run. Could some one shed some light on me? Is console window physically a memory area in the video memory? Or something else? Could different threads within the same process have different console of its own for its own I/O? Many thanks... Hi, guys, now I am using one console application to start another console application in a new process. Thus I can have 2 consoles output at the same time. My understanding now is that, for Windows OS, a console is a special window, and it's a system resource that OS assigned to the application without-a-UI as a necessary user interface. Windows OS handles the wiring between the system-prepared console window with our UI-less application. A: In Windows terms, a Console is a textual GUI window that you see when you run "cmd.exe". It allows you to write text to, and read text from, a window without the window having any other UI chrome such as toolbars, menus, tabs, etc,.. To get started you'll want to load Visual Studio, create a new project and choose "Console Application". Change the boilerplate code that Visual Studio produces to: using System; using System.Text; namespace MyConsoleApp { class Program { static void Main(string[] args) { Console.Write("Hello, world!"); Console.ReadKey(); } } } When you run your application, a console window will open with the text "Hello, world!" and it'll stay open until you press a key. That is a console application. Is console window physically a memory area in the video memory? Or something else? It's not physically a memory area in video memory, it's "something else". The Wikipedia Win32 console page gives a fairly robust descrption of the ins and outs.
{ "perplexity_score": 745.4, "pile_set_name": "StackExchange" }
The present invention relates to (1) a process for the production of a low-molecular-weight allylamine polymer or an addition salt thereof, (2) a low-molecular-weight allylamine polymer or an addition salt thereof, (3) a water-resistance-imparting agent for use in an ink, which contains the same, and (4) an ink composition containing the above water-resistance-imparting agent. More specifically, it relates to (1) a process for efficiently and industrially advantageously producing a low-molecular-weight allylamine polymer or an addition salt thereof, which is improved in coloring, has little ignition residue content and is useful for use in various fields, (2) a low-molecular-weight allylamine polymer or an addition salt thereof, of which the ignition residue content, the unreacted monoallylamine content and the coloring are small or low and which is useful for various uses in the field of fine chemicals, (3) a water-resistance-imparting agent for use in an ink, which contains a low-molecular-weight allylamine polymer or its addition salt having the above properties and which is suitable for use in an inkjet recording ink, and (4) an ink composition, particularly an inkjet recording ink composition, which contains the above water-resistance-imparting agent and is excellent in water resistance and shelf life. It is hitherto known that allylamine does not easily undergo polymerization due to degradative chain transfer, and there is not much that is known concerning any effective method for producing an allylamine polymer. As a general method of producing an allylamine polymer or an addition salt thereof, there is known a method in which a monoallylamine addition salt is polymerized in water or a polar solvent in the presence of a radical polymerization initiator having a molecule containing an azo group and a cationic-nitrogen-possessing group at a temperature in the range of from 40 to 70xc2x0 C., to obtain an addition salt of an allylamine polymer, and optionally, the so-obtained addition salt of an allylamine polymer is neutralized with an alkali (e.g., JP-A-58-201811). An allylamine polymer or an addition salt thereof obtained by the above method is relatively free from being colored, and is used in the fields of dye fixing agents, binders for paper making and additives to various chemicals. On the other hand, in recent years, a low-molecular-weight allylamine polymer or an addition salt thereof is demanded in a variety of fields. When the radical polymerization initiator having a molecule containing an azo group and a cationic-nitrogen-possessing group is used as a radical polymerization initiator, however, it is required to use a large excess of an inorganic acid such as hydrochloric acid for producing a low-molecular-weight allylamine polymer or an addition salt thereof, as is described in JP-B-6-2780, so that there are involved problems that the removing of an excess of the inorganic acid is complicated and that a polymer solution obtained is liable to be colored. Further, as another method of producing a low-molecular-weight allylamine polymer or an addition salt thereof, JP-A-5-195450 discloses a method in which an aqueous solution of an addition salt of a monoallylamine is provided and allowed to react in the presence of a large amount of a peroxide-based radical polymerization initiator at a high temperature. In the above method, however, the radical polymerization initiator is used in a large amount and the polymerization is carried out under severe temperature conditions. There are therefore caused problems that an aqueous solution of an obtained low-molecular-weight allylamine polymer or addition salt thereof is inevitably colored in brown or the like, and that the coloring is liable to proceed with the passage of time. Further, when a solution prepared by polymerization according to the above method is treated with activated carbon for overcoming the above coloring, procedures of removing the activated carbon by filtration are required. Moreover, a fine powder of the activated carbon is liable to be contained in the end polymer during the filtration, and it sometimes causes a problem in some use. As a printer, a dot impact printer, a laser printer, a thermal printer, an inkjet printer, etc., are known. Of these, an inkjet printer is widely used in recent years due to characteristic features such as fast printing with a low noise, a low printing cost, downsizing and weight-decreasing feasibility based on a simple mechanism, an easiness in multi-color printing and image size increasing, non-necessity of development and fixing and adaptability of a record pattern. In the above inkjet printer, conventionally, recording is carried out by an inkjet recording method in which an ink blob is generated and ejected by an electrostatic suction method, an air compression method, a method using electric deformation of a piezoelectric element or a method using a pressure caused by heat-blowing, and further, the ink blob is allowed to adhere to a recording paper. As an ink for use with the above recording method, generally, there is used a water-based ink prepared by dissolving or dispersing a colorant such as a dye or a pigment in water, a water-soluble organic solvent or a mixture of these. In recent years, inkjet recording is required to satisfy water resistance on an ordinary paper, and as a water-based ink composition for attaining the above requirement, combinations of polyethyleneimine and polyamlines mainly including modified products thereof with dyes have been studied in various ways. For