text
string
id
string
dump
string
url
string
date
string
file_path
string
license_abbr
string
license_version
string
license_location
string
license_in_head
bool
license_in_footer
bool
license_element
string
license_left_context
string
license_right_context
string
potential_licenses
dict
license_parse_error
bool
license_disagreement
bool
language_script
string
language
string
language_score
float64
grep is a Linux command line tool used for text-searching in files. It is a versatile tool, capable of searching through single and multiple files as well as recursively through directories. grep does not utilise a search index; instead, it performs searches in real-time and does so very quickly. It matches a pattern of characters in a specific file or directory of files and then displays the results. grep command with examples The basic grep command requires only two arguments, (i) the pattern or string to look for and (ii) the name of the file. grep [string] [file] For example, to search for the word cyberspace in the file words : $ grep cyberspace words cyberspace cyberspace's cyberspaces The results will display the entire line where the string is found. If there are no results, the command prints nothing. How to find words with spaces or special characters with grep Search patterns can be enclosed in either single or double inverted commas. This allows a search of more than one word or words with spaces or special characters. $ grep "cyberspace's" words cyberspace's The same rule applies to file names. Enclose the file name in either single or double inverted commas if it contains spaces: $ grep "cyberspace's" 'words of the world.txt' cyberspace's How to ignore case when searching with grep grep is case sensitive so search for England instead of england. To ignore case, specify the -i flag: $ grep -i england words England England's How to find the exact word with grep grep prints every match found by default. $ grep Peter words Peter Peter's Peters Petersen Petersen's Peterson Peterson's Peters's To find the exact word, specify the -w flag: $ grep -w Peter words Peter Peter's How to find the line number with grep grep can display the line number in the results. This is useful when searching through a large file. To display line numbers in results, specify the -n flag. $ grep -n -w Peter words 14768:Peter 14769:Peter's 14770:Peters 14771:Petersen 14772:Petersen's 14773:Peterson 14774:Peterson's 14775:Peters's Using regular expressions (regex) with grep when searching The search query can be fine-tuned with regular expressions for more accurate results. To search for exactly Peter and not wanting to see Peter’s, a regex can be added. In this example, $ specifies end-of-line: $ grep Peter$ words Peter Search multiple files using grep command One grep command can search the contents of multiple files. To query more than one file, separate the file names with a space. $ grep -w cyberspace$ words "words of the world.txt" words:cyberspace words of the world.txt:cyberspace How to search one directory using grep command All files in one directory can be searched by using an asterisk (*). $ grep cyberspace * american-english:cyberspace british-english:cyberspace words:cyberspace How to search a directory recursively using grep command To search a directory and all of its sub-directories, the -r flag can be used. $ grep -r cyberspace my-sub-dir/file-x.txt:cyberspace american-english:cyberspace british-english:cyberspace words:cyberspace
<urn:uuid:0e1d5d82-80c4-411d-91b6-df96c15e529d>
CC-MAIN-2024-51
https://cybrkyd.com/post/introduction-to-grep-command/
2024-12-09T04:29:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00617.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997762
For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser. Please enter your login details in the form.
<urn:uuid:40870a5c-42f2-4617-8174-15d05afc8224>
CC-MAIN-2024-51
https://data.aad.gov.au/aadc/user/login.cfm?nocache=2BA129D6-AB99-4B40-BD66375A172E4D71
2024-12-09T04:16:44Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00617.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.998546
Journal of Iran's Economic Essays; "Jostarhaye Eghtesadiye Iran; No. 20 Description Journal of Economic Essays; an Islamic approach (JEE) is an open-access double-blind peer-reviewed academic quarterly journal that publishes original research, written with an Islamic approach in various Economic areas including Islamic economics and finance, Iran's economy, Fiqh (Islamic jurisprudence) and economics, philosophy of economics, economic theory, ethics and business, Islamic banking, economic development, and social security institution in Islam. JEE especially welcomes comparative articles that study the western and Muslim scholars' viewpoints about important economic issues to find the best answer to theoretical and applied questions and also to explore their differences and similarities with the aim of bringing them closer to each other. This journal accepts analytical articles that reread Muslim scholars' ideas according to new approaches in economics, moral philosophy, Islamic banking and finance, social security, econometrics, and Islamic economic institutions. Therefore, it aims to serve the interests of a wide range of thoughtful and academic readers, economists, philosophers, theologians, banking and finance experts and others interested in the multidisciplinary study of economics and Islam (including Fiqh "Islamic jurisprudence"). We hope that this publication creates an atmosphere of constructive dialogue on different economic topics between national and international scholars by which it could have a role in the growth of Islamic economic thought in Iran. In addition, Islamic solutions to the economic problems of Iran and the world will be examined and analyzed, and they will be presented to the policy makers to help improve the Islamic economic system. Major Topics The Journal publishes papers, including the following fields: - Islamic economics and finance; - Iran's economy; - Fiqh (Islamic jurisprudence) and economics; - Philosophy of economics; - Economic theory; - Ethics; - Islamic economic institutions - Islamic banking; - Economic development; - Social security.
<urn:uuid:9258bfe0-bc0b-41e1-92fe-78de6da21f81>
CC-MAIN-2024-51
https://data.mendeley.com/datasets/66nvngs4cg/1
2024-12-09T03:51:50Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00617.warc.gz
by
4.0
json-ld
true
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ true ], "location": [ "json-ld" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.993737
default search action - 2023 - [c5]Camille Leurquin, William Vandendaele, Romain Gwoziecki, B. Mohamad, Ghislain Despesse, Ferdinando Iucolano, Roberto Modica, Aurore Constant: Drain voltage impact on charge redistribution in GaN-on-Si E-mode MOSc-HEMTs. IRPS 2023: 1-6 - 2022 - [c4]Camille Leurquin, William Vandendaele, Aby-Gaël Viey, Romain Gwoziecki, René Escoffier, R. Salot, Ghislain Despesse, Ferdinando Iucolano, Roberto Modica, Aurore Constant: Novel High Voltage Bias Temperature Instabilities (HV-BTI) setup to monitor RON/VTH drift on GaN-on-Si E-mode MOSc-HEMTs under drain voltage. IRPS 2022: 10 - 2021 - [c3]B. Rrustemi, Aby-Gaël Viey, Marie-Anne Jaud, François Triozon, William Vandendaele, Charles Leroux, Jacques Cluzel, S. Martin, Cyrille Le Royer, Romain Gwoziecki, Roberto Modica, Ferdinando Iucolano, Fred Gaillard, Thierry Poiroux, Gérard Ghibaudo: Reliable method for low field temperature dependent mobility extraction at Al2O3/GaN interface. ESSDERC 2021: 295-298 - [c2]Aby-Gaël Viey, William Vandendaele, Marie-Anne Jaud, Jean Coignus, Jacques Cluzel, Alexis Krakovinsky, Simon Martin, Jérome Biscarrat, Romain Gwoziecki, Veronique Sousa, Fred Gaillard, Roberto Modica, Ferdinando Iucolano, Matteo Meneghini, Gaudenzio Meneghesso, Gérard Ghibaudo: Study on the difference between ID(VG) and C(VG) pBTI shifts in GaN-on-Si E-mode MOSc-HEMT. IRPS 2021: 1-8 - 2019 - [c1]Aby-Gaël Viey, William Vandendaele, Marie-Anne Jaud, Romain Gwoziecki, A. Torres, Marc Plissonnier, Fred Gaillard, Gérard Ghibaudo, Roberto Modica, Ferdinando Iucolano, Matteo Meneghini, Gaudenzio Meneghesso: Influence of Gate Length on pBTI in GaN-on-Si E-Mode MOSc-HEMT. IRPS 2019: 1-6 - 2018 - [j1]Salvatore Tudisco, Francesco La Via, Clementina Agodi, Carmen Altana, Giacomo Borghi, Maurizio Boscardin, Giancarlo Bussolino, Lucia Calcagno, Massimo Camarda, Francesco Cappuzzello, Diana Carbone, Salvatore Cascino, Giovanni Casini, Manuela Cavallaro, Caterina Ciampi, Giuseppe Cirrone, Giacomo Cuttone, Alberto Fazzi, Dario Giove, Giuseppe Gorini, Luca Labate, Gaetano Lanzalone, Grazia Litrico, Giuseppe Longo, Domenico Lo Presti, Marco Mauceri, Roberto Modica, Maurizio Moschetti, Annamaria Muoio, Franco Musumeci, Gabriele Pasquali, Giada Petringa, Nicolò Piluso, Giacomo Poggi, Stefania Privitera, Sebastiana Puglia, Valeria Puglisi, Marica Rebai, Sabina Ronchin, Antonello Santangelo, Andrea Stefanini, Antonio Trifirò, Massimo Zimbone: SiCILIA - Silicon Carbide Detectors for Intense Luminosity Investigations and Applications. Sensors 18(7): 2289 (2018) manage site settings To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q. Unpaywalled article links Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy. Archived links via Wayback Machine Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy. Reference lists Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar. Citation data Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar. OpenAlex data Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex. last updated on 2024-10-07 21:24 CEST by the dblp team
<urn:uuid:38d5e271-78a8-4170-bcea-db97f44f249c>
CC-MAIN-2024-51
https://dblp.dagstuhl.de/pid/224/5026.html
2024-12-09T02:57:08Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00617.warc.gz
zero
1.0
json-ld
true
false
null
null
null
{ "abbr": [ "zero", "zero", "zero", "zero" ], "in_footer": [ false, false, true, true ], "in_head": [ true, true, false, false ], "location": [ "json-ld", "json-ld", "a_tag", "a_tag" ], "version": [ "1.0", "1.0", "1.0", "1.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.926179
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-05-15 UTC."],[[["This page documents the `NullError.Reason` enumeration for the CreativeWrapperService in Google Ad Manager API."],["`NullError.Reason` indicates the reasons for validation errors related to null values."],["The `NULL_CONTENT` reason signifies that a specified list or container should not include any null elements."],["The documentation is part of the Google Ad Manager API version v202405, using the namespace `https://www.google.com/apis/ads/publisher/v202405`."]]],[]]
<urn:uuid:8cab70be-21d8-4829-8881-c2b0cdb24676>
CC-MAIN-2024-51
https://developers-dot-devsite-v2-prod.appspot.com/ad-manager/api/reference/v202405/CreativeWrapperService.NullError.Reason
2024-12-09T03:35:52Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00617.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.75878
Issue When yum downgrade is run on an installed package, does yum first delete the package and then re-install the previous package? As a corollary, what argument is passed to the %preun scriptlet of the package on yum downgrade, 0 or 1? Solution Good question. From a quick skim of the yum 3.2.22 sources (from my CentOS 5 machine) it looks like it is a single transaction that is remove + install. Which would make me think %preun would get 1 passed to it. The built-in help for yum.YumBase.downgrade also has this to say: $ python Python 2.4.3 (#1, Jan 9 2013, 06:47:03) [GCC 4.1.2 20080704 (Red Hat 4.1.2-54)] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> import yum >>> help(yum.YumBase.downgrade) Help on method downgrade in module yum: downgrade(self, po=None, **kwargs) unbound yum.YumBase method Try to downgrade a package. Works like: % yum shell <<EOL remove abcd install abcd-<old-version> run EOL Answered By - Etan Reisner Answer Checked By - Willingham (WPSolving Volunteer)
<urn:uuid:84ad8925-80b0-46aa-966d-774e74d7fef6>
CC-MAIN-2024-51
http://www.linuxfixes.com/2024/01/solved-what-happens-on-yum-downgrade.html
2024-12-10T08:50:14Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00741.warc.gz
by-sa
2.5
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa", "by-sa", "by-sa" ], "in_footer": [ false, false, false ], "in_head": [ false, false, false ], "location": [ "a_tag", "a_tag", "a_tag" ], "version": [ "2.5", "3.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.990418
So you want to setup some outdoor Christmas LED lights around your home and garden, and you tried solar for a while, but realized they really aren’t very powerful, and don’t last very long, so you figured you need to use “low voltage” lights. Low voltage lights have a mini power adapter and a long… read more…
<urn:uuid:055aad33-55f1-4e17-9dcc-9fd26bf61090>
CC-MAIN-2024-51
http://www.zoyinc.com/?tag=setup
2024-12-10T08:36:57Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00741.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997221
Remote sensing of soot carbon – Part 1: Distinguishing different absorbing aerosol species Abstract. We describe a method of using the Aerosol Robotic Network (AERONET) size distributions and complex refractive indices to retrieve the relative proportion of carbonaceous aerosols and free iron minerals (hematite and goethite). We assume that soot carbon has a spectrally flat refractive index and enhanced imaginary indices at the 440 nm wavelength are caused by brown carbon or hematite. Carbonaceous aerosols can be separated from dust in imaginary refractive index space because 95 % of biomass burning aerosols have imaginary indices greater than 0.0042 at the 675–1020 nm wavelengths, and 95 % of dust has imaginary refractive indices of less than 0.0042 at those wavelengths. However, mixtures of these two types of particles can not be unambiguously partitioned on the basis of optical properties alone, so we also separate these particles by size. Regional and seasonal results are consistent with expectations. Monthly climatologies of fine mode soot carbon are less than 1.0 % by volume for West Africa and the Middle East, but the southern African and South American biomass burning sites have peak values of 3.0 and 1.7 %. Monthly averaged fine mode brown carbon volume fractions have a peak value of 5.8 % for West Africa, 2.1 % for the Middle East, 3.7 % for southern Africa, and 5.7 % for South America. Monthly climatologies of free iron volume fractions show little seasonal variability, and range from about 1.1 to 1.7 % for coarse mode aerosols in all four study regions. Finally, our sensitivity study indicates that the soot carbon retrieval is not sensitive to the component refractive indices or densities assumed for carbonaceous and free iron aerosols, and the retrieval differs by only 15.4 % when these parameters are altered from our chosen baseline values. The total uncertainty of retrieving soot carbon mass is ∼ 50 % (when uncertainty in the AERONET product and mixing state is included in the analysis).
<urn:uuid:59b4f686-f548-4f69-9fcb-9deb554e8599>
CC-MAIN-2024-51
https://acp.copernicus.org/articles/16/1565/2016/acp-16-1565-2016.html
2024-12-10T08:19:00Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00741.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by", "by", "by" ], "in_footer": [ true, true, false, false ], "in_head": [ false, false, false, false ], "location": [ "a_tag", "a_tag", "a_tag", "a_tag" ], "version": [ "4.0", "4.0", "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.990355
Visit http://science.nasa.gov/ for more. Earth is surrounded by electrons that can be disruptive to our technology. NASA is using high-altitude balloons and spacecraft to monitor and understand these particles in the radiation belts surrounding our planet. Click here to see more videos: https://al ScienceCasts: lunas asombrosas Cuando empezó la era espacial, los exploradores ansiaban visitar los planetas del Sistema Solar. Sin embargo, con el paso de los años, los astrónomos se han dado cuenta de que las lunas del Sistema Solar pueden ser aún más interesantes. Para saber más, visita http://science.nasa.gov/. Haz clic aquí para ver más vídeos: https://alugha.com/NASA More videos by this producer Explore how astronomers and scientists use astronomical units to measure distances in the solar system in this video adapted from NASA. The astronomical unit (au) -- equal to the average distance from Earth to the Sun -- is a convenient unit of measure when talking about distances in the solar syste
<urn:uuid:86826631-05b5-451a-aec1-b6f1a4042b2e>
CC-MAIN-2024-51
https://alugha.com/videos/df1478d0-183b-11eb-9934-ab811e0c1505?lang=spa
2024-12-10T08:47:10Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00741.warc.gz
by-sa
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.837336
AssertionError class Error thrown by the runtime system when an assert statement fails. Constructors Properties - hashCode → int - The hash code for this object. no setterinherited - message → Object? - Message describing the assertion error. final - runtimeType → Type - A representation of the runtime type of the object. no setterinherited - stackTrace → StackTrace? - The stack trace at the point where this error was first thrown. no setterinherited
<urn:uuid:2ac64d12-0f89-4e05-bb5a-334ced9f36de>
CC-MAIN-2024-51
https://api.dart.dev/stable/3.2.0/dart-core/AssertionError-class.html
2024-12-10T07:38:31Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00741.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.990246
The content at the Search Engine Roundtable are the sole opinion of the authors and in no way reflect views of RustyBrick ®, Inc Copyright © 1994-2024 RustyBrick ®, Inc. Web Development All Rights Reserved. This work by Search Engine Roundtable is licensed under a Creative Commons Attribution 3.0 United States License. Creative Commons License and YouTube videos under YouTube's ToS.