example, there have been proposed (1) a water-fast inkjet composition comprising a hydroxyethylated polyethyleneimine and a dye component (JP-A-62-119280), (2) a water-resistant water-based ink composition comprising a polyamine having a molecular weight of at least 300 and having primary amino groups, an anionic dye, a stabilizer and a wetting agent (JP-A-2-255876 and JP-A-3-188174) and (3) a water-based ink comprising a specific anionic dye and amino acid type polyamine or polyethyleneimine (JP-A-8-113743). However, the inkjet composition in the above (1) has a problem that since polyethyleneimine contains hydroxyethyl groups and hydrophilic nature increases depending upon the degree of a content thereof, so that water resistance decreases. The water-based ink composition in the above (2) involves a problem that a shelf life is poor since polyethyleneimine specifically described in Example highly possibly attacks an anionic dye. Further, the water-based ink in the above (3) has a problem that it is required to select a dye suitable for imparting water resistance from an anionic metal-containing dye, a metal-free dye having an anionic group and an azo group in specific positions or a metal-free azo dye having an aromatic ring, which limits dye selection to a narrow range, so that it is difficult to prepare an ink having a desired hue and a desired color density. On the other hand, attempts have been made to use an allylamine polymer as a water-resistance-imparting agent in an ink composition. In this case, however, there are required complicated procedures of reacting an allylamine hydrochloride polymer with a dye (dye containing acid salt such as sulfonic acid salt, etc.) to prepare a dye containing an allylamine polymer as a counter cation and removing an inorganic salt, etc., by isolating it as a solid before use, as is described in JP-A-63-33484. Further, for avoiding the above complicated procedures, an allylamine polymer is converted to a free polymer in advance, and further, an inorganic salt, etc., are removed. Even in this case, when the allylamine polymer is used in an ink, the ink is liable to cause aggregation, which causes a problem in use. Under the circumstances, a first object of the present invention is to provide a process for efficiently and industrially advantageously producing a low-molecular-weight allylamine polymer or its addition salt, which is improved in coloring, has little ignition residue content and is useful for various fields. A second object of the present invention is to provide a low-molecular-weight allylamine polymer or its addition salt, which has a high quality and is useful for various uses in the field of fine chemicals. Further, a third object of the present invention is to provide a novel water-resistance-imparting agent for use in an ink, which is suitable for use in an inkjet recording ink, and a fourth object of the present invention is to provide an ink composition, particularly an inkjet recording ink composition, which contains the above water-resistance-imparting agent and is excellent in water resistance and shelf life. For achieving the above objects, the present inventors have made diligent studies and as a result, have found that the first object can be accomplished by distilling a low-molecular-weight allylamine polymer solution containing an unreacted monoallylamine and salt to distill off the unreacted monoallylamine, then subjecting the residue to electrodialysis, and optionally, further carrying out acid treatment. Further, it has been found that a low-molecular-weight allylamine polymer having an ignition residue content equivalent to, or lower than, a specific value, having a weight average molecular weight in a specific range and preferably having an unreacted monoallylamine content and an absorbance, measured by a certain method, which are equivalent to, or smaller than, specific values, or an addition salt of a low-molecular-weight allylamine polymer having the above properties can meet the second object, that a water-resistance-imparting agent containing a low-molecular-weight allylamine polymer having the above properties or an addition salt thereof can meet the third object, and further that an ink composition comprising a low-molecular-weight allylamine polymer having the above properties or an addition salt thereof can meet the fourth in object. The present invention has been made on the basis of the above findings. That is, the first object of the present invention is achieved by a process for the production of a low-molecular-weight allylamine polymer having a weight average molecular weight of 250 to 4,000 or an addition salt thereof, which comprises distilling a low-molecular-weight allylamine polymer solution containing an unreacted monoallylamine and a salt, thereby distilling off the unreacted monoallylamine, then, subjecting a residue to electrodialysis, and optionally carrying out acid treatment. Further, the second object of the present invention is achieved by a low-molecular-weight allylamine polymer having an ignition residue content of 5% by weight or less and a weight average molecular weight of 250 to 4,000, or an addition salt of a low-molecular-weight allylamine polymer having the above properties. Furthermore, the third object of the present invention is achieved by a water-resistance-imparting agent for an ink, comprising a low-molecular-weight allylamine polymer having an ignition residue content of 5% by weight or less and a weight average molecular weight of 250 to 4,000, or an addition salt of a low-molecular-weight allylamine polymer having the above properties. Moreover, the fourth object of the present invention is achieved by an ink composition comprising (A) a colorant and (B) a water-resistance-imparting agent containing a low-molecular-weight allylamine polymer having an ignition residue content of 5% by weight or less and a weight average molecular weight of 250 to 4,000, or an addition salt of a low-molecular-weight allylamine polymer having the above properties.
{ "perplexity_score": 280.9, "pile_set_name": "USPTO Backgrounds" }
Case Study Literature Products We are one of the UK's leading manufacturers of plaster, plasterboard and drywall systems. Knauf products and systems continue to be specified on some of the UK's largest and most prestigious projects. We offer a complete range for any drylining project - no matter what the size - and a complete service to back them up. Our range of quality plasterboards includes standard wallboard for general use and a comprehensive range of high performance boards with specific characteristics to enhance performance in the areas of: Moisture resistance Sound reduction and reverberation Impact resistance Fire protection Control of water vapour Thermal insulation Each of our boards is colour-coded to the industry standard to ease recognition. They are available with tapered or square edge profiles and in a wide range of sizes suitable for all applications. Knauf AQUAPANEL® cement board is an extremely durable tile backer providing a solid substrate for wet indoor areas such as bathrooms, shower rooms and wet rooms. Resistant to mould and mildew, AQUAPANEL® will not deteriorate in water. It retains its strength even if fully immersed.
{ "perplexity_score": 472.2, "pile_set_name": "Pile-CC" }
Q: what is the mel scale? I am not sure I understand what the Mel Scale is. Googling doesn't give me various answers. I seem to be getting the same response again and again. Which would be something like: "The mel scale reflects how people hear musical tone" First of all, does the concert pitch has a specific frequency? So why do we even have a scale stating how do people hear it? I am currently trying to understand how MFCC uses them, and it seems like it maps the frequency to the Mel scale, or there are some filter banks which are applied on the given frames A: To stand on @hotpaw2's answers, think of Mel as one kind of pyscho-acoustic scale, derived from a set of experiments on human subjects, others are Bark & ERB Why have such a scale? Imagine a 100 Hz sine wave playing in your head, .... wait for it to stick ...okay... Good. Imagine now, a 200 Hz sine wave playing ... marinate in it. Good work. Now compare the two, they have some "perceptual distance". Perceptual only because we're using your soft-grey matter as a measuring instrument. Finally, if you were you repeat this experiment with 1100 Hz & 1200 Hz, and again with 10,100Hz and 10,200Hz, your opinion of this percpetual distance might diminish, i.e. 100 & 200 Hz can sound "farther apart" than do 10,100 & 10,200Hz, even though in all cases the differences are equivalent to 100Hz. These pyschoacoustic scales try to capture these distances from low (20Hz) to high frequency (20kHz).
{ "perplexity_score": 636.6, "pile_set_name": "StackExchange" }
INRIA Sophia-Antipolis (France)
{ "perplexity_score": 118.6, "pile_set_name": "Github" }
sha256:61a90f96abbafffce04b1224c4e45898d61e5eda81c8898aa3fa78ef998978c8
{ "perplexity_score": 12405.9, "pile_set_name": "Github" }
Q: Why are there so many files in the Silverlight Bin when I build my project? There's just so many files. The XAP file, DLL file, HTML file, PDB File, and then I have all these folders with 2 letter words where inside each folders are 2 dll files. What do these files (in general) represent? Thanks A: The XAP file represents the Silverlight application (Silverlight Application Package, the X likely refers to the XAML base of Silverlight). DLL files are your application's dependencies, some of which are created to facilitate serialization and localization. Because Silverlight is browser-hosted, it requires an HTML page to host the control when you debug it. The PDB file contains the "program database" which includes all the metadata Visual Studio uses to provide those nice descriptive tooltips when you mouse over a variable in the IDE. Folders with two letters represent country codes and are used for localization.
{ "perplexity_score": 863.6, "pile_set_name": "StackExchange" }
The induction of a specific pigment cell type by total genomic DNA injected into the neural crest region of fish embryos of the genus Xiphophorus. We report genetic transformation in an intact higher organism, i.e., in xiphophorine fish. The gene to be transferred (Tu) is responsible for the formation of T-melanophores in the platyfish and is involved in the formation of melanomas in platyfish-swordtail hybrids. After injection of Tu-donor DNA into the neural crest region of embryos from Tu-free fish, some of the recipients developed T-melanophores. In a few cases, one or two single T-melanophores were formed during late embryo-genesis. In most cases, many T-melanophores developed in young fish and were arranged in several colonies or in a pattern. DNase-degraded Tu-donor DNA, Tu-free fish DNA, as well as DNA from E. coli and adenovirus-2, did not induce T-melanophores. When using DNA from different strains of Tu-donor fish which differed in a regulating gene linked to Tu, the percentages of fish showing T-melanophores paralleled the degree of phenotypic expression of the Tu gene in the DNA donor. The results suggest that the Tu gene has been successfully transferred together with the linked regulating gene.
{ "perplexity_score": 424.3, "pile_set_name": "PubMed Abstracts" }
1. Technical Field The present invention relates to an electronic apparatus, a method, and a computer-readable medium for receiving and reproducing broadcast programs and contents on networks. 2. Related Art In the past, electronic apparatuses such as a television apparatus receive broadcast signals of terrestrial broadcasting, cable television broadcasting, and satellite broadcasting, and allow users to view broadcast programs. The broadcast programs are previously scheduled to be broadcasted in predetermined time slots. So when users want to view broadcast programs, they must view the programs in broadcast time slots of the broadcast programs or set recording reservation of the broadcast programs. Meanwhile, as a broadcast environment has developed recently, services that allow users to view contents corresponding to program contents of broadcast programs through a network such as the Internet have come into use. Most of the services employ a so-called video on demand (VOD) system. Users can view contents anytime they want without being bound by broadcast time slots. However, there are various ways of obtaining contents that can be viewed with the VOD, so users must search the plurality of ways of obtaining desired contents. Furthermore, users can refer to electronic program guides (EPGs) obtained by electronic apparatuses through broadcast waves or through a network, select desired broadcast programs, and confirm their schedules. However, the users cannot obtain from the EPGs whether they can view contents corresponding to the program contents of the broadcast programs through the Internet with VOD. So, the users are forced to execute troublesome, additional search for contents of VOD by using, for example, search engines on the Internet. Japanese Patent Application JP 2003-125305 describes a television receiver capable of obtaining a program title and uniform resource locator (URL) referring to program information in an electronic program guide to a hard disk recorder connected to the television apparatus while viewing a broadcast program, searching the Internet using a personal computer for program auxiliary information on the broadcast program based on the program title and the URL, and displaying the program auxiliary information. However, in the television receiver described in JP 2003-125305, the information retrieved from the Internet and displayed on the personal computer is merely auxiliary information regarding the broadcast program such as, for example, comments on the broadcast program and information on a cast, but information regarding a content on the Internet corresponding to the program content of the broadcast program is never displayed. Thus, users are still bound by broadcast schedules to view broadcast programs, and are forced to execute troublesome search operations to confirm whether a content corresponding to the program content of the broadcast program exists on the Internet.