<urn:uuid:8a6f5d7d-b066-4675-9c97-3b4ad073d24e>
CC-MAIN-2024-51
https://www.seroundtable.com/archives/by-date?page=537
2024-12-10T09:22:44Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00741.warc.gz
by
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.9247
The print edition of my book, Socratic and Platonic Political Philosophy: Practicing a Politics of Reading, has been ready since May, but I asked Cambridge to hold back its release until they completed development of… This drawing from Mathew Paris (1217-1259), made famous more recently by Derrida's disquisition on it in The Postcard, appears in a 13th century manuscript that contains a series of fortune-telling tracts. Now, with the generous… Christopher LongApril 20, 2014 With the spring release of Socratic and Platonic Political Philosophy: Practicing a Politics of Reading, we are working hard to create the infrastructure for the online discussion the enhanced digital book will be designed to… Christopher LongMarch 11, 2014 Now that Socratic and Platonic Political Philosophy: Practicing a Politics of Reading is in galley proofs, the contours of the enhanced digital book are beginning to take shape. In order to determine the features of… Christopher LongJanuary 5, 2014 The CBO is Cambridge Books Online, the electronic books platform for Cambridge University Press (CUP). This is the platform into which Mike Chaplin and a team of programmers working for CUP will build the Socratic and… Christopher LongAugust 6, 2013 As my book, Socratic and Platonic Political Philosophy: Practicing a Politics of Reading, goes officially into editorial production on the print side of Cambridge University Press, I have started to work with Mike Chaplin on… Christopher LongAugust 4, 2013 Consider this an invitation to continue along a path we have traversed together over the past three years. This path, which began in the wake of my 2009 Summer Faculty Teaching and Learning with Technology Fellowship,… Christopher LongJune 25, 2012
<urn:uuid:054ded26-ba9f-4d25-9c56-65e833d65327>
CC-MAIN-2024-51
http://cplong.org/category/the-evolving-book/
2024-12-11T13:10:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.993254
Push that pixel Hello Anon, Login? richer drawer Pixels pushed on 2014-11-10 richer drawer by Crustolio ❤ SWANKYART is a new kind of pixel art community based on daily challenges of restricted palettes & effects using the online version of the pixel paint package, Swanky Paint. Swanky Art is optimised for browsers that support Native Client but should run fine on any browser with WebGL support. Star Bugs and Issues Found a bug? Post them and feature requests on the forum . Artwork created for Swanky Art released under the license. Made by W E T G E N E S 2016
<urn:uuid:2f20fae8-57e1-44a6-a7dd-5027fa238d6f>
CC-MAIN-2024-51
http://paint.wetgenes.com/paint/list/16384
2024-12-11T13:13:18Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.99244
Push that pixel Hello Anon, Login? true eat Pixels pushed on 2015-04-21 true eat by Crustolio ❤ true eat by ithebatman ❤ SWANKYART is a new kind of pixel art community based on daily challenges of restricted palettes & effects using the online version of the pixel paint package, Swanky Paint. Swanky Art is optimised for browsers that support Native Client but should run fine on any browser with WebGL support. Star Bugs and Issues Found a bug? Post them and feature requests on the forum . Artwork created for Swanky Art released under the license. Made by W E T G E N E S 2016
<urn:uuid:47554fde-96fc-43a3-a21c-8a281283ebd3>
CC-MAIN-2024-51
http://paint.wetgenes.com/paint/list/16546
2024-12-11T12:20:42Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.995681
Of this man's offspring God has brought to Israel a Savior, Jesus, as he promised. The book of the genealogy of Jesus Christ, the son of David, the son of Abraham. The Lord swore to David a sure oath from which he will not turn back: “One of the sons of your body I will set on your throne. “I, Jesus, have sent my angel to testify to you about these things for the churches. I am the root and the descendant of David, the bright morning star.” to the only God, our Savior, through Jesus Christ our Lord, be glory, majesty, dominion, and authority, before all time and now and forever. Amen. And we bring you the good news that what God promised to the fathers, For we ourselves were once foolish, disobedient, led astray, slaves to various passions and pleasures, passing our days in malice and envy, hated by others and hating one another. But when the goodness and loving kindness of God our Savior appeared, he saved us, not because of works done by us in righteousness, but according to his own mercy, by the washing of regeneration and renewal of the Holy Spirit, whom he poured out on us richly through Jesus Christ our Savior, not pilfering, but showing all good faith, so that in everything they may adorn the doctrine of God our Savior. For the grace of God has appeared, bringing salvation for all people, training us to renounce ungodliness and worldly passions, and to live self-controlled, upright, and godly lives in the present age, waiting for our blessed hope, the appearing of the glory of our great God and Savior Jesus Christ, who gave himself for us to redeem us from all lawlessness and to purify for himself a people for his own possession who are zealous for good works. concerning his Son, who was descended from David according to the flesh When your days are fulfilled and you lie down with your fathers, I will raise up your offspring after you, who shall come from your body, and I will establish his kingdom. And we have seen and testify that the Father has sent his Son to be the Savior of the world. But grow in the grace and knowledge of our Lord and Savior Jesus Christ. To him be the glory both now and to the day of eternity. Amen. that you should remember the predictions of the holy prophets and the commandment of the Lord and Savior through your apostles, For if, after they have escaped the defilements of the world through the knowledge of our Lord and Savior Jesus Christ, they are again entangled in them and overcome, the last state has become worse for them than the first. For in this way there will be richly provided for you an entrance into the eternal kingdom of our Lord and Savior Jesus Christ. Simeon Peter, a servant and apostle of Jesus Christ, To those who have obtained a faith of equal standing with ours by the righteousness of our God and Savior Jesus Christ: To Titus, my true child in a common faith: Grace and peace from God the Father and Christ Jesus our Savior. And in this way all Israel will be saved, as it is written, “The Deliverer will come from Zion, he will banish ungodliness from Jacob”; The God of our fathers raised Jesus, whom you killed by hanging him on a tree. God exalted him at his right hand as Leader and Savior, to give repentance to Israel and forgiveness of sins. God, having raised up his servant, sent him to you first, to bless you by turning every one of you from your wickedness.” This Jesus God raised up, and of that we all are witnesses. Being therefore exalted at the right hand of God, and having received from the Father the promise of the Holy Spirit, he has poured out this that you yourselves are seeing and hearing. For David did not ascend into the heavens, but he himself says, “‘The Lord said to my Lord, “Sit at my right hand, until I make your enemies your footstool.”’ Let all the house of Israel therefore know for certain that God has made him both Lord and Christ, this Jesus whom you crucified.” Being therefore a prophet, and knowing that God had sworn with an oath to him that he would set one of his descendants on his throne, Has not the Scripture said that the Christ comes from the offspring of David, and comes from Bethlehem, the village where David was?” They said to the woman, “It is no longer because of what you said that we believe, for we have heard for ourselves, and we know that this is indeed the Savior of the world.” And the angel said to them, “Fear not, for behold, I bring you good news of great joy that will be for all the people. For unto you is born this day in the city of David a Savior, who is Christ the Lord. and has raised up a horn of salvation for us in the house of his servant David, And behold, you will conceive in your womb and bear a son, and you shall call his name Jesus. He will be great and will be called the Son of the Most High. And the Lord God will give to him the throne of his father David, and he will reign over the house of Jacob forever, and of his kingdom there will be no end.” saying, “What do you think about the Christ? Whose son is he?” They said to him, “The son of David.” And the crowds that went before him and that followed him were shouting, “Hosanna to the Son of David! Blessed is he who comes in the name of the Lord! Hosanna in the highest!” She will bear a son, and you shall call his name Jesus, for he will save his people from their sins.” Rejoice greatly, O daughter of Zion! Shout aloud, O daughter of Jerusalem! Behold, your king is coming to you; righteous and having salvation is he, humble and mounted on a donkey, on a colt, the foal of a donkey. “In that day I will raise up the booth of David that is fallen and repair its breaches, and raise up its ruins and rebuild it as in the days of old, In those days and at that time I will cause a righteous Branch to spring up for David, and he shall execute justice and righteousness in the land. In those days Judah will be saved, and Jerusalem will dwell securely. And this is the name by which it will be called: ‘The Lord is our righteousness.’ “For thus says the Lord: David shall never lack a man to sit on the throne of the house of Israel, “Behold, the days are coming, declares the Lord, when I will raise up for David a righteous Branch, and he shall reign as king and deal wisely, and shall execute justice and righteousness in the land. In his days Judah will be saved, and Israel will dwell securely. And this is the name by which he will be called: ‘The Lord is our righteousness.’ Declare and present your case; let them take counsel together! Who told this long ago? Who declared it of old? Was it not I, the Lord? And there is no other god besides me, a righteous God and a Savior; there is none besides me. I, I am the Lord, and besides me there is no savior. In that day the root of Jesse, who shall stand as a signal for the peoples—of him shall the nations inquire, and his resting place shall be glorious. There shall come forth a shoot from the stump of Jesse, and a branch from his roots shall bear fruit. And he said, “Hear then, O house of David! Is it too little for you to weary men, that you weary my God also? Once for all I have sworn by my holiness; I will not lie to David. His offspring shall endure forever, his throne as long as the sun before me. Like the moon it shall be established forever, a faithful witness in the skies.” Selah And there is salvation in no one else, for there is no other name under heaven given among men by which we must be saved.” Unless otherwise indicated, all content is licensed under a Creative Commons Attribution License. All Scripture quotations, unless otherwise indicated, are taken from The Holy Bible, English Standard Version. Copyright ©2001 by Crossway Bibles, a publishing ministry of Good News Publishers. Contact me: openbibleinfo (at) gmail.com.
<urn:uuid:07e2cde4-717e-4fdf-87c6-55256c1641ef>
CC-MAIN-2024-51
http://www.openbible.info/labs/cross-references/search?q=Acts+13%3A23
2024-12-11T12:26:26Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.998982
[from our own Correspondent.] But little has transpired since the date of my past letter worthy of notice. The enemy has advanced up to the north bank of the North Anna and has kept up an regular artillery fire from the hills overlooking river, for the purpose, doubtless of ascertaining the strength and direction or Gen. Lee's lines. In one or two places he has thrown a force across the river, but it is not believed that he has as yet intended to make a serious effort to force his way to the south side, his chief object being to acquire as much information as possible in regard to the Confederate position, preparatory to ulterior operations. In the course of his reconnaissance yesterday, he gained the south bank in front of Pickett's division, but was soon driven back with a loss of some forty prisoners, including an Adjutant, and almost including a Brigadier General, who was saved alone by the fleetness of his horse. Since it is now well known to the enemy, there can be no harm in stating that our picket line extends along the south bank of the river, and that the success with which the enemy has forced this line at more points than one should occasion no uneasiness whatever. As at Fredericksburg, so at this place, our due position is on the range of bills on the south side of the river, since a position along the banks of the river would not be so good, inasmuch as it would expose our men to a plunging fire from the enemy's well served artillery on the Caroline hills beyond. Nor could any advantage we might gain be so well followed up if our lines were further advanced. In other words, the public may rest assured that Gen Lee has placed his forces exactly where they should be placed. The Federals have eyes as well as we, and Grant has very sharp eyes, and he and they know what is here stated just as well as we do. But will Grant attempt to cross three rivers — the North Anna, Little river, and the South Anna — and move upon Richmond by this line, or will he march further around to the right and below the points of confluence of these streams, and endeavor to cross one--the Pamunkey --at or near Hanover Court-House? The reconnaissances which he has made since his arrival here were undertaken, doubtless, to enable him to decide this very question. It is reported that he moved a considerable force yesterday up the North Anna upon our left; if this be true it is not improbable that he has decided that it is better to attempt to effect the passage of a single stream than of three, each one of which presents a strong line of defence. A great battle may be precipitated almost any day, but there is no special reason for believing that one will occur this week, and it may be postponed for some time longer With the exception of an irregular shelling of the woods on the southside of the river by the enemy perfect quit has prevailed to day along the lines. The weather is superb. Sallest.