{ "perplexity_score": 357, "pile_set_name": "USPTO Backgrounds" }
'Self-Obsessed' Natural Leaders may Not be Good Bosses; Here's Why Share A new study has revealed that people who are naturally dominant often succeed in reaching to the top of the corporate ladder but their self-obsession and boastful arrogance makes them worst bosses. 'Self-Obsessed' Natural Leaders may Not be Good Bosses; Here's Why Advertisement University of Amsterdam researchers divided 150 participants into groups of three. One in each was made leader and the other two were told they could advise, but that the leader would make the decision, the Daily Mail reported. Advertisement The groups were then supposed to select the best candidate for a job. Some of the 45 items of information about the candidates were provided to all three in the group, and some to only one. They would not pick the best candidate until they used all the information - a test of communication. The narcissism of the leaders was then gauged and their effectiveness was rated. Group members rated the most narcissistic leaders as most effective, but actually the groups led by the biggest egotists never chose the best candidate. "There's no doubt narcissism can sometimes be useful in a leader," Psychologist Barbora Nevicka, who led the study, said. Your comments are automatically posted once they are submitted. All comments are however constantly reviewed for spam and irrelevant material (such as product or personal advertisements, email addresses, telephone numbers and website address). Such insertions do not conform to our policy and 'Terms of Use' and are either deleted or edited and republished.Please keep your comments brief and relevant.This section may also have questions seeking help. If you have the information you are welcome to respond, but please ensure that the information so provided is genuine and not misleading. Disclaimer - All information and content on this site are for information and educational purposes only. The information should not be used for either diagnosis or treatment or both for any health related problem or disease. Always seek the advice of a qualified physician for medical diagnosis and treatment.Full Disclaimer
{ "perplexity_score": 450.6, "pile_set_name": "Pile-CC" }
San Catervo, Tolentino The Cathedral of San Catervo is a Roman Catholic church located in Tolentino, Province of Macerata, Region of Marche. The 13th-century Gothic style church is now generally contained by a newer Neoclassical facade. History A church or chapel dedicated to Saint Catervus existed at the site and was rebuilt in a by Benedictine monks, starting in 1256. The presbytery of the prior gothic-style church stood at the site of the modern facade. At the time, the Chapel of San Catervo, now called the Chapel of the Santissimi Trinità was erected. In 1820, a reconstruction began, initially guided by the painter Giuseppe Lucatelli and followed by an architect from Macerata, Conte Spada. The portal on the left side of the church belongs to the original church. The Chapel of San Catervo contains a delicately carved 4th-century marble Ancient Roman sarcophagus, which retains its original dedicatory inscription to Flavius Julius Catervus, a noble of senatorial rank, who had been prefect and died at the age of 56 yrs. Tradition holds that he brought Christianity to Tolentino. The 15th century frescoes in the chapel are attributed to Francesco da Tolentino; the depict the Evangelists and Sibyls, a Madonna and Child with Saints Catervus and Sebastian, an Adoration of the Magi, and a Crucifixion. References Catervo Tolentino Tolentino Category:Ancient Roman sarcophagi
{ "perplexity_score": 136.9, "pile_set_name": "Wikipedia (en)" }
Official press releases and photographs from Disney and Florida attractions. Disneyland Resort's Downtown Disney District welcomed three food trucks earlier this week that will be making regular appearances while the area awaits the construction of a new hotel. Several restaurants in the area, including Rainforest Cafe, ESPN Zone and Earl...
{ "perplexity_score": 426, "pile_set_name": "Pile-CC" }
What do we really know about dark energy? In this paper, we discuss what we truly know about dark energy. I shall argue that, to date, our single indication for the existence of dark energy comes from distance measurements and their relation to redshift. Supernovae, cosmic microwave background anisotropies and observations of baryon acoustic oscillations simply tell us that the observed distance to a given redshift z is larger than the one expected from a Friedmann-Lemaître universe with matter only and the locally measured Hubble parameter.
{ "perplexity_score": 402.4, "pile_set_name": "PubMed Abstracts" }
Q: Oracle identity column and insert into select Oracle 12 introduced nice feature (which should have been there long ago btw!) - identity columns. So here's a script: CREATE TABLE test ( a INTEGER GENERATED ALWAYS AS IDENTITY PRIMARY KEY, b VARCHAR2(10) ); -- Ok INSERT INTO test (b) VALUES ('x'); -- Ok INSERT INTO test (b) SELECT 'y' FROM dual; -- Fails INSERT INTO test (b) SELECT 'z' FROM dual UNION ALL SELECT 'zz' FROM DUAL; First two inserts run without issues providing values for 'a' of 1 and 2. But the third one fails with ORA-01400: cannot insert NULL into ("DEV"."TEST"."A"). Why did this happen? A bug? Nothing like this is mentioned in the documentation part about identity column restrictions. Or am I just doing something wrong? A: I believe the below query works, i havent tested! INSERT INTO Test (b) SELECT * FROM ( SELECT 'z' FROM dual UNION ALL SELECT 'zz' FROM dual ); Not sure, if it helps you any way. For, GENERATED ALWAYS AS IDENTITY Oracle internally uses a Sequence only. And the options on general Sequence applies on this as well. NEXTVAL is used to fetch the next available sequence, and obviously it is a pseudocolumn. The below is from Oracle You cannot use CURRVAL and NEXTVAL in the following constructs: A subquery in a DELETE, SELECT, or UPDATE statement A query of a view or of a materialized view A SELECT statement with the DISTINCT operator A SELECT statement with a GROUP BY clause or ORDER BY clause A SELECT statement that is combined with another SELECT statement with the UNION, INTERSECT, or MINUS set operator The WHERE clause of a SELECT statement DEFAULT value of a column in a CREATE TABLE or ALTER TABLE statement The condition of a CHECK constraint The subquery and SET operations rule above should answer your Question. And for the reason for NULL, when pseudocolumn(eg. NEXTVAL) is used with a SET operation or any other rules mentioned above, the output is NULL, as Oracle couldnt extract them in effect with combining multiple selects. Let us see the below query, select rownum from dual union all select rownum from dual the result is ROWNUM 1 1
{ "perplexity_score": 969.9, "pile_set_name": "StackExchange" }
[Clinical evaluation of CEA in colorectal carcinoma]. Carcinoembryonic antigen (CEA) titer (Dinabot-Kit) were determined in proven 177 patients with colorectal carcinoma preoperatively, and at routine intervals following operation. The assay was positive in 39.1% with stage I, II, 65.9% with III, 65.9% with IV and 85.7% with V. Elevated CEA levels were noted in those who had infiltration of cancer cells extending through the proper muscle layer. In 79.2% of curative resections CEA levels returned to normal within one month, but the titers remained elevated in 73.3% of palliative resections. Among 26 patients with recurrent disease, 16 had a hepatic metastasis showing a previous or simultaneous CEA rise, whereas 10 had a local recurrence with a slow rise or normal. In addition, a quantitative study of CEA in extracts of 87 tumors was made in order to examine the factors affecting the level of circulating CEA. There was no significant difference between the CEA contents of the tumor and its level of circulating CEA. The level of circulating CEA might be influenced by the spread cancer cells, rather than the tumor contained CEA.