<urn:uuid:dd5e2173-6f9c-4ba8-a727-3533a7ffbe63>
CC-MAIN-2024-51
http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2006.05.1077%3Aarticle%3D11
2024-12-11T12:41:54Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by-sa
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.999396
The revolutionary Polaroid SX-701 camera (1972) was a marvel of engineering: the world's first instant SLR camera. This iconic camera was the brainchild of Dr. Edwin Land, a genius who co-founded Polaroid, invented polarized sunglasses, helped design the optics for the U-2 spy plane, and created a theory of color vision. The camera used self-developing film2 with square photos that came into view over a few minutes.3 The film was a complex sandwich of 11 layers of chemicals to develop a negative image and then form the visible color image. But the film was just one of the camera's innovations. The camera required complex new optics to support the intricate light path shown below. The components included a flat Fresnel mirror, aspherical lenses, and a moving mirror. These optics could focus from infinity down to a closeup of 10 inches. The optics are even more amazing when you consider that the camera folded flat, 3 cm thick and able to fit in a jacket pocket. But I'm going to focus on the camera's electronics, powered by a custom flat battery pack. When the shutter button is pressed, the camera carried out several tasks with precision timing. First, a solenoid closes the shutter, blocking the entry of light into the camera. Next, the motor is turned on, causing the camera's internal mirror to flip up to uncover the film. The solenoid is then de-energized, causing the shutter to open. The film exposure time depends on the light level; at the appropriate time, the solenoid closes the shutter again to stop exposure. Finally, the motor runs again to eject the film and reset the mirror. I'm helping the openSX70 project by reverse-engineering the chips on the exposure control board. This board contains three surface-mount ICs: a chip to read the light intensity from a photodiode, a timer chip to control how long the shutter blades are open, and a power control IC to drive the motor and solenoids.4 The development of this board was contentious, with Fairchild and Texas Instruments battling to supply the electronics for millions of cameras.5 The exposure control board went through three designs as Fairchild and Texas Instruments struggled to meet Polaroid's price target of just $5.75. First, Texas Instruments built a control board from a ceramic substrate with laser-trimmed resistors. The expensive components put the board way over budget at $100 so Polaroid used these boards only in prototype cameras. Fairchild's design was accepted by Polaroid even though its cost of $20 still exceeded the target. Fairchild's board was used from 1972 to 1973, but Texas Instruments fought back with an all-new design that cost only $4.10. This TI board was the long-term winner, and is the one I am examining in this post. The optical chip The exposure control board automatically adjusts the exposure time based on the amount of ambient light. Ambient light is measured by the optical chip, a package that combines a photodiode and a silicon die in one small package. The silicon die is protected by epoxy, but the larger photodiode is exposed so external light can fall on it. To measure the ambient light, the chip implements the integrator circuit below. The photodiode generates a small current that depends on the light level. This current is integrated over time using a capacitor until a threshold is reached. By opening the shutter during this interval, the film is exposed for the desired amount of time. (The film's exposure depends on the total amount of light received, which is the same value that the integration calculates.) The op-amp die outputs the voltage across the capacitor without draining the capacitor in the process. The photo below shows the silicon die under a microscope. The chip, made by Texas Instruments, is dominated by the zig-zags forming two interlocking JFET transistors. A JFET is a special type of transistor, used before MOSFETs became popular. These transistors have very low input currents, so they won't drain the capacitor as it charges. The interlocking layout ensures that both transistors are at the same temperature, so the circuit will stay accurate even if the chip heats up unevenly. The chip also contains NPN and PNP transistors, resistors, and a capacitor (the large pink square labeled 28710). By reverse-engineering the die, I created the schematic below. It is an op-amp, measuring the difference between two inputs (one tied to ground). The two JFET (Q12/Q13) transistors are configured as a standard differential pair circuit. A fixed current (from the current mirror Q8/Q6) is fed into the transistors, and whichever transistor has the higher input will pass almost all the current. The result is amplified by Q5 for the output. In addition to the op-amp circuitry, the chip contains a reset circuit to discharge the capacitor before use (Q1/Q2). (The internal capacitor C1 stabilizes the op-amp; the integration capacitor is external.) The power driver chip Next, the power chip drives solenoids and the motor to activate the camera's mechanisms. The high-current power transistors (the golden triangular shapes) take up most of this chip. Smaller transistors below form the control circuitry. My reverse-engineered schematic shows that the chip has three parts. First, a simple inverter. This probably interfaces the logic chip to the motor control board. Second, a high-current driver. This uses the large power transistor at the left of the die. This probably drives a solenoid. Finally, a high-current driver with a separate circuit for the solenoid hold current. (That is, the solenoid is pulled into position with a high current, and then held in that position with a lower current.) This uses the large power transistors at the right of the die. There's a single large transistor underneath the main "triangle" of transistors; that transistor is for the hold current. This circuit uses separate power and ground pads from the rest of the chip. The driver circuits are more complex than I'd expect, using current sources and current mirrors. Maybe this design minimizes standby current use. The logic chip The camera is controlled by a complex logic chip that controlled the timing of the various mechanisms, running the motor and solenoids. It had to handle four different use cases: ejecting the protective cover sheet when a film package was inserted, taking a photo, taking a photo with the flash, and ejecting an empty film package. This chip was constructed from Integrated Injection Logic (I2L), an obscure 1970s logic family featuring high density and low power. Because the camera ran off a battery in the film pack, minimizing power consumption was a critical factor. At the time, I2L was a good choice for dense, low-power circuitry, although it was soon overtaken by CMOS. Texas Instruments did a lot of development with I2L, including digital watch chips and the 76477 sound chip so it's not surprising that they chose I2L for the camera chip. I2L gates can be packed together at high density, as shown below. Each vertical gray rectangle is two transistors (one above the horizontal centerline and one below), corresponding to two gates. The chip has very little wasted space, especially compared to TTL logic, which was commonly used at the time but required multiple transistors and bulky resistors for each gate. I2L is a bit tricky to understand since an I2L gate has one input and multiple outputs. How can that work? The schematic below shows an I2L gate, with one input and three outputs. Normally the current from the injector (ICC) turns on the output transistor, pulling the output low. But if the input is low, the output transistor turns off and the output will be high. Thus, the gate inverts the input. (You can think of the injector as a pull-up resistor on the input.) Since the circuit above has a single input, it may seem to be just an inverter. But by wiring several signals together at the input, you get an AND gate "for free": if any signal is low, it will pull the wire low, and otherwise the signal is high. This is called "wired-AND". The wired-AND input to the I2L inverter results in a NAND gate. One problem arises with wired-AND: if you connect an output to more than one wired-AND, everything gets shorted together. The solution is to have multiple outputs from the inverter. Thus, each I2L NAND gate has a single input and multiple identical outputs. In the diagram below, the outputs from various gates (A and B below) are connected together and fed to the input of an I2L gate, creating a NAND gate. The transistors in I2L have multiple collectors, which may seem strange, but the diagram below shows how they are constructed. Each collector has an N region (purple) with a P region (tan) below for the base, and another N region (green) at the bottom, forming an NPN transistor. The multiple collectors are built by creating multiple N regions. Physically, the injector PNP transistor is just a P region for the emitter, reusing the emitter and base's N and P regions; this makes the injector more compact than a "full" transistor. I haven't reverse-engineered this chip yet. I believe that it contains an oscillator and a chain of flip flops for timing, as well as a comparator for the light level and some miscellaneous control logic. Conclusion While the electronics of the SX-70 camera aren't impressive by modern standards, they were cutting edge at the time. They made the SX-70 easy to operate by handling the exposure and timing automatically. Texas Instruments split the electronics across three chips: a precision JFET op-amp with a photodiode, a high-current power driver chip, and a complex logic chip using dense, low-power I2L logic. Unfortunately, innovative technology wasn't enough for Polaroid. The company declined after competition from Kodak, the expensive failure of the Polavision instant home movie system, and the rise of digital cameras. Polaroid declared bankruptcy in 2001 and the company was broken up. The SX-70 has seen a resurgence in popularity, with film and cameras sold by polaroid.com, which acquired the Polaroid name in 2017. For more about the SX-70, see the interesting and quirky 10-minute movie below, which markets the SX-70, explains how to use it, and discusses the internal operation. This movie was made in 1972 by the famous designers Ray and Charles Eames. Notes and references - The name SX-70 comes from its inventor Dr. Edwin Land. He numbered all his "special experiments" in a notebook and his instant picture experiment was number 70. Although the camera was 30 years after special experiment 70, he felt that it embodied the system he had envisioned in the mid-1940s. ↩ - Land introduced instant photography in 1947, and then color instant film in 1963, based on a peel-apart technology. The SX-70 eliminated the problems of the peel-apart instant photos. As Polaroid said, “No pulling the picture packet out of the camera, no timing the development process, no peeling apart of the negative and positive results, no waste material to dispose of, no coating of the print, no print mount to attach, no chance for double exposure, no chance to forget to remove the film cover sheet and spoil a picture, no exposure settings to make, no flash settings to remember, no batteries to replace.” ↩ - Although Polaroid photos develop in a minute or so without any user intervention, shaking the photo was a common custom. "Shaking the Polaroid" was the theme of a 1998 Polaroid ad. Outkast's 2003 song Hey Ya! featured the refrain "Shake it like a Polaroid picture". ↩ - I haven't investigated all the chips in the SX-70. The motor control module contains a linear control IC and power transistors. The camera also takes a flashbar with five flashbulbs. The flash circuit has another chip that checks the bulbs to find an unused bulb. ↩ - "The Battle for the SX-70 Camera", IEEE Spectrum, May 1989 discusses in detail the battle between Fairchild and Texas Instruments to win the Polaroid contract. The internal circuitry of the camera is described in "Behind the Lens of the SX-70", IEEE Spectrum, Dec 1973. This circuitry, however, is for the earlier Fairchild version and the implementation is considerably different from the Texas Instruments circuitry that I examined. The Fairchild implementation is also described in "Camera Electronics, A New Approach", WESCON 1973. ↩
<urn:uuid:547809b4-bc74-45d5-8d6b-9634ac6aaa2e>
CC-MAIN-2024-51
http://www.righto.com/2022/02/a-look-inside-chips-that-powered.html?showComment=1644608455535&m=0
2024-12-11T13:27:43Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by", "by", "by" ], "in_footer": [ false, false, false ], "in_head": [ false, false, false ], "location": [ "a_tag", "a_tag", "a_tag" ], "version": [ "4.0", "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.998879
Catalogue of Life 2024-11-18 doi:10.48580/dgjy9 © 2022, Catalogue of Life. This online database is copyrighted by Catalogue of Life on behalf of the Catalogue of Life partners. Unless otherwise indicated, all other content offered under Creative Commons Attribution 4.0 International License, Catalogue of Life, 2024-11-18. Catalogue of Life is a Global Core Biodata Resource The Catalogue of Life cannot guarantee the accuracy or completeness of the information in the Catalogue of Life. Be aware that the Catalogue of Life is still incomplete and undoubtedly contains errors. Catalogue of Life, nor any contributing database can be made liable for any direct or indirect damage arising out of the use of Catalogue of Life services.
<urn:uuid:e2138632-51ef-4290-a8d3-4400bbc36016>
CC-MAIN-2024-51
https://www.catalogueoflife.org/data/taxon/669PV
2024-12-11T13:02:35Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.954144
- Open Access - Total Downloads : 198 - Authors : Samarth S. Pai - Paper ID : IJERTV2IS100809 - Volume & Issue : Volume 02, Issue 10 (October 2013) - Published (First Online): 25-10-2013 - ISSN (Online) : 2278-0181 - Publisher Name : IJERT - License: This work is licensed under a Creative Commons Attribution 4.0 International License Design of a Frequency Synthesizer for WiMAX Applications Samarth S. Pai Department of Telecommunication R. V. College of Engineering Bangalore, India Abstract Implementation of frequency synthesizers based on phase-lock-loops (PLL) is one of the most challenging blocks of the wireless communication systems such as WiMAX. This paper reviews the requirements set for the frequency synthesizer by the wireless standards, and how these requirements are derived from the system specifications. These requirements apply to both integer-N and fractional-N synthesizers. In this paper we discuss one of the design and architecture of frequency synthesizer used in WiMAX applications with description of each block that is required for building of the frequency synthesizer. - Introduction WiMAX, or Worldwide Interoperability of Microwave Access, is a wireless Internet service designed to cover wide geographical areas serving large numbers of users at low cost. WiMAX is the synonym given to the IEEE 802.16 standard defining wide area wireless data networking. As the wireless transceivers systems getting growth in the worldwide, improving of the resolution, speed and lowering the power and area of the circuits, are of the most important issues. Thus one of the most challenging blocks of the wireless communication systems such as WiMAX are frequency synthesizers that can be implemented based on phase-lock-loops (PLL). An Integer-N structure is the simplest structure for a PLL-based synthesizer. This type of synthesizer suffers from many problems. In this structure channel spacing should be the same as reference frequency (fref). So in applications with many channels and low channel spacing (fs), such as WiMAX, the above criteria forces fref to be as low as fs. According to Gardner stability criteria lower fref results in a lower loop BW, which in turn leads to a lower switching speed, a higher in band noise and a large module for counter (MIT open courseware). So we choose a Fractional-N structure for our design. In this structure, the value of fref is independent of fs, and we can set a higher fref to achieve a wider loop BW while having lower fs to gain a fine resolution. In this paper a frequency synthesizer is designed with a small filter capacitance which results in a lower charge-pump current while having a good phase margin and a small settling time. Further reduction in the area of the circuit is achieved by not implementing a inductor in the design. Also TSPC logic is employed in the counter for reduced area and more power as TSPC is compatible with CMOS logic. - Structure of Frequency Synthesizer Fig. 1 illustrates a fractional-N PLL-based frequency synthesizer (Eldon Staggs, 2005). Here, we employ a Ring oscillator-based VCO. To cover the WiMAX band from 2.3GHz to 2.7GHz, we only need to generate 1.5GHz~1.8GHz, with the frequency step of 20MHz. The number of the channels is 15. Using a div-2 divider and two mixers, the I and Q frequency components from 2.3GHz to 2.7GHz for a quadrature OFDM system is generated. Using this technique allows us to design a counter with lower division factor. This saves the power, because much of the system power is consumed in the high frequency counter (Eldon Staggs, 2005). The detailed description of each block is as follows, - Phase/Frequency Detector (PFD) To design a PFD we use the common structure shown in Fig. 2 (R. Jacob Baker, 1996). To reduce the power we employ CMOS logic to implement the D-Flip Flops and the logic gates. For WiMAX standards (Eldon Staggs, 2005), the frequency lower than 35MHz is proposed for fref. Fig.1. Proposed frequency synthesizer structure On the other hand, as fref increases, the jitter and noise problems get worse. So we select fref to be 20MHz in order to have a relatively low jitter noise. The crystals which generate this value of fref are easily available and also having fref value of 20MHz is a good compromise to have a reasonable counter division factor. In the feedback path of this PFD a delay about 200psec~300psec is contrived to compensate the dead zone in the PFD characteristic. This dead zone may cause the PLL to be unlocked or have an incorrect performance. - Charge Pump (CP) The output of the PFD is a digital signal. So before applying this signal to a LPF we should convert it to a related analogue voltage/current signal. This is accomplished by a charge-pump, which operates as a digital to analogue converter Fig. 3. Fig.2. PFD structure - Low Pass Filter (LPF) Charge-pump output current passes through the sampling capacitor (C1) and gets converted to a voltage level. We use another capacitor parallel with C1 to eliminate the voltage ripple. To increase the phase margin of the filter we employ a resistor (R1) to move the zero to the left hand plane (LHP). Fig. 3: Charge pump circuit By adding R2-C3 in parallel, a very far pole is generated which leads to a much more ripple reduction. This results the filter to be of order three. Since the third pole is set to be very far from the second pole in the filter, we can approximate the 3rd order filter with a 2ndorder one to alleviate the complexity of the calculations. The final filter topology is shown in Fig. 4. The following steps show the filter design calculations in brief. That wZ is the filter zero and the wC is the loop BW. So the phase margin can be found by using the following equation, Fig. 4: Proposed low pass filter - Voltage Controlled Oscillator (VCO) We select Ring oscillator-based VCO instead of LC-tank based VCO in our design to have more area and power saving. The topology of this circuit is shown in Fig. 5. The tuning range of the input control voltage from -0.2V to 1.2V is sufficient to cover the desired frequency band. We find that the desired VCO gain to generate the in-band frequencies is 200MHz/V, but the VCO in Fig.5 have much higher gain than this one, which leads to a very low resolution output and may drop some channels because of the sensitivity reduction. To overcome this significant problem we should reduce the gain of the VCO. To accomplish this, we place a gain-linearizer just before the VCO. By this technique, VCO gain of almost 200MHz/V can be achieved. The VCO output frequency versus the input control voltage of the VCO after using the gain-linearizer block is shown in Fig. 6. This structure of the VCO, have a low power. The power consumptions of the VCO with gain- linearizer for the lowest and highest frequencies are: - Counter One of the essential blocks of the system is a programmable counter which is able to produce fractional division factors (N). To have a flexible programming in the counter we use a multi- modulus counter. A simple 3-modulus counter is shown in Fig. 7. Multi-modulus allows us to use small division factor counter, say N=2~3, to implement a counter with a very big division factor instead of designing one counter with a large division factor. This saves the power and area, while the design complexity is reduced. Since the input frequency of the counter is very high, so CMOS logic cant be used to implement this counter. Thus, we use a well-known logic named TSPC, Fig. 8 in this structure. This logic has been proved to have almost 1mW in 2GHz. The division factor should be from N=76 to N=90, in order to support the PLL output range with fref=20MHZ. By considering this range, a 6-modulus counter is selected for this counter. Fig.5. Ring Oscillator Circuit Fig.6. Frequency varation of VCO Vs. control voltage Fig.7. Three Modules Implementation for Counter Fig.8. Schematic of Each Counter Module - - Conclusion In this paper a PLL-based frequency synthesizer for WiMAX application is designed. For better results, certain improved techniques are applied to the design. To reduce the gain of the VCO, a gain- linearizer block is used just before the VCO. TSPC logic is employed to implement the high frequency counter and to lessen the power consumption. To increase the integration capability of the circuit as a whole, the capacitors of the filter are designed to be as small as possible without compromising on the performance of the system. - References - M. Mohammad Abadi, M. Tamaddon, R. Jahani and H. Chahkandi Nejad, Design of a PLL Based Frequency Synthesizer for WiMAX Applications, Australian Journal of Basic and Applied Sciences, 5(9): 844-853, 2011, ISSN 1991-8178. - Eldon Staggs 2005, Mobile Wi-Max Radio Phase Locked Loop Design, an Applications workshop for High-performance design, Ansoft. - Gardner, F.M., Phase lock Techniques, 2nd ed., 1979, New York, John Wiley. - Jacob Baker, R., W. Harry Li and E. David Boyce, CMOS Circuit Design, Layout, and Simulation, Series on Microelectronic Systems, IEEE Press, 1999. - Perrot, M.H., High Speed Communication Circuits lecture notes, MIT open courseware. - Ziboon, H.T., H.M. Azawi, Design and Simulation of Sigma-Delta Fractional-N Frequency Synthesizer for WiMAX, Eng. & Tech magazine, 26(9), 2008.