{ "perplexity_score": 405.5, "pile_set_name": "PubMed Abstracts" }
Development of a Meteorological Particle Sensor for the Observation of Drizzle Richard Lewis, NOAA/NWS, Sterling, VA; and S. G. White The National Weather Service (NWS), Federal Aviation Administration (FAA), and Department of Defense (DOD) began installing the Automated Surface Observing Systems (ASOS) in the mid 1990s. At the completion of the ASOS program more than 900 sites, mostly at large and medium size airports, were installed nationwide. It was recognized that ASOS, due to limitations in sensor technology, was limited in its capability to report some of the so-called subjective elements, so provisions were made to permit augmentation of the ASOS observation by human observers. However, while ASOS has manual augmentation at most large airports, these account for only about 15% of the total. Thus an ongoing program in the NWS, called Product Improvement, has been tasked with investigating ways to improve ASOS in many areas, including its capability to observe subjective weather elements. This paper addresses the NWS efforts to solve a specific ASOS limitation, for which manual augmentation is required, the inability to identify drizzle. In 2000 the NWS procured a sensor that was to be tested for its capability to measure particle size with sufficient accuracy to distinguish drizzle from rain. The ability to quantitatively distinguish drizzle from rain was considered a necessary first step in understanding the nature of drizzle and developing a strategy for objectively identifying the occurrence of drizzle. The specific sensor procured for this test was not considered a candidate for use on ASOS due to its high cost. However, it was hoped that it would provide an objective technique for identifying drizzle and thus could be used as a reference sensor against which candidate replacement precipitation identification sensors could be tested. The result of this procurement was the purchase of what was designated the Meteorological Particle Sensor (MPS) from Droplet Measurement Technologies Inc. The results of three years of testing the MPS in the field at the NWS Sterling Test Facility are described in this paper.
{ "perplexity_score": 233.1, "pile_set_name": "Pile-CC" }
While the updated ribbon will eventually roll out to all Office apps, Microsoft knows the sudden change can impact your work. That's why it's taking things slow: the redesigned version is making its way to Word on Office.com today, and then to Outlook for select Insiders in July. It doesn't have a schedule for the rest of the Office apps just yet. Since people tend to rely on muscle memory for Excel and Powerpoint, those two aren't getting the redesign anytime soon. Word on Windows will also have to wait as Microsoft collects feedback from a broader set of users. The tech giant assures, however, that you can still go back to the old ribbon after the new one arrives on those applications. In addition, Microsoft has also redesigned its icons for the sake of those with low visibility. It cranked up their contrast and made them crisper and sharper in order to prevent them from blending into the background. Like the new ribbon, these more visible icons will also make their debut in the web version of Word at Office.com. They'll then make make their way to Word, Excel and PowerPoint for Windows later this month, to Outlook for Windows in July and then to Outlook for Mac in August. Finally, Microsoft is turning Search into a more powerful tool. It can now bring up recommendations powered as soon as you place the cursor in the box, based on what its AI and the Microsoft Graph knows about your habits. That may sound like old news for some commercial users who can already see the behavior, but it's still bound to surprise some people when it rolls out to all commercial users of Outlook on the web in August.
{ "perplexity_score": 420.9, "pile_set_name": "OpenWebText2" }
Pacific Island LGBTIQ Elders Pen Powerful Response To Israel Folau A group of Pacific Island LGBTIQ elders have penned a powerful open letter calling for rugby star Israel Folau to be more respectful amid the furore over his anti-gay social media comment. Folau came under intense criticism for writing a now-deleted comment on Instagram that “God’s plan” for gay people was “hell” unless they “repented for their sins”. Rugby Australia chief executive Raelene Castle said on Tuesday after a meeting that Folau acknowledged the offence his comments had caused and would “go away and think about” his social media conduct. “For him he is proud of what he is and what he stands for, so he wants to make sure that we are not asking him to compromise those beliefs,” Castle said. “But at the same time very much we explained to him that this is challenging for us and… how can he find a way that makes sure that he is not disrespectful, but it doesn’t compromise his own personal beliefs.” Meanwhile, a group of LGBTIQ elders from Tonga and Samoa have written a powerful response to Folau amid the furore over the comment. Tongan elder Joleen Mataele Brown, who is a transgender ‘leiti’, and Samoans Fiaailetoa Kenneth Moala and Ymania Brown from transgender advocacy group Samoa Fa’afafine Association penned the open letter encouraging Folau to be respectful and follow the principles of his Christian faith. “We believe that God has no other plan for gay people other than to celebrate their humanity and the deeds they perform in loving unconditionally their fellow human beings,” they wrote. “You profess to be a Christian and a follower of Jesus Christ yet where is that Christ-like love for your fellow Australian and Pasefika LGBTI family? “If you opened your heart, and see Jesus for what he really is, full of light and love and grace and humility and non-judgment and peace and acceptance, you too can be a part of Jesus’s team even if you sin differently to [us]. “A lot of people look up to you, Israel. You and your words have power, privilege and meaning. Young kids look up to you as an award-winning sportsman. What you say stays in the hearts and minds of young Australians and Pasefika children. “And that hatred, that vilification, that condemnation you have for LGBTIQ Australians and Pasefika is planted as seeds in their young, impressionable minds. “One day, when an Australian or Psefika LGBTIQ person is walking home at night, one of those young minds, now grown up, may decide to turn that seed into action and end up hurting, injuring, maiming and possibly ending the life of that Australian and Pasefika LGBTIQ individual. “We have been in hospital ICU units in Samoa, New Zealand, and Australia when our faces and bodies have been beaten beyond recognition, we have held lifeless bodies who have succumbed to suicide, we have comforted parents of Australian and Pasefika LGBTI children who have died because of this mindless bullying. “And you may deny that, as ‘I am only saying what I feel, and I will not be held responsible for the actions of another human being,’ but we know better because for over 40 years we have been at the receiving end of that condemnation, hatred, and vilification.” They called on Folau to make a donation to a crowdfunding campaign raising money to repair the Tonga Leitis Association’s drop-in centre, which is as a local shelter for LGBTIQ youth rejected by their families and communities. The building was badly damaged in Tropical Cyclone Gita in February, and the group has so far raised more than $7500 through the campaign. If you need someone to talk to, help is available from QLife on 1800 184 527 or online at QLife.org.au, Kids Helpline on 1800 55 1800, Lifeline on 13 11 14, or beyondblue on 1300 22 4636.