<urn:uuid:5d421ad2-dadc-4cfa-9b27-814626cc36f3>
CC-MAIN-2024-51
https://www.ijert.org/design-of-a-frequency-synthesizer-for-wimax-applications
2024-12-11T13:17:17Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.995828
File:Anthology Track 78 label.jpg Anthology_Track_78_label.jpg (259 × 194 pixels, file size: 10 KB, MIME type: image/jpeg) Record label for Anthology track 78: "Way Down the Old Plank Road" by Uncle Dave Macon. File history Click on a date/time to view the file as it appeared at that time. Date/Time | Thumbnail | Dimensions | User | Comment | | ---|---|---|---|---|---| current | 23:13, 9 July 2013 | 259 × 194 (10 KB) | Mattwhiteski | Record label for Anthology track 78: "Way Down the Old Plank Road" by Uncle Dave Macon. |
<urn:uuid:e2e591d5-f40c-4484-be5b-9f2c55326100>
CC-MAIN-2024-51
https://www.openmusicarchive.org/projects/index.php?title=File:Anthology_Track_78_label.jpg
2024-12-11T13:34:08Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by-sa
4.0
link_tag
true
false
null
null
null
{ "abbr": [ "by-sa", "by-sa", "by-sa" ], "in_footer": [ false, true, true ], "in_head": [ true, false, false ], "location": [ "link_tag", "a_tag", "a_tag" ], "version": [ "4.0", "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.672119
Response to the Competition & Markets Authority study into the digital advertising market Open Rights Group (ORG) is a UK-based digital campaigning organisation working to protect fundamental rights to privacy and free speech online. With over 3,000 active supporters, we are a grassroots organisation with local groups across the UK. Our comments below address the CMA’s proposed Theme 2: Consumer control over data collection practices. ———————————————————————————————————— - We welcome the inclusion of Theme 2 in this study, noting how profile-based online advertising practices which revolve around data collection and aggregation negatively impact consumer choice and control. The presently dominant model of real-time bidding (RTB) for online ad spaces in particular has obscenely poor outcomes for consumer rights and urgently needs regulatory investigation and action. - Consumers entirely lack control over how their data is processed in RTB operation. Every time a person visits a website that uses RTB systems to show users behaviourally targeted adverts (which is the vast majority of websites), intimate personal details about them are broadcast to tens or hundreds of intermediary adtech companies. These companies then bid on behalf of advertisers for the opportunity to show that specific person an advert. The personal data broadcast in RTB is extensive. It can include the person’s exact location, what they are reading, watching and listening to online, inferred religious, sexual and political views, and unique codes that allow a long-term profile on them to be built up over time. This data sharing happens hundreds of billions of times each day and there are no limits on what the intermediary adtech companies, which have no direct relationship with consumers, can do with consumers’ personal data once they receive it. [1] The consumer harm this entails is colossal, and entirely unacceptable. - We encourage the CMA to more explicitly consider RTB within Theme 2, and, as an integral part of this, to consider not just online platforms but also the wider ecosystem of adtech companies – since their operations critically interconnect with issues of competition and consumer choice/consent. - In terms of paragraph 70 of the proposed scope, to comprehensively consider and report on how best to address/improve consumer control, the CMA must also look at how industry standards around data use are set. Standard-setting is an integral part of market operation: it structures how data processing takes place and thus almost entirely shapes consumers’ online experience. We urge the CMA to expand the scope of its study in this regard: to consider how current RTB marketplace standard-setting impacts consumers and organises the market. This includes understanding the paradoxical effects of market concentration despite apparent diversity in the chaotic adtech ecosystem. We also recommend exploring what the potential impact on competition would be if existing standards were more rigorously enforced, and/or if new standards or new methods of adopting standards were mandated. - For RTB, industry standards are set by Google, through its Authorized Buyers framework, and the Interactive Advertising Bureau (IAB), through its Transparency and Consent Framework. Google and the IAB are presently under scrutiny from the Information Commissioner’s Office (ICO) and other Data Protection Authorities (DPAs) across Europe. [2] Whilst the CMA is right to be careful about mandate overreach and mission creep, in order for its study to benefit from horizontal expertise and have holistic industry application it should be conducted in close communication and collaboration with other regulators – notably the ICO, Ofcom and Electoral Commission – and bodies such as the Centre for Data Ethics and Innovation. [3] This will be especially important if regulatory solutions are likely to be proposed, in order to ensure that regulation complements rather than contradicts. - In relation to paragraph 65, concerning “informed choice”, we would expect the CMA in this regard to examine issues of cookie tracking and coerced consent through so-called “cookie walls”. The forthcoming EU e-Privacy Regulation, to which the UK may or may not be bound, has relevance in this regard. [4] The debates about “cookie walls” in this policy development process are informative of the shortcomings of approaches based on informing consumers and providing choice, instead of simply minimising data collection and limiting the purposes for which it is processed. - In relation to paragraph 67, concerning “other practices”, we would add “dark patterns” to the included list of issues. These influence how options are presented to consumers and can limit or manipulate free decision-making.[5] - While welcoming the CMA initiative to investigate online advertising, we are concerned about the CMA’s framing of this study in terms of consumers getting “insufficient compensation” or “poor value” for their data. Personal data is not a commodity; rather, it goes to the heart of individuals’ identity. Data protection rights, most notably those provided for in the General Data Protection Regulation 2018 (GDPR), protect consumers through a fundamental rights-based framework. - There is a growing recognition of the overlap between data protection and competition law. The European Data Protection Supervisor has advocated that competition law enforcement should consider the data protection rights of consumers and intervene to control market power in the digital economy.[6] The European Commission and national competition authorities have also begun considering whether competition law should incorporate data protection and privacy concerns, particularly with a focus on ‘big data’.[7] Orla Lysnkey and Francisco Costa-Cabral of London School of Economics has argued that the two areas of laws have significant “family ties” with both aiming to achieve market integration and sharing a concern for the welfare of the individual.[8] - Enabling consumers to exercise more and better control over how online platforms collect and use their data would reduce the power imbalance between users and platforms. This in turn would empower consumers to hold online platforms accountable for rights-violating data abuse, misuse and exploitation practices, protecting their rights and improving their online experience. We strongly recommend that the CMA reframe the study such that the desired benefit to consumers lies in upholding fundamental rights. [1] See Information Commissioner’s Office, Update Report into adtech and real time bidding, 20 June 2019 <https://ico.org.uk/media/about-the-ico/documents/2615156/adtech-real-time-bidding-report-201906.pdf> [2] We have an ongoing complaint to the ICO about RTB system operation. This complaint has also now been submitted to data protection authorities across the EU, with 20 complaints filed to date. Complaint and surrounding information/documentation is available at <https://fixad.tech/september2018/Fixad.tech> [3]We have also recently submitted a response to the Centre for Data Ethics and Innovation call for evidence consultation on online ad targeting. Submission of 14 June 2019 available here: <https://www.openrightsgroup.org/assets/files/reports/report_pdfs/Centre_for_Data_Ethics_Online_Targeting_Consultation_Response.pdf> [4] The e-Privacy Regulation is currently in trialogue in Brussels. ORG and other groups have raised concerns with some of the proposals relating to cookies and consent made by member states in the Council. See: <https://www.openrightsgroup.org/about/reports/e-privacy-regulation-areas-of-concern-for-the-open-rights-group> [5]Norwegian Consumer Council, Deceived by Design, Report at: <https://www.forbrukerradet.no/undersokelse/no-undersokelsekategori/deceived-by-design/> [6] European Data Protection Supervisor Opinion 8 / 2016, On the coherent enforcement of fundamental rights in the age of big data, 23 September 2016 [7] Commissioner Vestager, Competition in a Big Data World, 17 January 2016, accessible at <https://ec.europa.eu/commission/commissioners/2014-2019/vestager/announcements/competition-big-data-world_en> [8] Costa-Cabral, F. & Lynskey, O. (2017) Family ties: the intersection between data protection and competition in EU law, Common Market Law Review, 54(1)
<urn:uuid:39192141-861c-48e4-9db3-3301b925009b>
CC-MAIN-2024-51
https://www.openrightsgroup.org/publications/response-to-the-competition-and-markets-authority-study-into-online-platforms-and-the-digital-advertising-market/
2024-12-11T12:11:59Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00641.warc.gz
by-sa
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.992749
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ PrePrints) and either DOI or URL of the article must be cited. Cite this article Panagiotopoulou O, Rankin JW, Gatesy SM, Mehari Abraha H, Janzekovic J, Hutchinson JR.2016. A preliminary case study of the effect of shoe-wearing on the biomechanics of a horse’s foot. PeerJ PrePrints4:e1779v1https://doi.org/10.7287/peerj.preprints.1779v1 Abstract Horse racing is a multi-billion-dollar industry that has raised welfare concerns due to disabled and euthanized animals. Whilst the cause of musculoskeletal injuries that lead to horse morbidity and mortality is multifactorial, pre-existing pathologies, increased speeds and substrate of the racecourse are likely contributors to foot disease. The hooves of horses have the ability to naturally deform during locomotion and dissipate locomotor stresses, yet farriery approaches are utilised to increase performance and protect hooves from wear. Previous studies have assessed the effect of different shoe designs on locomotor performance; however, no biomechanical study has hitherto measured the effect of horseshoes on the stresses of the foot skeleton in vivo. As there is a need to reduce musculoskeletal injuries in racing and training horses, it is crucial to understand the natural function of the feet of horses and how this is influenced by shoe design. This preliminary study introduces a novel combination of three-dimensional data from biplanar radiography, inverse dynamics, and finite element analysis (FEA) to evaluate the effect of a stainless steel shoe on the function of a Thoroughbred horse’s front foot during walking. Our results show that the stainless steel shoe increases craniocaudal, mediolateral and vertical GRFs at mid-stance. We document a similar pattern of flexion-extension in the PIP (pastern) and DIP (coffin) joint between the unshod and shod conditions, yet variation in the degrees of rotations are encountered throughout the stance phase. In particular, in both the shod and unshod conditions, the PIP joint extends between the 10-40% of the stance phase and flexes before mid-stance and until the end of the stance phase. Similarly the DIP joint extends until the 40% of stance and then flexes until the end of the stance phase. Overall at mid-stance the PIP joint extends more at the shod (-2.9o) than the unshod (-1.5o) horse, whilst the DIP joint extends more at the unshod (-3.6o), than the shod (-2.8o) condition. We also document that the DIP joint flexes more than the PIP after mid-stance and until the end of the stance in both conditions. Our FEA results show increased von Mises stresses on the fore foot phalanges in the shod condition at mid-stance, indicating that the steel shoe increases mechanical loading. Our preliminary study illustrates how the shoe may influence the dynamics and mechanics of a Thoroughbred horse’s forefoot during slow walking, but more research is needed to quantify the effect of the shoe on the equine forefoot during the whole stance phase, at faster speeds/gaits and with more individuals as well as with a similar focus on the hind feet. We anticipate that our preliminary analysis using advanced methodological approaches will pave the way for new directions in research on the form/function relationship of the equine foot, with the ultimate goal to minimise foot injuries and improve animal health and welfare. Raw speed data for the unshod (n=4) and shod (n=4) conditions Column A shows the conditions. Column B lists the name and date of the steps. Column C lists the horse’s hip height in meters. Column D lists the frame rate of the Sony camera used for the speed calculations. Columns E and F list the start and end frame of each trial and each condition. Column G shows the difference between the start and end frame (i.e. number of frames elapsed). Column H shows the time in seconds and was calculated by dividing 1 over the camera frame rate (column D), multiplied by the frame difference (column G). Column I shows the distance that a marker placed on the middle of the body of the horse travelled between the start and end frames of the steps (columns E and F). Column J lists the velocity calculations per trial and condition. Velocity was measured by dividing the distance (column I) over the time (column H). Column K lists gravity at 9.81ms-2 and column L lists the Froude number per trial and condition. Rows J6 and J 12 show the average velocity for the unshod and shod condition respectively. Rows L6 and L12 show the average Froude number for the unshod and shod conditions respectively. Raw von Mises stress data (MPa) for each condition and each bone segment Bone segments are defined as the proximal phalanx (P1), intermediate phalanx (P2) and distal phalanx (P3). All stress data were exported from the external and internal nodes of the midshaft from homologous locations between bones and conditions as per Figure S3.
<urn:uuid:3c5d222d-f418-4c98-b4a0-4b72d5981f46>
CC-MAIN-2024-51
https://peerj.com/preprints/1779/
2024-12-12T18:19:26Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00541.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.995019
Selected Tags Click on a tag to remove itMore Tags Click on a tag to add it and filter down5.1 packages Showing projects tagged as Django, 1.8, HTTP, 3.1, and 5.1 - - 9.5 9.9 L3 PythonA Django content management system focused on flexibility and user experience - * Code Quality Rankings and insights are calculated and provided by Lumnify. They vary from L1 to L5 with "L5" being the highest.
<urn:uuid:a1a6dfef-7660-4393-bca5-2d874b5f7006>
CC-MAIN-2024-51
https://python.libhunt.com/packages/django/1-8/http/3-1/5-1
2024-12-12T16:45:12Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00541.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.988623
by . SQL By running queries you agree to the Cloud Services Terms of Use and you irrevocably agree to release your SQL under CC0 License. All SQL code is licensed under CC0 License.