{ "perplexity_score": 423, "pile_set_name": "Pile-CC" }
"Admit it." "We're lost." "No,we're not." "The Naveer Pass is just beyond that ridge." "Hey,Wizard,you know what power I wish you had?" "The power to admit when you're wrong." "Right now I'd settle for a silencing spell." "At the next tavern, we're asking for directions." " Kahlan." " Wait." "Kahlan Amnell?" "*******" "My dear Kahlan,I knew Mira would lead us to you." "Serena?" "Zeddicus Zu'l Zorander." "My old friend." "Mother Confessor?" "This is Richard Cypher." "The Seeker of Truth." "This is truly an honor." "Erin." "Tara." "Alana." "I thought you were all in hiding." "We were." "But Darken Rahl's spies were more insidious than we thought." "They uncovered our houses of refu." "There's no safety for Confessors in the Midlands anymore." "That's why we've been searching for you." "We must leave until the time of Rahl's defeat." "We have no choice but to seek sanctuary in Valeria." "Valeria?" "It's an island,hidden by magic." "Far off the coast." "So you're fleeing?" "Only temporarily." "When Rahl is vanquished we will return." "But Mother Confessor, we're the source of justice in the Midlands." "The people need us now more than ever." "Rahl wants a world without justice." "And by killing us, he'll get it." "We wanted to give you the opportunity to join us." "You know I can't abandon my mission." "I expected so." "But the decision need to be yours." "Mother Confessor, we need to keep moving." "Rahl's quads are tracking us." "We've managed to stay ahead of them, but we can't let our guard down." "We'll escort you to the coast." "Will the other Confessors meet us there?" "There are no other Confessors,Kahlan." "We are all that's left." "=YTET-ÒÁµéÔ°×ÖÄ"×é=- ʱ¼äÖá: ßÇÈâÈâ "ð¼ý¼ý ·­Òë: º£ÙÅ®Óù ´ó·ð´º´º ²"²" СÖísisi ±¾³ÇÁ" У¶Ô:" "Aiiiii" "̽Ë÷Õß´"˵ µÚÒ"¼¾ µÚ10¼¯" "Are you sure leaving the Midlands is right thing to do?" "Isn't it time for Confessors to stand and fight?" "We did." "We made our stand at the Temple of Rondaxe." "The quads blocked all the doors." "There was no way out." "We fought well, but there were too many." "Demmin Nass has begun taking trophies." "I'm so sorry." "I farebetter than most." "Before they could take my other hand,or worse," "Mother Confessor saved me." "What is it?" "Someone's coming." "I guess those quads weren't as far away as we'd hoped." "Stay where you are!" "Wait." "Please,I'm not here to harm you." "Who are you?" "My name is Finn." "I'm looking for Dennee." "My sister?" "What do you want with her?" "I've been searching for months." "A few weeks ago I heard Confessors were nearby." "Please,I have to find her." "She's dead." "My mistress is dead." "Your mistress?" "If she's dead, how will I know what to do?" "Kahlan,this man is still under coession." "How is that possible?" "I thought the only way the spell is broken is" "Is when a Confessor dies." "That means Dennee is still alive." "But when I left her..." "Dennee." "Take it." "Take the Book." "Find him." "I'm not leaving you." "This is more important than me." "You know that." "Please,Kahlan." "May the Spirits protect you, little s" "Go." "She" " She must have survived somehow." "Rahl must have her." "We know what he does to Confessors." "Which is why we can't risk going after her." "What?" "Mother Confessor is right." "Kahlan,I loved your sister as if she were my own, but it could be a trap." "Why would Rahl keep her alive when he's killed so many others?" "I've already left her behind once." "I won't do it again." "I know it's hard, but my duty is to ensure the survival of the remaining Confessors." "Just as your duty is to protect the Seeker on his mission." "Right now... my mission Kahlan's sister." "But Dennee could be anywhere." "Mira could find her." "Dennee was willing to sacrifice her life for me." "No doubt she'd do the same for any of you." "How can we not even try to save her?" "We should make camp here." "Kahlan tells me you fought bravely at the battle of Rondaxe." "Perhaps I can give you back a little of what you've lost." "I..." "I don't believe it." "Thank you." "Still as powerful as I rember." "I'm just sorry I wasn't powerful enough to stop Darken Rahl before he decimated your order." "When I was just an acolyte, and you took me under your wing..." "Do you rember what you told me?" "You said that real power was not just in the magic that we wield." "It was in our ability to make difficult choices." "And leaving behind everything and everyone couldn't have been easy for you,Zeddicus." "But if you hadn't, the Seeker would not have bee and there would be no hope for the Midlands." "I don't understand why Dennee never told me about you." "How did you come to know my sister?" "I tried to kill her." "I was an assassin from the Order of Blood, and sent by Darken Rahl to murder her." "During the battle, I was confessed by her." "I haven't seen her in months." "Dennee told me she had to undertake a delicate mission." "She promised she'd return to me when it was done." "She would've kept that promise if I hadn't left her for dead." "Kahlan!" "Kah" " Hey,hey." "We're going to find her." "Okay?" " What's she saying?" " It's Dennee." "She's close." "A fortress." "It's not a fortress." "It's a prison." " And Dennee's inside." " Dennee!" "We can't just charge into a D'Haran prison." "But a Mord-Sith could." "Zedd, Can you do a little magic tailoring?" "Sir." "A Mord-Sith approaches." "Tell your warden I have a very special prisoner for him." "The Seeker?" "You captured him single-handed?" "You dare question a Mord-Sith?" "Take me to the warden." "I have urgent intelligence from Lord Rahl." "Intelligence that must be discussed in private." "Leave us." "So what is this intelligence?" "Command me,Confessor." "You have a prisoner I want to see." "Dennee." "Kahlan." "Yes,it's me little sister." "You came for me." "I should have never left you." "This is the Seeker." "Yes." "Then you completed the mission." "I feared you were dead." "Thank the Spirits you're not." "Are you all right?" "Did they hurt you?" "No." "But they're going to take my baby." "You're with child." "They mean