<urn:uuid:2971f42d-12f2-498e-b3a7-ee96f1277eb5>
CC-MAIN-2024-51
https://quarry.wmcloud.org/history/65041/890226/864087
2024-12-12T17:34:43Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00541.warc.gz
zero
1.0
a_tag
false
false
null
null
null
{ "abbr": [ "zero", "zero" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "1.0", "1.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.998752
What's New corpus Description: E-texts and searchable facsimiles from the Swedish Literature Bank (litteraturbanken.se) The corpus contains all free e-texts and searchable facsimiles from the Swedish Literature Bank, a freely available collection of ... This item contains 2 files (5.8 GB). Publicly Available corpus Description: A corpus annotated with morphological and syntactic information This item contains no files. Publicly Available
<urn:uuid:e7bd28d3-9e9c-4a80-99e4-fc863266faf7>
CC-MAIN-2024-51
https://repo.spraakbanken.gu.se/xmlui/?&filtertype_0=language&filtertype_1=subject&filtertype_2=subject&filter_relational_operator_1=equals&filter_relational_operator_0=equals&filter_2=ASPAC&filter_1=Parallel&filter_relational_operator_2=equals&filter_0=Modern+Greek+%281453-%29&sort_by=dc.date.issued_dt&order=asc&rpp=60&locale-attribute=en
2024-12-12T16:58:53Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00541.warc.gz
by
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.936432
EUNIS habitat type hierarchical view (marine version 2022 & terrestrial version 2021) The EUNIS habitat classification review is on-going. Four groups are pending review: Inland waters, Wetlands, Constructed, industrial and other artificial habitats and Complexes.- M : Marine benthic habitats (MA-MG) - MH : Pelagic water column - MH1 : Neuston - MH2 : Completely mixed water column with reduced salinity - MH3 : Completely mixed water column with full salinity - MH4 : Partially mixed water column with reduced salinity and medium or long residence time - MH41 : Arctic partially mixed water column with reduced salinity and medium or long residence time - MH411 : Arctic partially mixed water column with reduced salinity and medium residence time - MH412 : Arctic partially mixed water column with reduced salinity and long residence time
<urn:uuid:e05ab806-34c7-40ec-a3fe-589786764ade>
CC-MAIN-2024-51
https://eunis.eea.europa.eu/habitats-code-browser-revised.jsp?expand=31633,31698,31839,31714,31699,31711,31725
2024-12-13T23:13:38Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by
2.5
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "2.5" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.973425
The NCRB finally released the ‘Crime in India’ report for 2017 after a long delay. As per the data in the report, the number of cases related to stolen property increased by 15% in 2017 while the total value of property stolen decreased by almost 50%. Annually, property worth lakhs of rupees is stolen in India. Property includes motor vehicles, cattle, purses, gadgets, jewellery and other material belongings of a person. Only a small fraction of the total property lost is recovered. Among the states, Maharashtra accounted for more than 30% of the property stolen in terms of value followed by Delhi in 2017. In this story, we take a look at what the latest data from ‘Crimes in India’ report has to tell with respect to stolen property and its recovery. On 21 October 2019, National Crime Records Bureau (NCRB) finally released the much anticipated ‘Crimes in India’ report of 2017 after a delay of almost 1.5 years. 7.39 Lakh cases of stolen property recorded in 2017 A total of 7.39 lakh cases involving stolen property were registered in 2017. This is by far the largest number of cases registered. An increase by 15.2% has been observed in the number of stolen property-related cases as compared to 2016 when 6.41 lakh such cases were reported. However, surprisingly, the value of property stolen has reduced by 48.6% in 2017 compared to the year 2016. The total value of stolen property in 2017 was Rs. 5002.5 crores compared to Rs. 9733.1 crores in 2016. In other words, the average value of property stolen per reported case decreased drastically from Rs. 1.51 lakh in 2016 to Rs. 67606 in 2017. This could mean that the theft cases reported in 2017 were smaller in nature compared to 2016. Though the highest ever such cases were reported in 2017, the value of property stolen in 2017 is the lowest since 2010. Over the 17 years since 2001, there has been anincrease in the number of such cases by 87% while the value of the stolen property increased by 229% largely due to a higher valuation of the property. Indian Penal Code defines theft, robbery, dacoity and burglary differently Sections 379 to 382 of the Indian Penal Code deals with theft, robbery and dacoity. These are further described and explained in sections 392 to 398. - Theft is committed when someone intends to dishonestly take any movable property under the possession of a person or moves the property in order to take it, without their consent. - Robbery is said to have taken place if the property is stolen through intimidation and force. - Robbery by a group of five or more persons results in Dacoity. - Burglary (Sections 457 to 460) is said to have taken place when there is housebreak or criminal trespass. Other acts involving the stealing of property include cheating, impersonating and more. The punishment for each of these acts is different. Theft results in imprisonment up to three years and/or penalty. The punishment for dacoity and robbery is severe with 0 to 14 years of imprisonment and a hefty fine. In case of burglary, the guilty will be jailed for a term between 3 months to 2 years in addition to a penalty. Almost 80% of the cases on stolen property are theft related Of the 7.39 lakh cases registered in 2017, around 5.89 lakh cases were theft-related. In other words, cases of theft accounted for 79.6% of the crimes under this category. Data also suggests that cases of theft increased by 139% since 2001. With more than 1.1 lakh cases in 2017, burglary constitutes 14.9% of cases related to stolen property. Compared to 2015, the cases of burglary have dropped by 3%. In 2017, around 30,742 cases of robbery have also been registered. Number of cases of Dacoity (3575 cases in 2017) has decreased by 6% compared to 2016. Since 2001, dacoity cases have decreased by more than a third or 36.8%. One-third of stolen property related incidents take place in residential areas Almost 33% of the reported incidents of property being stolen are in residential areas. Roadways accounted for 21% of such incidents. Of this 21% on roadways, 90% of the incidents took place at ordinary roads while 10% where recorded at highways. Dacoity and robbery were most prominent on roadways while theft was the most prominent in other areas. The other places where such cases were reported include railways, schools or colleges, commercial establishments, religious places etc. Maharashtra and Delhi continue to account for the largest value of property stolen The top ten states in terms of the value of property stolen in 2017 together constitute 80.6% of the value of property stolen. Despite the drop in the value of property stolen, Maharashtra retains its position of having the greatest value of stolen property in India, accounting for 30.4% of the total value in 2017. In 2015 and 2016, Maharashtra accounted for 55.2% and 34.6% of the value of property stolen respectively. Next in line is the union territory of Delhi which accounted for 15% of the property stolen in India in 2017. In 2016, Delhi accounted for 33.7% of the value of property stolen in India. Excluding Delhi, the remaining six union territories together account for only 0.3% of the value of property stolen in India in 2017. Among the states, Sikkim had the least property stolen with a value of Rs. 1.5 crore which is less than 0.03% of the total value. North-Eastern states of Manipur, Meghalaya, Mizoram, Nagaland and Tripura are at the bottom of the list and together account for only 0.6% of the value of property stolen in India in 2017. Motor vehicles are the most sought-after property by thieves Data suggests that Motor Vehicles are the most sought-after by thieves. In 2017 alone, 2.26 lakh cases (30.5% of the total number of cases) registered were to recover their stolen vehicle. Value-wise, this amounts to one-fourth of the total value of property stolen. Within motor vehicles, motorcycles and scooters make up for 85.4% of the cases. A total of 1.28 lakh cases (17.3%) in 2017 were registered for stolen electronic gadgets of which 1.04 lakh cases (81% of electronic gadgets) were for mobile phones. Cash and jewellery were the subject of almost 14.9% of the cases while in terms of value, these account for 22.4% of the total value. Only 25.9% of the stolen property was recovered in 2017 The recovery rate is calculated on the basis of the value of property stolen. At an All-India level, only 25.9% of the property stolen in India was recovered in 2017. That is, for every 100 rupees lost only 25.9 rupees was recovered. The highest recovery rate was recorded in Tamil Nadu with 77.8% (three times the national rate). States of Telangana, Uttarakhand and Rajasthan have more than 50% recovery rate in 2017. Despite accounting for more than 45% of the total value of property stolen in India, the recovery rates are poor in Maharashtra (13.7%) and Delhi (10.3%). Mizoram has the lowest recovery rate of 7.3% in 2017. In terms of the type of property stolen, electronic gadgets have a low recovery rate of 21.3% with mobile phones reporting a recovery rate of just 18.7%. The greatest recovery rate of 73.2% in 2017 was reported in the case of Cultural Property (including Antiques). Featured Image:NCRB Theft Data
<urn:uuid:59904175-3c8b-44de-941a-bae7076bbedd>
CC-MAIN-2024-51
https://factly.in/ncrb-theft-data-up-to-2017/
2024-12-13T20:48:12Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.998975
Additional file 3: of The health equity implementation framework: proposal and preliminary study of hepatitis C virus treatment journal contribution posted on 2019-03-12, 05:00 authored by Eva Woodward, Monica Matthieu, Uchenna Uchendu, Shari Rogal, JoAnn KirchnerQuantitative Screening Questions. These questions were used to screen participants via telephone for eligibility in the preliminary study. (DOCX 15 kb) Funding U.S. Department of Veterans Affairs History Categories Keywords Licence Exports RefWorksRefWorks BibTeXBibTeX Ref. managerRef. manager EndnoteEndnote DataCiteDataCite NLMNLM DCDC
<urn:uuid:af6b16c1-3cb0-4464-82b9-38e9fcb34a85>
CC-MAIN-2024-51
https://figshare.com/articles/journal_contribution/Additional_file_3_of_The_health_equity_implementation_framework_proposal_and_preliminary_study_of_hepatitis_C_virus_treatment/7842713/1
2024-12-13T22:23:14Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.818746
Latest posts by Onnik Krikorian from January, 2010 Önər Blog [AZ] posts a video [EN] made by the OL! Azerbaijani Youth Movement for the Democracy Video Challenge. OL! has been exemplary in its use of new media in... AZ Cookbook, Food from Azerbaijan & Beyond, turns two and marks the occasion with a recipe for cream cheese-swirled brownies. The Armenian Observer comments on the recording of a song by French-Armenian crooner Charles Aznavour and other French singers. The blog notes that Aznavour also recorded a song in the... On the same day that an appeal court hearing for imprisoned blogging youth activists Adnan Hajizade and Emin Milli was adjourned, supporters of the two men protested outside the Embassies of Azerbaijan in London and Paris. Global Voices Online's Caucasus editor interviews journalist Seda Muradyan on her documentary film, From Home to Home, for the Frontline Club blog. The film tells of how Armenians and Azerbaijanis... Erkan's Field Diary comments on the case of Hrant Dink, an ethnic Armenian journalist who was assassinated in broad daylight in Istanbul, Turkey, three years ago this week. The blog... The Armenian Observer comments on yesterday's sentencing to 7 years in prison of Nikol Pashinyan, an outspoken opposition figure and newspaper editor. The blog condemns the judgement by the court,... Today marks the 20th anniversary of Black January, the day when the fledgling independence movement in Azerbaijan was brutally suppressed by Soviet troops ostensibly to curtail inter-ethnic tensions in the capital, Baku. Bloggers in Armenia and Azerbaijan, however, remember the date differently. The Georgian International Media Center says that the largest airport in the South Caucasus might be built near the Black Sea port city of Poti. However, it notes, the idea... Unzipped comments on the sentencing to seven years in prison of outspoken newspaper editor and opposition figure Nikol Pashinyan. The blog says that the judgement against Pashinyan is evidence of... Three years ago today, Turkish-Armenian journalist Hrant Dink was gunned down outside the office of the Argos newspaper he edited in Istanbul, Turkey. Often ignored, loathed or detested when he was alive by nationalists on both sides for his message of tolerance and peace, one blogger compares Dink to Martin Luther King Jr. Unzippedblog tweets that the Armenian prime minister, Tigran Sargsyan, has set up his own blog [AM]. In the latest edition of Caucasus Watch, a bi-monthly feature of the blog-based Evolutsia, Inge Snip takes exception to a proposal from the Georgian president to introduce patriotic-military classes in... Social Blurbs comments on two teenage bloggers in Tbilisi, Georgia, and their alternative style of blogging. In a guest video post on the social media blog, the two young bloggers... Two demonstrations are scheduled to take place outside the Embassy of the Republic of Azerbaijan in Paris, France, and London, England, on 22 January in support of imprisoned video blogging youth activists Adnan Hajizade and Emin Milli. Flying Carpets and Broken Pipelines comments on the selective application of the law in Azerbaijan and uses the example of imprisoned video blogging youth activists Adnan Hajizade and Emin Milli... The Armenian Observer comments on the twentieth anniversary of the pogrom of Armenians in Baku at the beginning of the conflict with Armenia over the disputed territory of Nagorno Karabakh.... With Armenia having experienced its own devastating earthquake 21 years ago, Ianyan comments on the tragedy in Haiti. In particular, the blog notes the similarities between the two countries, summarizes... Flying Carpets and Broken Pipelines experiences Baku at morning and night, reflecting on the Azerbaijani capital and the social, economic and political situation in the country. Since the collapse of the Soviet Union, hopes that new freedoms would quickly replace the old have often been dashed by the re-emergence of traditional practices. Largely kept suppressed by the communist system, gender and issues of sexuality were particularly affected. Slowly, however, discussion is starting to take place online. Emotions on Air, Mind Mute visits an orphanage in Azerbaijan and compares the officially stated aim of making 2009 the Year of Children with the reality faced by those seemingly...
<urn:uuid:e8c42e95-7306-4d42-980a-cf955fcf8a23>
CC-MAIN-2024-51
https://globalvoices.org/author/onnik-krikorian/?m=201001
2024-12-13T21:34:13Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997675
Compatibility: | EE1, EE2, EE3, EE4 | ---|---| Latest release: | 3.0.0 (released 2016-12-15) | Licensing: | CC Attribution-Share Alike 3.0 | This ExpressionEngine plugin eliminates widows from titles and text, by replacing the last space in the given text with a non-breaking space ( ). It was ported from Shaun Inman’s Widon’t for Wordpress plugin. Don’t know what widows are, apart from the female kind? Mr Inman explains: In typesetting, a widow is a single word on a line by itself at the end of a paragraph and is considered bad style. In short, Low Widon’t will change Lorem ipsum dolor sit amet to Lorem ipsum dolor sit amet . What the community thinks of Low Widon’t Essential for keeping those unsightly widows from marring my clients' much-deliberated headlines. A default install on every project. —Derek Hogue, Amphibian
<urn:uuid:f44c92a0-b957-4d74-b405-6fcfc6d79431>
CC-MAIN-2024-51
https://gotolow.com/addons/low-widont
2024-12-13T21:20:57Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by-sa
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.995639
Brats MICCAI Brain tumor dataset - Categories: - Keywords: Abstract BraTS has always been focusing on the evaluation of state-of-the-art methods for the segmentation of brain tumors in multimodal magnetic resonance imaging (MRI) scans. BraTS 2019 utilizes multi-institutional pre-operative MRI scans and focuses on the segmentation of intrinsically heterogeneous (in appearance, shape, and histology) brain tumors, namely gliomas. Furthemore, to pinpoint the clinical relevance of this segmentation task, BraTS’19 also focuses on the prediction of patient overall survival, via integrative analyses of radiomic features and machine learning algorithms. Finally, BraTS'19 intends to experimentally evaluate the uncertainty in tumor segmentations. Here, Instructions are to develop code to read the files. Where path of dataset should be set. From that path one counter read the files in particular sequence one by one. From the path there will form four sub files in which dataset volumes are arrange in to T1, T2, Flair and T1Ce sequences. Every volume have 155 slices. Slices are infact MRI image. 155 slices are for one volume. And 210 Volumes are High grades Glioma dataset. Wereas 75 Volumes are in another type of glioma. Hence total is 285. Therefore for this huge dataset, Matlab is best plateform for programming but system memory should be more than 16 GB. Processor should be 3.0 Ghz. Hard disk should more 500 GB.
<urn:uuid:7fc1ccf4-e48b-4494-8f70-d19f95fe2bea>
CC-MAIN-2024-51
https://ieee-dataport.org/comment/6505
2024-12-13T21:59:55Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.993502
نویسندگان چکیده کلیدواژهها عنوان مقاله [English] نویسندگان [English] This study was conducted to evaluate the effect of egg yolk and cooling on ram coated spermatozoa. Semen was collected from three ram by artificial vagina contacted with a tube containing Tris- fructose-egg yolk 15%. Samples were pooled, centrifuged by 700 g for 10 min and removed supernatant. Then, samples were diluted by Tris-glucose and centrifuged again to remove seminal plasma and egg yolk. Aliquots split into two fractions and each one was split into 5 parts and added egg yolk 0, 5, 10, 15 and 20%. The half of the treatments were gradually cold and other ones were encountered with cold shock then samples were incubated at 5C for 72 h. Progressive sperm motility, plasma membrane integrity, viability (by Hoechst 33258 fluorescent staining) and acrosome reaction (by PNA-Alexa flur-488) were investigated at 0, 24, 48 and 72 h. The results showed that there was no difference between 15% and 20% egg yolk in the progressive sperm motility but they were higher than 0% and 5% egg yolk. There was highest difference between 0% and 20 % egg yolk in the progressive sperm motility. There was no difference among the treatments containing egg yolk in plasma membrane integrity and acrosome reaction. In both cooling rate, there was no difference among the treatments containing egg yolk in the sperm viability. It was suggested that 20% egg yolk was superior to keep the function of ram coated spermatozoa for storage at 5C. کلیدواژهها [English]
<urn:uuid:97709206-db84-40c1-bb98-c6486a8a41b7>
CC-MAIN-2024-51
https://ijasr.um.ac.ir/article_32577.html
2024-12-13T22:10:37Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.996335
Volume 39 (2024-2025) Volume 38 (2023-2024) Volume 37 (2022-2023) Volume 36 (2021-2022) Volume 35 (2020-2021) Volume 34 (2019-2020) Volume 33 (2018-2019) Volume 32 (2017-2018) Volume 31 (2016-2017) Volume 30 (2015-2016) Volume 29 (2014-2015) Volume 28 (2013-2014) Volume 27 (2012-2013) Volume 26 (2011-2012) Volume 25 (2010-2011) Volume 24 (2009-2010) Volume 23 (2008-2009) Volume 22 (2007-2008) Volume 21 (2006-2007) Volume 20 (2005-2006) Volume 19 (2004-2005) Volume 18 (2003-2004) Volume 17 (2002-2003) Volume 16 (2002-2003) Volume 15 (2001-2002) Volume 14 (2001-2002) Volume 13 (2001) Volume 12 (2000-2001) Volume 11 (2000-2001) Volume 10 (2000-2001) Volume 9 (2000) Volume 8 (1999) Volume 7 (1999) Volume 6 (1998) Volume 5 (1998) Volume 4 (1997) Volume 3 (1997) Volume 2 (1996) Volume 1 (1995) Author = Amir homan Hemmasi Number of Articles: 10 Effect of Gamma-Ray on the Physical, Mechanical, Morphological and, Biological durability Properties of WPC Composite Volume 37, Issue 1 , April 2022, , Pages 86-98 Abstract Utilization of ionizing rays like gamma-ray in polymers to correct their properties has attracted so much attention from researchers. Therefore, in this study, polypropylene as the composite matrix, maleic anhydride (MAPP) as the compatibilizer material, and poplar wood as the filler were placed under ... Read MoreThe study of joints in Oak wood beam compared to the location of node and anti-node of longitudinal vibration Volume 36, Issue 3 , August 2021, , Pages 256-263 Abstract One of the problems of non-destructive tests in the detection of the inhomogeneities in wood and wood products is their location relative to the vibrating node and antinode. Thus, the hidden inhomogeneities located at the vibration node in such materials may not have any effects on the dynamic modulus ... Read MoreEvaluating Thermal Properties and Biodegradability of Nanocomposites based Polylactic Acid (PLA) / Wood Fibers- Volume 36, Issue 3 , August 2021, , Pages 283-292 Abstract AbstractThe paper aims to study differential, dynamic-mechanical and biodegradability analysis of polylactic acid/wood fiber (PLA) composites using three levels of nano-graphene (0.75, 1.5 and 3%). In order to mix the materials together and to make standard specimens, an internal mixer and pressure press ... Read MoreThe effect of using flame retardant mineral fillers on physical and thermal properties of poly lactic acid-rice husk composite Volume 36, Issue 2 , July 2021, , Pages 105-118 Abstract Considering the increase of environmental pollutant resulted from agglomerating rubbish and wastes containing stable petroleum-based polymers, substitution of these polymers with bio-polymers and solving their problems and defects in the production process as well as the final products is an important ... Read MoreApplying Enzymatic treatment and Refining Sequence to Investigate Their Effect on Properties of Pulp and Paper Produced from Mixed Office Waste Paper Volume 35, Issue 2 , July 2020, , Pages 195-204 Abstract The effect of applying the sequence of enzymatic treatment and refining was investigated on the properties of deinked pulp from mixed office waste paper (MOW). Refining was applied for 700 and 1500 revolutions. Enzymatic treatment was applied for 60 minutes with temperature of 60°C and 13% of consistency. ... Read More Volume 35, Issue 1 , April 2020, , Pages 33-45 Abstract The aim of this study is to evaluate the dynamic and static of elastic properties of Fir wood joints. For this purpose conventional joints in woos industry including dovetail, tongue and groove beech wood (Abies alba.) joints with polyvinyl acetate (PVA) and cyanoacrylate (CA) adhesives were used. Dimensions ... Read MoreInvestigation of relationship between dynamic modulus of elasticity and static bending properties in particleboard plates Volume 32, Issue 2 , July 2017, , Pages 193-204 Abstract In this study the relationship between dynamic modulus of elasticity from longitudinal vibration method with static modulus of elasticity and bending strength in two directions: the Parallel machine direction and machine direction have been investigated. For this purpose 4 plates ... Read More Volume 31, SPRING 1 , March 2016, , Pages 92-104 Abstract A new kind of thermoplastic elastomer nano composite reinforced with nano cellulose fibers is reported. The first aim of this investigation was to study the interaction and dispersion of nano cellulose fiber into Pebax matrix. This copolymer is Polyether – b – Amide thermoplastic elastomer ... Read MoreForecasting of printing and writing paper consumption in Iran using artificial neural network and classical methods Volume 30, WINTER 4 , December 2015, , Pages 632-652 Abstract The objective of the research is to forecast the trend of the printing and writing paper consumption in Iran for a five-year period using both modern and classical methods. In order to do the forecasting, predictability of time series was primarily studied using Durbin-Watson and Runs tests. Then, artificial ... Read More Volume 30, Summer 2 , August 2015, , Pages 207-219
<urn:uuid:54dffe09-a238-467e-99e2-67f4ff26f08f>
CC-MAIN-2024-51
https://ijwpr.areeo.ac.ir/?_action=article&au=28314&_au=Amir+homan++Hemmasi&lang=en
2024-12-13T22:12:27Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.932994
Recently, network representation has attracted many research works mostly concentrating on representing of nodes in a dense low-dimensional vector. There exist some network embedding methods focusing only on the node structure and some others considering the content information within the nodes. In this ... Read More Recently, network representation has attracted many research works mostly concentrating on representing of nodes in a dense low-dimensional vector. There exist some network embedding methods focusing only on the node structure and some others considering the content information within the nodes. In this paper, we propose HDNR; a hybrid deep network representation model, which uses a triplet deep neural network architecture that considers both the node structure and content information for network representation. In addition, the author's writing style is also considered as a significant feature in the node content information. Inspired by the application of deep learning in natural language processing, our model utilizes a deep random walk method to exploit inter-node structures and two deep sequence prediction methods to extract nodes' content information. The embedding vectors generated in this manner were shown to have the ability of boosting each other for learning optimal node representation, detecting more informative features and ultimately a better community detection. The experimental results confirm the effectiveness of this model for network representation compared to other baseline methods.
<urn:uuid:06cffb01-0e98-4f82-a535-8ffc804a1667>
CC-MAIN-2024-51
https://jad.shahroodut.ac.ir/?_action=article&au=50154&_au=Salajegheh,%20A.
2024-12-13T20:33:08Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00441.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.99411
ModElement class Constructors Properties - cite ↔ String - read / write - dateTime ↔ String - read / write - accessibleNode → AccessibleNode - final, inherited - assignedSlot → SlotElement - final, inherited - attributes ↔ Map< String, String> - All attributes on this element. [...] read / write, inherited - baseUri → String - @JSName('baseURI'), final, inherited - borderEdge → CssRect - Access the dimensions and position of this element's content + padding + border box. [...] read-only, inherited - childNodes → List< Node> - A list of this node's children. [...] @Creates('NodeList'), @Returns('NodeList'), final, inherited - children ↔ List< Element> - List of the direct children of this element. [...] read / write, inherited - classes ↔ CssClassSet - The set of CSS classes applied to this element. [...] read / write, inherited - className ↔ String - read / write, inherited - client → Rectangle< num> - Gets the position of this element relative to the client area of the page. read-only, inherited - clientHeight → int - final, inherited - clientLeft → int - final, inherited - clientTop → int - final, inherited - clientWidth → int - final, inherited - computedName → String - final, inherited - computedRole → String - final, inherited - contentEdge → CssRect - Access this element's content position. [...] read-only, inherited - contentEditable ↔ String - read / write, inherited - dataset ↔ Map< String, String> - Allows access to all custom data attributes (data-*) set on this element. [...] read / write, inherited - dir ↔ String - read / write, inherited - documentOffset → Point< num> - Provides the coordinates of the element relative to the top of the document. [...] read-only, inherited - draggable ↔ bool - Indicates whether the element can be dragged and dropped. [...] read / write, inherited - firstChild → Node - The first child of this node. [...] final, inherited - hashCode → int - The hash code for this object. [...] read-only, inherited - Indicates whether the element is not relevant to the page's current state. [...] read / write, inherited - id ↔ String - read / write, inherited - inert ↔ bool - read / write, inherited - innerHtml ↔ String - Parses the HTML fragment and sets it as the contents of this element. [...] read / write, inherited - innerText ↔ String - @JSName('innerText'), read / write, inherited - inputMode ↔ String - read / write, inherited - isConnected → bool - final, inherited - isContentEditable → bool - read-only, inherited - lang ↔ String - read / write, inherited - lastChild → Node - The last child of this node. [...] final, inherited - localName → String - @Returns('String'), read-only, inherited - marginEdge → CssRect - Access the dimensions and position of this element's content + padding + border + margin box. [...] read-only, inherited - namespaceUri → String - A URI that identifies the XML namespace of this element. [...] read-only, inherited - nextElementSibling → Element - final, inherited - nextNode → Node - The next sibling node. [...] @JSName('nextSibling'), final, inherited - nodeName → String - The name of this node. [...] final, inherited - nodes ↔ List< Node> - A modifiable list of this node's children. read / write, inherited - nodeType → int - The type of node. [...] final, inherited - nodeValue → String - The value of this node. [...] final, inherited - nonce ↔ String - read / write, inherited - offset → Rectangle< num> - Gets the offset of this element relative to its offsetParent. read-only, inherited - offsetHeight → int - read-only, inherited - offsetLeft → int - read-only, inherited - offsetParent → Element - final, inherited - offsetTop → int - read-only, inherited - offsetWidth → int - read-only, inherited - on → ElementEvents - This is an ease-of-use accessor for event streams which should only be used when an explicit accessor is not available. read-only, inherited - onAbort → ElementStream< Event> - Stream of abort events handled by this Element.read-only, inherited - onBeforeCopy → ElementStream< Event> - Stream of beforecopy events handled by this Element.read-only, inherited - onBeforeCut → ElementStream< Event> - Stream of beforecut events handled by this Element.read-only, inherited - onBeforePaste → ElementStream< Event> - Stream of beforepaste events handled by this Element.read-only, inherited - onBlur → ElementStream< Event> - Stream of blur events handled by this Element.read-only, inherited - onCanPlay → ElementStream< Event> - read-only, inherited - onCanPlayThrough → ElementStream< Event> - read-only, inherited - onChange → ElementStream< Event> - Stream of change events handled by this Element.read-only, inherited - onClick → ElementStream< MouseEvent> - Stream of click events handled by this Element.read-only, inherited - onContextMenu → ElementStream< MouseEvent> - Stream of contextmenu events handled by this Element.read-only, inherited - onCopy → ElementStream< ClipboardEvent> - Stream of copy events handled by this Element.read-only, inherited - onCut → ElementStream< ClipboardEvent> - Stream of cut events handled by this Element.read-only, inherited - onDoubleClick → ElementStream< Event> - Stream of doubleclick events handled by this Element.@DomName('Element.ondblclick'), read-only, inherited - onDrag → ElementStream< MouseEvent> - A stream of drag events fired when this element currently being dragged. [...]read-only, inherited - onDragEnd → ElementStream< MouseEvent> - A stream of dragend events fired when this element completes a drag operation. [...]read-only, inherited - onDragEnter → ElementStream< MouseEvent> - A stream of dragenter events fired when a dragged object is first dragged over this element. [...]read-only, inherited - onDragLeave → ElementStream< MouseEvent> - A stream of dragleave events fired when an object being dragged over this element leaves this element's target area. [...]read-only, inherited - onDragOver → ElementStream< MouseEvent> - A stream of dragover events fired when a dragged object is currently being dragged over this element. [...]read-only, inherited - onDragStart → ElementStream< MouseEvent> - A stream of dragstart events fired when this element starts being dragged. [...]read-only, inherited - onDrop → ElementStream< MouseEvent> - A stream of drop events fired when a dragged object is dropped on this element. [...]read-only, inherited - onDurationChange → ElementStream< Event> - read-only, inherited - onEmptied → ElementStream< Event> - read-only, inherited - onEnded → ElementStream< Event> - read-only, inherited - onError → ElementStream< Event> - Stream of error events handled by this Element.read-only, inherited - onFocus → ElementStream< Event> - Stream of focus events handled by this Element.read-only, inherited - onFullscreenChange → ElementStream< Event> - Stream of fullscreenchange events handled by this Element.read-only, inherited - onFullscreenError → ElementStream< Event> - Stream of fullscreenerror events handled by this Element.read-only, inherited - onInput → ElementStream< Event> - Stream of input events handled by this Element.read-only, inherited - onInvalid → ElementStream< Event> - Stream of invalid events handled by this Element.read-only, inherited - onKeyDown → ElementStream< KeyboardEvent> - Stream of keydown events handled by this Element.read-only, inherited - onKeyPress → ElementStream< KeyboardEvent> - Stream of keypress events handled by this Element.read-only, inherited - onKeyUp → ElementStream< KeyboardEvent> - Stream of keyup events handled by this Element.read-only, inherited - onLoad → ElementStream< Event> - Stream of load events handled by this Element.read-only, inherited - onLoadedData → ElementStream< Event> - read-only, inherited - onLoadedMetadata → ElementStream< Event> - read-only, inherited - onMouseDown → ElementStream< MouseEvent> - Stream of mousedown events handled by this Element.read-only, inherited - onMouseEnter → ElementStream< MouseEvent> - Stream of mouseenter events handled by this Element.read-only, inherited - onMouseLeave → ElementStream< MouseEvent> - Stream of mouseleave events handled by this Element.read-only, inherited - onMouseMove → ElementStream< MouseEvent> - Stream of mousemove events handled by this Element.read-only, inherited - onMouseOut → ElementStream< MouseEvent> - Stream of mouseout events handled by this Element.read-only, inherited - onMouseOver → ElementStream< MouseEvent> - Stream of mouseover events handled by this Element.read-only, inherited - onMouseUp → ElementStream< MouseEvent> - Stream of mouseup events handled by this Element.read-only, inherited - onMouseWheel → ElementStream< WheelEvent> - Stream of mousewheel events handled by this Element.read-only, inherited - onPaste → ElementStream< ClipboardEvent> - Stream of paste events handled by this Element.read-only, inherited - onPause → ElementStream< Event> - read-only, inherited - onPlay → ElementStream< Event> - read-only, inherited - onPlaying → ElementStream< Event> - read-only, inherited - onRateChange → ElementStream< Event> - read-only, inherited - onReset → ElementStream< Event> - Stream of reset events handled by this Element.read-only, inherited - onResize → ElementStream< Event> - read-only, inherited - onScroll → ElementStream< Event> - Stream of scroll events handled by this Element.read-only, inherited - onSearch → ElementStream< Event> - Stream of search events handled by this Element.read-only, inherited - onSeeked → ElementStream< Event> - read-only, inherited - onSeeking → ElementStream< Event> - read-only, inherited - onSelect → ElementStream< Event> - Stream of select events handled by this Element.read-only, inherited - onSelectStart → ElementStream< Event> - Stream of selectstart events handled by this Element.read-only, inherited - onStalled → ElementStream< Event> - read-only, inherited - onSubmit → ElementStream< Event> - Stream of submit events handled by this Element.read-only, inherited - onSuspend → ElementStream< Event> - read-only, inherited - onTimeUpdate → ElementStream< Event> - read-only, inherited - onTouchCancel → ElementStream< TouchEvent> - Stream of touchcancel events handled by this Element.read-only, inherited - onTouchEnd → ElementStream< TouchEvent> - Stream of touchend events handled by this Element.read-only, inherited - onTouchEnter → ElementStream< TouchEvent> - Stream of touchenter events handled by this Element.read-only, inherited - onTouchLeave → ElementStream< TouchEvent> - Stream of touchleave events handled by this Element.read-only, inherited - onTouchMove → ElementStream< TouchEvent> - Stream of touchmove events handled by this Element.read-only, inherited - onTouchStart → ElementStream< TouchEvent> - Stream of touchstart events handled by this Element.read-only, inherited - onTransitionEnd → ElementStream< TransitionEvent> - Stream of transitionend events handled by this Element.