to take my sister's child." "What do you know about this?" "Darken Rahl wants to raise a Confessor as his own." "To twist the child into a monster that would do his bidding." "Can you walk?" "I think so." "You should hurry." "General Nass rides for the prison as we speak." "What's going on?" "Prisoner transfer." "But my orders are to hold the Confessor here until General Nass arrives." "Your orders have changed." "Our Dennee is safe." "Dennee!" "By the Spirits,you're with child." "Is our baby all right?" "Finn is the father?" "Mother Confessor,our numbers were dwindling." "And Finn was already confessed." "So I took him as a mate." "Finn is strong." "And with Rahl hunting Confessors,I could think of no one better to protect the child." "Joyous news." "Another Confessor will be born just when we needed her most." "Dennee." "You must've known you were carrying the baby when we set off for the Boundary." "Why didn't you tell me?" "If you knew would you have let me jn you on such a perilous journey?" "No,I wouldn't." "And I couldn't let you go alone." "We need to get moving." "The D'Harans will be coming after us." "General Nass,we received orders not to expect you." "What orders?" "General." "I have the orders right here." "Where is the prisoner?" "B-Being delivered to Rahl." "By whom?" "By the Mord-Sith." "She had also captured the Seeker." "That was no Mord-Sith." "It was a Confessor." "Ready your men." "If you can deliver the Confessor-child and the Seeker to Lord Rahl,he may forgive your failure." "Isn't there a shorter route to the west?" "You smell that?" "These are Thelusian pines." "They'll cover any scent from us the D'Harans might pick up." "We'll be harder to track that way." "Good." "Because we may need to sto" "You're doing great!" "I just need you to try again." "Come on." "Yes." "Keep breathing." "Dennee,the baby's in the wrong position." "What?" "We need to turn the baby around." "I don't wanna lose my baby." "Your baby's going to be fine." "Let me try." "Have you done this before?" "I grew up on a farm,rember?" "Okay." "I don't" " I don't wanna lose her." "Okay,Dennee,try now,push." "It's a boy." "What's wrong?" "The child must die." "It's not your fault,Dennee." "It's no one's fault." "There's nothing you could've done to prevent this." "Kahlan,what's going on?" "We're going to need Kreeg root for the ritual." "Will someone tell me what's happening here?" "Male Confessors can't be allowed to live." "Their souls must be purified by the Ritual of the Waters before they pass to the underworld." "Ritual?" "What are you talking about?" "We have to drown the child." "That's insane." "A Confessor giving birth to a male child is extraordinarily rare." "But if one is born,he cannot be allowed to grow into adulthood." "Male Confessors are unable to control their power." "Once they reach manhood they can't resist using it for wicked ends." "So they are killed at birth." "Your numbers are dwindling and now you want to kill one of your own just because you think it might be evil?" "Mothers of male Confessors have often thought as you do." "One foolish young Confessor couldn't bear to have her son killed, so she raised him in secrecy." "She thought that the love in her heart would be powerful enough to prevent him from turning to the dark ways." "But when the boy came of age,his bloodlust was insatiable." "My child was only 11 years old when I had to kill him." "Well,just because it happened with your son doesn't mean it's going to happen with Dennee's." "He's just a baby." "There's still time to watch him grow." "To know if he's gonna be evil or not." "Kahlan." "You can't go along with this." "You think this is easy for me?" "This is my nephew." "Richar I know that's it's hard for you to understand,but ancient ways must be honored, and the longer we allow this child to live, the harder it's going to be to do what must be done." "Doing it now is a less cruel fate for both the family and the child." "Finn will take the child and perform the Ritual of the Waters." "Is there no other way?" "You know there is not." "Get away from him." "You cannot wish evil away." "You cannot love evil away." "You can only destroy it." "You're not going to hurt this baby." "D'Harans." "Th" "We need to move now." "I can get the D'Harans off our trail." "But you have to promise me nobody will harm this baby while I'm gone." "Dala oil and Kreeg root." "The Ritual of the Waters." "The Confessor gave birth to a boy." "A female Confessor-child was quite a prize,but what Lord Rahl wouldn't give for a male Confessor." "And if they are running from us,they haven't had time yet to perform the ritual." "Sir." "Their tracks lead this way." "Follow them." "We must save that child." "Did you lose them?" "They found the tracks I left." "They're heading in the wrong direction." "Good." "But they're not gonna give up so easily." "They know it's a boy." "And it seems Rahl really wants to get his hands on a male Confessor." "It's the darkness reaching for the darkness." "But he will not have it." "Where's the baby?" "Finn's taken him." "You were supposed to keep him safe." "I'm sorry,Richard." "You're right.I don't.You promised me." "Because I knew you'd do anything to protect the child." "And so should you." "Richard,letting him live would be a violation of everything we're taught." "You can't ask me to go against my beliefs." "And you can't ask me to go against mine." "Finn,don't." "I can't disobey my mistress." "You ha to do what your mistress wants,right?" "Yes." "She wants me to drown our son." "Are you sure that's what Dennee wants?" "The Mother Confessor ordered her to do it." "Doesn't your mistress also command you with her heart?" "You heard her when she gave birth." "She didn't want her baby to die." "You know her heart better than anyone,Finn." "You know what she wants." "She wants her baby... to live." "I will proct him with my life." "You gave the child to the Seeker?" "I thought that's what you'd want." "No,the child is evil and must die." "Then I have failed you." "Which way did the Seeker go?" "To the north." "I can get him back." "No." "You' go