@SupportedBrowser(SupportedBrowser.CHROME), @SupportedBrowser(SupportedBrowser.FIREFOX), @SupportedBrowser(SupportedBrowser.IE, '10'), @SupportedBrowser(SupportedBrowser.SAFARI), read-only, inherited - onVolumeChange → ElementStream< Event> - read-only, inherited - onWaiting → ElementStream< Event> - read-only, inherited - onWheel → ElementStream< WheelEvent> - read-only, inherited - outerHtml → String - read-only, inherited - ownerDocument → Document - The document this node belongs to. [...] final, inherited - paddingEdge → CssRect - Access the dimensions and position of this element's content + padding box. [...] read-only, inherited - parent → Element - The parent element of this node. [...] @JSName('parentElement'), final, inherited - parentNode → Node - The parent node of this node. [...] final, inherited - previousElementSibling → Element - final, inherited - previousNode → Node - The previous sibling node. [...] @JSName('previousSibling'), final, inherited - runtimeType → Type - A representation of the runtime type of the object. read-only, inherited - scrollHeight → int - read-only, inherited - scrollLeft ↔ int - read / write, inherited - scrollTop ↔ int - read / write, inherited - scrollWidth → int - read-only, inherited - shadowRoot → ShadowRoot - The shadow root of this shadow host. [...] @SupportedBrowser(SupportedBrowser.CHROME, '25'), read-only, inherited - slot ↔ String - read / write, inherited - spellcheck ↔ bool - read / write, inherited - style → CssStyleDeclaration - final, inherited - styleMap → StylePropertyMap - final, inherited - tabIndex ↔ int - read / write, inherited - tagName → String - final, inherited - text ↔ String - All text within this node and its descendents. [...] @JSName('textContent'), read / write, inherited - title ↔ String - read / write, inherited - translate ↔ bool - Specifies whether this element's text content changes when the page is localized. [...] read / write, inherited Methods - addEventListener( String type, EventListener listener, [ bool useCapture ]) → void - inherited - after( Object nodes) → void - inherited - animate( Iterable< Map< frames, [ dynamic timing ]) → AnimationString, dynamic> > - - Creates a new AnimationEffect object whose target element is the object - on which the method is called, and calls the play() method of the - AnimationTimeline object of the document timeline of the node document - of the element, passing the newly created AnimationEffect as the argument - to the method. Returns an Animation for the effect. - Examples var animation = elem.animate([{"opacity": 75}, {"opacity": 0}], 200); var animation = elem.animate([ {"transform": "translate(100px, -100%)"}, {"transform" : "translate(400px, 500px)"} ], 1500); - The frames parameter is an Iterable- map entries specify CSS animation effects. The timing paramter can be a double, representing the number of milliseconds- for the transition, or a Map with fields corresponding to those - of the Timing object.@SupportedBrowser(SupportedBrowser.CHROME, '36'), inherited - append( Node node) → Node - Adds a node to the end of the child nodes list of this node. [...] @JSName('appendChild'), inherited - appendHtml( String text, { NodeValidator validator, NodeTreeSanitizer treeSanitizer }) → void - Parses the specified text as HTML and adds the resulting node after the last child of this element. inherited - appendText( String text) → void - Adds the specified text after the last child of this element. inherited - attached( ) → void - Called by the DOM when this element has been inserted into the live document. [...] inherited - attachShadow( Map shadowRootInitDict) → ShadowRoot - inherited - attributeChanged( String name, String oldValue, String newValue) → void - Called by the DOM whenever an attribute on this has been changed. inherited - before( Object nodes) → void - inherited - blur( ) → void - inherited - click( ) → void - inherited - clone( bool deep) → Node - Returns a copy of this node. [...] @JSName('cloneNode'), inherited - closest( String selectors) → Element - inherited - contains( Node other) → bool - Returns true if this node contains the specified node. [...] inherited - createFragment( String html, { NodeValidator validator, NodeTreeSanitizer treeSanitizer }) → DocumentFragment - Create a DocumentFragment from the HTML fragment and ensure that it follows the sanitization rules specified by the validator or treeSanitizer. [...] inherited - createShadowRoot( ) → ShadowRoot - Creates a new shadow root for this shadow host. [...] @SupportedBrowser(SupportedBrowser.CHROME, '25'), inherited - detached( ) → void - Called by the DOM when this element has been removed from the live document. [...] inherited - dispatchEvent( Event event) → bool - inherited - enteredView( ) → void - Deprecated*: override attached instead. inherited - focus( ) → void - inherited - getAnimations( ) → List< Animation> - inherited - getAttribute( String name) → String - inherited - getAttributeNames( ) → List< String> - inherited - getAttributeNS( String namespaceURI, String name) → String - inherited - getBoundingClientRect( ) → Rectangle< num> - Returns the smallest bounding rectangle that encompasses this element's padding, scrollbar, and border. [...] @Creates('_DomRect'), @Returns('_DomRect|Null'), inherited - getClientRects( ) → List< Rectangle< num> > - inherited - getComputedStyle( [String pseudoElement ]) → CssStyleDeclaration - The set of all CSS values applied to this element, including inherited and default values. [...] inherited - getDestinationInsertionPoints( ) → List< Node> - Returns a list of shadow DOM insertion points to which this element is distributed. [...] @Creates('NodeList'), @Returns('NodeList|Null'), inherited - getElementsByClassName( String classNames) → List< Node> - Returns a list of nodes with the given class name inside this element. [...] @Creates('NodeList|HtmlCollection'), @Returns('NodeList|HtmlCollection'), inherited - getNamespacedAttributes( String namespace) → Map< String, String> - Gets a map for manipulating the attributes of a particular namespace. [...] inherited - getRootNode( [Map options ]) → Node - inherited - hasAttribute( String name) → bool - inherited - hasAttributeNS( String namespaceURI, String name) → bool - inherited - hasChildNodes( ) → bool - Returns true if this node has any children. [...] inherited - hasPointerCapture( int pointerId) → bool - inherited - insertAdjacentElement( String where, Element element) → Element - Inserts element into the DOM at the specified location. [...]inherited - insertAdjacentHtml( String where, String html, { NodeValidator validator, NodeTreeSanitizer treeSanitizer }) → void - Parses text as an HTML fragment and inserts it into the DOM at the specified location. [...] inherited - insertAdjacentText( String where, String text) → void - Inserts text into the DOM at the specified location. [...] inherited - insertAllBefore( Iterable< Node> newNodes, Node refChild) → Node - Inserts all of the nodes into this node directly before refChild. [...] inherited - insertBefore( Node node, Node child) → Node - Inserts all of the nodes into this node directly before refChild. [...] inherited - leftView( ) → void - Deprecated*: override detached instead. inherited - matches( String selectors) → bool - Checks if this element matches the CSS selectors. inherited - matchesWithAncestors( String selectors) → bool - Checks if this element or any of its parents match the CSS selectors. inherited - noSuchMethod( Invocation invocation) → dynamic - Invoked when a non-existent method or property is accessed. [...] inherited - offsetTo( Element parent) → Point< num> - Provides the offset of this element's borderEdge relative to the specified parent . [...]inherited - querySelector( String selectors) → Element - Finds the first descendant element of this element that matches the specified group of selectors. [...] inherited - querySelectorAll< T extends Element> (String selectors) → ElementList< T> - Finds all descendent elements of this element that match the specified group of selectors. [...] inherited - releasePointerCapture( int pointerId) → void - inherited - remove( ) → void - Removes this node from the DOM. inherited - removeAttribute( String name) → void - inherited - removeAttributeNS( String namespaceURI, String name) → void - inherited - removeEventListener( String type, EventListener listener, [ bool useCapture ]) → void - inherited - replaceWith( Node otherNode) → Node - Replaces this node with another node. inherited - requestFullscreen( ) → void - Displays this element fullscreen. [...] @JSName('webkitRequestFullscreen'), @SupportedBrowser(SupportedBrowser.CHROME), @SupportedBrowser(SupportedBrowser.SAFARI), inherited - requestPointerLock( ) → void - inherited - scroll( [dynamic options_OR_x, num y ]) → void - inherited - scrollBy( [dynamic options_OR_x, num y ]) → void - inherited - scrollIntoView( [ScrollAlignment alignment ]) → void - Scrolls this element into view. [...] inherited - scrollTo( [dynamic options_OR_x, num y ]) → void - inherited - setApplyScroll( String nativeScrollBehavior) → Future< ScrollState> - inherited - setAttribute( String name, String value) → void - inherited - setAttributeNS( String namespaceURI, String name, String value) → void - inherited - setDistributeScroll( String nativeScrollBehavior) → Future< ScrollState> - inherited - setInnerHtml( String html, { NodeValidator validator, NodeTreeSanitizer treeSanitizer }) → void - Parses the HTML fragment and sets it as the contents of this element. This ensures that the generated content follows the sanitization rules specified by the validator or treeSanitizer. [...] inherited - setPointerCapture( int pointerId) → void - inherited - toString( ) → String - The string representation of this element. [...] inherited
<urn:uuid:567097a1-4f6a-49a1-b9bf-e7a49851d8e2>
CC-MAIN-2024-51
https://api.dart.dev/stable/2.5.2/dart-html/ModElement-class.html
2024-12-02T08:01:50Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.835153
Keywords: Copyright: This image is available for use under the Creative Commons – Attribute (CC-Attribute) License. Please credit the Area 4 History Project when using this media. Keywords: Copyright: This image is available for use under the Creative Commons – Attribute (CC-Attribute) License. Please credit the Area 4 History Project when using this media. Do you have information, updates, paperwork, or photographs related to this page? We would love your contribution. Feel free to leave a comment below, if enabled, or visit our Contact Page to let us know you can help. We appreciate all contributions and can't wait to include your content on this website. Last updated: September 26, 2024 at 22:32 pm
<urn:uuid:1c947dca-fd84-4da5-bcf0-3899d7ef75f1>
CC-MAIN-2024-51
https://area4history.com/images/dsc_0530-2-jpg/
2024-12-02T07:18:42Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.98976
Stack Exchange log in sign up chat discuss faq users badges Area 51 » jfpoilpret info activity reputation 201 reputation 24 views discussion user network profile Registered User name jfpoilpret member for 10 years seen Aug 6 '15 at 21:09 website http//jfpoilpret.blogspot.com location Lausanne, Switzerland stats accounts 0 Proposals 0 Current Commitments 1 Fulfilled Commitment Arduino For developers of open-source hardware and software that is compatible with Arduino define commit beta 0 Followed 0 Example Questions 3 Votes Cast 3 up 0 down 4 Badges ● Advocate ● Enthusiast ● Upholder ● Pioneer user feed faq blog legal privacy policy contact us feedback always welcome site design / logo © 2024 Stack Exchange Inc; user contributions licensed under cc by-sa ; see the licensing help page for more information. rev 618.104.22.168 Area 51 works best with JavaScript enabled
<urn:uuid:a87f41fd-a7cb-4ca6-8086-c4a4106da97c>
CC-MAIN-2024-51
https://area51.stackexchange.com/users/99538
2024-12-02T07:19:55Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.970774
- HTTP request - Path parameters - Query parameters - Request body - Response body - Authorization scopes - IAM Permissions Lists recommendations for the specified Cloud Resource. Requires the recommender.*.list IAM permission for the specified recommender. HTTP request GET https://recommender.googleapis.com/v1beta1/{parent=projects/*/locations/*/recommenders/*}/recommendations The URL uses gRPC Transcoding syntax. Path parameters Parameters | | ---|---| parent | Required. The container resource on which to execute the request. Acceptable formats: LOCATION here refers to GCP Locations: https://cloud.google.com/about/locations/ RECOMMENDER_ID refers to supported recommenders: https://cloud.google.com/recommender/docs/recommenders. | Query parameters Parameters | | ---|---| pageSize | Optional. The maximum number of results to return from this request. Non-positive values are ignored. If not specified, the server will determine the number of results to return. | pageToken | Optional. If present, retrieves the next batch of results from the preceding call to this method. | filter | Filter expression to restrict the recommendations returned. Supported filter fields: Examples: The max allowed filter length is 500 characters. (These expressions are based on the filter language described at https://google.aip.dev/160) | Request body The request body must be empty. Response body If successful, the response body contains an instance of ListRecommendationsResponse . Authorization scopes Requires the following OAuth scope: https://www.googleapis.com/auth/cloud-platform For more information, see the Authentication Overview. IAM Permissions Requires the following IAM permissions on the parent resource: recommender.usageCommitmentRecommendations.list recommender.computeAddressIdleResourceRecommendations.list recommender.computeDiskIdleResourceRecommendations.list recommender.computeImageIdleResourceRecommendations.list recommender.computeInstanceGroupManagerMachineTypeRecommendations.list recommender.computeInstanceIdleResourceRecommendations.list recommender.computeInstanceMachineTypeRecommendations.list recommender.iamPolicyRecommendations.list For more information, see the IAM documentation.
<urn:uuid:cf6c1b18-89d4-4a48-ad2c-4d717ac89cbc>
CC-MAIN-2024-51
https://cloud-dot-devsite-v2-prod.appspot.com/recommender/docs/reference/rest/v1beta1/projects.locations.recommenders.recommendations/list
2024-12-02T08:07:35Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.938287
Registration is back on-line! (Thanks @amandafrench) And one more thing: We’re minimising THATCamp Cyprus into a one day event during the weekend of 3-4 September, and revisiting the possibility of holding a BootCamp on the extra day. Any ideas for workshops are welcome! We’ll be holding THATCamp Cyprus at the Cyprus University of Technology, Department of Multimedia and Graphic Arts (the premises are perfect!).