with Alana." "Take Dennee and the others to the shore." "The Wizard,Kahlan and I will continue after the child." "Take Mira as your guide." "We will rejoin you at the shore once we have the child." "Then we can complete the ritual and sail to the island." "Mother Confessor,let me go on to track Richard." "I'll move faster on my own." "Sir,we've lost their trail." "They can't have gotten far." "And for your sake,that child had better be alive when we find them." "Okay." "It's okay." "We're safe now." "Everything's gonna be all right." "Stay away,Kahlan." "Richard,wait." "What are you planning on doing?" "Just keep running with the child?" "What your people want to do is barbaric." "I know it must seem that way, but you have to understand that boy is a threat to everything that we're fighting for." "How do you know that if none of them have been allowed to live?" "It's too dangerous to rely on hope." "Hope?" "Isn't that what we're fighting for?" "Kahlan." "I was a child that was hunted." "Darken Rahl tried to kill me because of his blind faith in prophecy." "Are you asking me not to believe in prophecy?" "No,I'm asking you to believe in me." "He's hungry." "We need to find some food." "My father used to give this to me when I was a baby." "There you go." "I thought you might like that." "Richard,what are we gonna do with him?" "Well,I was thinking." "Maybe we can take him to the Valley of Thandor." "The duty of the Sisters of the Light is to protect the children at Thandor." "They'd never take in a male Confessor." "No one will." "We're on our own,Richard." "You're never on your own." "Richard,wait." "We don't need to fight amongst ourselves." "We have enough enemies already." "This baby isn't one of them." "But he could be." "Darken Rahl was once a child." "Think of all the death and suffering he's caused." "If you had a chance to prevent that,wouldn't you?" "Inevitably,evil is in its nature." "Well,it's not in mine." "No one is going to hurt this baby." "Enough debate,Zeddicus." "If you can't control the Seeker,I will." "Is your devotion so great that you'd threaten to confess the Seeker?" "Oh,I have no intention of confessing him." "Command me,Mother Confessor." "Zedd?" "What have you done?" "You have betrayed your order,Kahlan." "Who are you to question my judgment, when yours is so obviously impaired by your feelings for the Seeker?" "You would forsake everything you believe." "Everything you've lived for,for a man who can never love you." "Zeddicus,get the boy." "Zedd,you can't do this!" "You don't want to hurt us." "It's no use,Richard." "He's been confessed." "He's not Zedd anymore." "I don't wanna fight you,Zedd." "And he doesn't want to fight you,Seeker." "Give me the child and you can continue with your mission." "The mission?" "You jeopardized that when you confessed a Wizard of the First Order." "As soon as I have the child I will to continue on as the Seeker's Wizard." "All will be as it was." "No." "Very well." "Make him leave." "Richard!" "Mother Confessor,you're going to kill him!" "Kahlan,this has gone on long enough." "Your mission is to protect the Seeker." "You know as well as I his life is more important than the child's." "So give him to me." "It shouldn't be a difficult decision,Kahlan." "Saving the man you love." "Don't do it,Kahlan." "Kahlan,no." "It's okay,little one." "It'll all be over soon." "I'm sorry I went against your will by trying to save our child." "I failed you." "No,you didn't fail me." "You were doing my will." "Dennee,you can't put such ideas in his head." "Why not?" "Mother Confessor knows what must be done." "We cannot defy her." "Would you feel the sam if it were your child?" "It has been done this way for thousands of yea." "There are only six of us left." "Do the ancient ways still make sense?" "I'm so sorry,chard." "But I couldn't let them hurt you." "It's not your fault." "With Zedd confessed and the Sword of Truth gone..." "It's hopeless." "There's always hope." "We're too late,aren't we?" "Mother Confessor has taken the child to the shore to drown him." "Can we catch her in time?" "She's confessed Zedd." "And taken the Sword of Truth." "What are we gonna do?" "We're going to get some help." "The tracks end here." "Where did he go?" "I'm right here." "I'm unarmed." "Then you are a fool." "Kahlan,now!" "Command me,Confessor." "What is it,Mother Confessor?" "The others." "They should already be here." "Someone's coming." "Stop them." "You'll never know how greatly you've disappointed me,Kahlan." "I always thought that one day you would be Mother Confessor." "How wrong I was." "You were taught all your life to know the difference between right and wrong." "This child... could destroy everything we've been fighting for." "No,we're fighting for a world with less brutality." "Would killing that child give us that?" "Yes." "No!" "Zedd?" "Zedd." "Zedd!" "Richard." "I'm just glad I didn't hurt you." "KA She dedicated her life to keeping the Midlands free from the tyranny of Darken Rahl." "For that she will be rembered." "Spirits,watch over her as she has watched over so many." "We need to choose a Mother Confessor." "We already have." "It's you,Kahlan." "I'm" " I'm honored but..." "I must continue to protect the Seeker." "Just as we must stay in the Midlands torotect the people from Rahl's injustice." "Take Mira." "She will keep you safe." "Thank you for coming back for me." "I asked the Spirits to protect you,and they did." "They'll be fine." "You said it yourself." "Dennee and Finn can't be confessed,so their son's touch will have no effect." "He can't be seduced by his own power if he's unable to use it." "Once they reach Valeria,there won't be anyone to corrupt." "With no one to corrupt him,they can raise him to be a force for good." "But what if we're wrong?" "What if we've unleashed a horrible evil into the world?" "What then?" "=YTET-ÒÁµéÔ°×ÖÄ"×é=- ʱ¼äÖá: ßÇÈâÈâ "ð¼ý¼ý ·­Òë: º£ÙÅ®Óù ´ó·ð´º´º ²"²" СÖísisi ±¾³ÇÁ" У¶Ô:" "Aiiiii/font"
{ "perplexity_score": 404.7, "pile_set_name": "OpenSubtitles" }
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
57
Edit dataset card