<urn:uuid:2cab1f3a-3f50-47c9-a6ab-8fdd86f7057d>
CC-MAIN-2024-51
https://cyprus2011.thatcamp.org/page/2/index.html
2024-12-02T08:51:00Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997363
Elise D. prd.21.Super-Fly Sadie2.I can fly in the sky3.I would help get people out of fires who are trapped inside and fly them out to safety. Maya .S. Prd 21.Bouncing Bella 2.I can jump 70 feet in the air and out run any bad person.3.I would bring safety,happiness,love,and protection to everyone. Da'Boris B. 2ndIf i was a superhero my name would be aqua man. i would have the ability to swim under water like a fish and communicate with animals. i would take my powers and use them for science research. AsherE(2)animal man?Power-Ability to communicate with animals.I would do this to find out what animals think of humans and share that info with the rest of the world. kianaHortonmy name would be singing girl my super power would be to sing a song that makes that villian so up set that when i get done sing a song they would freeze and would not be able to defrost until the song is out of there minds Joe G.2nd periodMy super hero ability would be to change annoying people's everyday objects into something really irritating, like a desk stapler turns into a bee that constantly buzzes in your ear. My name would be Presto-Change-o, the Great Annoyance Causer. I think it would be fun to go around and give annoying people a taste of their own medicine. kiana H.my name would be singing girl my super power would be to sing a song that makes that villian so upset that when i get done sing a song they would freeze and would not be able to defrost until the song is out of there minds My name would be Blue eyed wonder, my super power would be the ability to be invincible so no enemies could do any damage to me. The message I would like to bring everyone is that if someone messes with you, they will be taken care by either a superhero or another person. -Lizzie K pd. 2 Rebekah D. period 2 I am Annie Mal. I can shapeshift into different animals. I work to stop global warming. The ozone layer and the animal kingdom are mine to save! Brandon B period 21. shapeshifter Hannah S.Period 2My name would just be Z.My superpowers would be that i can change my apperance whenever i wanted to. Because if that i could go all around the world 1.) 2.) to be able to see when trouble coming , and to be able to fly3.)i will be able to talk good things into the people who is destroying the worldkyla p xavierm4my name is Rogueman, i can turn invisible,intangeble, and super fast. I try to stop crime in secrecy, and catch evil villans. Michael R pd 4 My name is mr. bigg i can grow super big and i am out to help people by doing the impossible manual labor Connor K. Period 4 1. My name is inferno2. I have the power to shoot fire through any part of my body.3. My message that I would like to tell everyone is that you can be anyone you want if you work hard. I did not want to be like this. khristianwper.4pI Majestic Ip SpringdanceMy power would be to stop timeI would like to help by using my powers to persuade world leaders to do the right thing so world peace will be better.McKenzee K.P.4 Quinn C period 4If i were a super hero, i would be super table man. My super power would be to transfer to any table in the world, and then walk around and fight crime (as a table of course). of course, because i can teleport to any table in the world, i would be faster than super fast guy. My message to everyone would be that furniture everywhere can fight crime. Michael P period 4The super fast guyim going to stop drugs and crime because im fastim faster then flashim better than the super table manand super table man is slower than me James GPeriod 41. The Amazing Lazy Guy2. I have the powers to eat a lot of food and sit on the couch and watch tv.3. If you are in danger, I'll just sit on the couch and eat chips. kyle f. p.4i think my name should be the speedey Nicole H.Applied arts, period 4My superhero's name is Admad. He is different from ordinary superheroes. He can read peoples minds but he can also change their ways if they are doing evil. he looks around the world for people who are doing evil.His message that one day in the near future with everyoneshelp the world will be rid of evil. Audrey P.p.8If I were a super hero my name would be the same because I'm not in disguise. My super power would be to be able to turn invisible. I would turn invisible at any time i want like when someone runs into me in the hall they would get all freaked out because there is no one there. tim h #1 if i was a super hero my name would be the magic man#2 i would have super strangest and be very quick#3 my message would be always stay cool willie p 08g1. The amazing natedogg.2. my power is turning people into dogs. Kyle W-Period 8My name PrinceTamalama from the Freaky freaky DoomBox And my super powers are Super Strength And Invisibility and Flight. Darion W.Period 8Super D.Take Flight.Super Fast,Laser eyes Kevin B.1. Potato in a Bucket.2. Can peel skin without a peeler.3. Don't be mean to potatoes. Brian C. My superpower would be to become invisible anytime I want to. My message would be to tell kids my age to be respectful and to follow your dreams Lucas P.My name's the Speed Demon.My super powers are super speed, super strength, and I can fly.My message to the world is anyone can be a hero, not just people with super powers. Leah J. Period 81. The Pink Flamingo2. I can influence the way people think.3. I want to send a message to people to stop abusing animals and not kill their homes. Rosemary H.Period 81. The Green Queen2. If I see any trash on the street, I can zap it and turn it into clean air or trees.3. I want to make the world a prettier, brighter, and nicer home for people and animals. Kyle P. When I become a superhero: 1) I want to be called King Krunch2) My super power would be crunching the villians in to little pieces. I would also be able to make my own energy and share it Sinclair D.If i were a super hero i think my name would be Mrs.Eye. my super power would be able to see things that normal people can't see. The message i want to tell the citizens is that i can see things better than you and so there fore i am better than you so let me do all of the saving the world stuff! Eric C. Period 8 My name is The Skull Raider. I can bring back the dead to serve me. I can also take over body's and make them do as I wish. Although I seem like the bad guy but I'm not. I'm here to protect the world of the living from the creatures that live in the shadows never heard of me, never will If I were a superhero, I think that I would be either Ms. Green. My super power would be the ability to rid the universe of all potential and actual pollutants. The message that I would want to tell people is that saving the environment is NOT that hard, if you do something simple, like recycle or ride your bike to work instead of driving, can make the world a healthier and cleaner place to live. And i don't think that anybody wants to live in a gross, smoggy, polluted world.Olivia T. Prd. 8 My name is Galacta girl. I have fire powers. I can burn all littered pieces of garbage and trash that can be tosed on the ground. The citizens of my earth will be happy that i am helping solve all global warming.Jalissa B-H,period 1 Hannah S.Period 2My super hero name would be hannahbannah.My super power would be that i would go around giving people special bananas. These bananas would make the person who ate them tell the truth for one hour. I would use these bananas against people like polititions who lie a lot. That way the world would know if their world leaders are evil or not.My message I would want to tell people is always tell the truth, and eat heathy. John D, Period 2I am Treeman, a stupid name I know but I can call upon the long-undiscovered powers of trees and command them to do my bidding and eliminate my enemies. I aim to spread the message of respect to trees, and the message of the upcoming end of the world by pollution from burning trees. Rachel M: 2If i was a superhero my name would be, "Fashion Girl". I would choose that because I love fashion. something about colorful clothes interest me in some way. I don't like all fashion things, but i like things that aren't so colorful, but at the same time, fashionable. My super power would be, helping people with no type of fashion, get them into fashion. I want to bring my type of fashion to people and show them that fashion designing can be a good hobby. Jesse V.2nd periodIf i were a super hero my name would be super jesse spectacular. I would be able to be invisible and i'd be able to sneek into meetings with terrorists, or other bad guys that were planning to attack or do something bad. I'd want to protect all the people in my city from gangs or anybody that would want to cause the people harm, and especially the people that only want to harm people because it entertains them. 1.) miss. creativekyla p jakari c.per.,21. i would want my superpower to make me extra strong and i can be able to fly and go invisible. 2.i would want my name to be princetamalama from the freaky freaky dean bogs.3.the message i would be sending is that i would be the strongest men alive and could never be stopped. andrew mccabe period 4my name would be AwEsOmE MaNmy super hero power would be to shoot pure amazingness out of my eyes. So pretty much everything i see would be instantly awesomefied.my message to the people would be for people to live everyday like it's the awesomest. also never regret anything for too long or else you'll always be sad. and being sad is not awesome. Khrisitan W. lo Majestic lo my superhero power would be i am immortal , and my skin is made of kevlar . I can with stand any force and I have unlimited strength. My message to the people would be to live everyday like is your last and enjoy every moment. Jake Bronner1. SUPADUPAKAE2. I can change colors with my mind3. Don't fear the color changer is here Alena B. period 8If I were a super hero my name would be Miss Icy. My super power would be that I could make ice creams and ice cubes of and shape or size. The message I want to say is this"No matter how big or small the job is (or how big or small you want your ice cream or ice cube to be) its never to big or small for Miss Icy!!! 1)Angelic G2)My super power is writing in cursive. 3)Be Brave,Be smart,and and a leader. My super power is super speed because i like to move fast. I could travel the world. sheba campbell period 8th 1. mighty girl2. she pet dog and is awesome interesting person Demerra g period 8 name of super hero super gurl super gurl is someone who saves the world by cleaning up the world helping out other people and caring for the fellow people in her town showing care she flies she is very strong and she is cool plus she defeat bad people who try to mess up the town Deja M.Period 91.)Hair Queen 3.02.)I save the world from split ends and horrible dye jobs 3.)I am Hair Queen 3.0,and i save the world from hideous hair.If you have split ends or damaged hair,then give me a call. I will fix you up and make you look fabulous. I have many hair salons across the world, and I am the best in the nation. Danielle K.Period 91.Balloon Girl2.Balloon girl travels by balloon and save the world from evil clowns and people who sell balloons.3.The message I would send to my citizens is to not sit on balloons and don't always trust clowns. Ariana WPeriod 91.If i were i super hero, my name would be PRiNCESS diAMONd 3.0.2.My super power would be to use my Diamond to save the world from bad jewelry sales, robberies, and discusting stores.3.I am PRiNCESS diAMONd 3.0 and if you have a problem with bad jewelry that you bought, a jewelry store robbery, or bad stores then give me a call and i will be there in a hurry.! Jack B.period 91. My name would be Zap.2. My power would be to zap lighting.3. My message would be just try hard. Lyndell W.Period 9If I were a superhero my name would be giggles and I would bring laughter to all people.I would tell jokes help other people become funny and give them good tips. gordon b.period 9 my name would be the weather blaster. i could control the weather and fly and super speed. then i could stop tornadoes and hurricanes. i could save farmland. Zack B. Period 91. My name is bigZ. I have super strength and I can fly. My message to the world is if anyone needs help with something they cant do them self i will help them. Such as moving a car, stoping a train from crashing, or catching a plane when it is going to crash. If they need help I will be their! JEREMY M9HYPNOTIZE BECAUSE I CAN PUT SOMETHING TO MY TEACHERS TO GIVE ME A A. Isabel A.Period 91. My super hero name would be The Imitator.2. My super power would be that I am able to imitate any super hero created and posses their powers. I can only imitate one super hero at a time.3. The message i would bring to everyone is "You shouldn't have to copy people in life, just be yourself because life's too short." Katie A.Period 91. Chef give a lot2. I am the chef of this poor country. I cook for the poor and give over all health to people.3. NO one should starve to death. Some people don't have the money but they need food. Ruby G.Period 91. Doctor fix it all2. I help people who are sick or need medical care.3. For people who don't have the money, but they need medical help, I go all over the world to help them and give them the medical care they need. Charlie h. period 91. my superhero name would be 2.i would be able to prevent fire like house fires, forest fires and any other bad fire. i can also make good fires such as controled burns, camp fires and more. Ben C.Period 91.My super hero name would probably be 2. my power would be to control anything electric. Caitlin M.Period 91. I am Karaoke Meister!2. Er...karaoke? yo yo yiggety yo dawg. wazzup with u foshizzle? Caitlin M.Period 9(Continuation from earlier)3. I will protect the world from the evil bunnies and their friends: the giant vampire guinea pigs! Though I spend too much time singing at karaoke bars to notice them destroying stuff...A picture of karaoke meister Jalissa B-H. Period 1If I were a super hero, I think my name would be Super Girl. My super power would be laser eye vision that burns away littered objects. The message that i would give is that when i burn away all the garbage that pollutes our Earth, is that others help me out my recycling or throwing trash away. This is a good way to stop global warming also. Sophie G. Period 1I would be named CrazyGirl. I would be able to annoy people asnd use this power to stop people like evil rulers form doing things like the Holocost that would effect the world, Jacob M. P.1If I were a superhero my name would be Ghost. I would chose this name because my superpowers would be turning invisible, walking through walls and things of that nature. I would help the people by watching over the populace, and no one could see me as they committed crimes. That way I could easily capture them as criminals. Elisa W.Period 1If I were a superhero I would be called super touch.My super power would be having a magic touch. Anything I would touch would be healed or made More powerful. The message I would send to citizens wold be that bullying has to stop. I would make the weaker person stronger and less afraid of the person that is bullying them. I would be everyones hero. Ben M.Period 1If i were a superhero my name would be Dragon King. My power would be to summon dragons at will and morph into a dragon. the message the citizen should know is airplane accidents no longer. Period 1Michael W.If I were a superhero I would superman. My super power would be strength and flying, I always wanted to fly. You could get to places no one could and plus if i got a job that involves a forklift or a ladder I'm sure I get lots of promotions.[tilt the head left :D] James K. Period 1My super hero power would be to fly.My superhero name would be The Flying Flame. I can fly at light speed and save people who are in a major situation. They will then have one more life because they have been already been saved once. Deja Y.If i was a super hero my name would be super girl. My powers would be that I am strong and that I have heat vision. The message I would tell to the citizens would be I will help you if your in serious trouble. Jalon B.Period 1My name is The Dragon Master.My superpower is to change into a mighty dragon. I can also call upon other dragons to server me. The message I bring to the world is be strong and and mighty like a dragon don't let anything get you down joseph E.my name would be black night and my super powers would be super strength, flight and speed Paul v.E. PERIOD 1IF I WAS A SUPER I WOULD BE A TURTLE THING 'CAUSE TURTLES ARE COOL. I COULD HIDE IN MY SHELL AND HAVE SUPER STRENGTH. NOW I'M SOUNDING LIKE I'M A TEENAGE MUTANT NINJA TURTLE, BUT I'M NOT TRYING TO. MY MESSAGE TO PEOPLE WILL BE TURTLES ARE NOT REPTILES, THE'RE ANPHIBIANS! Ben S.p.9If I were a super hero my name would be aqua raider because everything has water in it so i could control almost everything. With this power i could control bad guys to turn them selfs in. With my power i want to decrease crime by making them think that they are good ghosts that do a good thing saying that not all weird thing are bad. Pierce S. Period 1If I was a superhero, my name would be Blaze and I would be able to control fire. The message I would want people to get is that if I can shoot fire out of my hands than people don't have to shoot each other if they don't agree on something. Jessica K. p.1If I were a superhero my name would be The Mind Mover and I can move anything with my mind. I could move thing and save people. For example if a rock was fall and was going to hit some one to save their life by moving the rock away from them!!!!!!!!! Jonah M.period 1If I were a super hero my name would be the Flying Iceman. I would freeze people who did things illegal and I could see illegal actions from a birds eye view because I can fly. The message is that I want to help them out with the bad guys running around in the world and make sure nobody except the bad guys get a little cold. Mia R. P.1If I were a superhero my name would be The Mind Reader. And my power would to read peoples minds. I would be able to read criminals minds and I can save the innocent people from the evil people. If I could be a super hero I would either be like a fire guy or ice man.My message would be to save the worldand free my people from evil. joseph E. I would help my city from crooks and bad people. Aisling O.Period 1If i were a superhero, my name would be Agirl, which stands for Aisling girl, or Awe girl. My super power would be that I can stretch as much as I want to. For example, if I needed something in the kitchen, but I was in the living room, I could stretch my arm into the kitchen. The message I want to bring to everyone is that I would help people. By this I mean that I could stretch and grab people before they get into an accident, like a car crash. I could also help people by making life easier for them. To do this, I could grab something for them, and then they would not have to run and get it. Eleanor S.Period 1If I were a superhero I would want to be able to fly,& my name would be Lady Soar. Lady Soar would fly around the world and watch to make sure there were no petty burglaries, because that is something that everyone agrees is mean, and then we would be one step closer to having a polite and courteous world. Devin w.1 periodmy super power is super-strength. my super power name is MB. i can lift things that no one else can lift. Haskell Mperiod 1If i were a super hero, my name would probably be †he . My super power would be the power to control nature (wind, earth, fire, water, etc). The message I want to bring to everyone would be that people don't need to worry about being robbed/murdered anymore. Anthony cp.31.my name is bumble_-b i have supper powers. They are invisibility and unlimited wishes. i will help fight crime and also use my powers so i can have fun. i can also fly how how cool is that. Someday i wish to save the world and be the greatest supper hero ever Hannah MPeriod 31.If I were a superhero, my name would be "Tree Hugger." 2. Using my mind, I can plant trees and other kinds of plants to get more oxygen into the world. Also, I can stop pollutants from reaching the Ozone Layer and turn it into oxygen. I can also stop pollutants from killing our sea animals by polluting the oceans and seas. I do this by using my mind to turn it into clean, safe water. 3. The message I would like to bring to everyone is that if we all work together, we can save the planet, the ozone, and the creatures of earth. Recycling is very important and we should all use our super powers, or just a recycling bin to help out the cause. GO GREEN! Lea S.Period 31. If I was a superhero, my name would be The Pollutinator. 2. My power would be to eat all the junk in junkyard's so the ozone layer wouldn't be corrupted so much. And, I would use my mind to deposit good green things into people's mind.3. I would like to bring the message that going green is good and we want to eliminate global warming. Recycling, solar panels, and hybrid cars would help. Another message is that everyone should help out the earth and everyone should do nothing but go green on Earth day. Julian T p.3 1.my name is invisible boy my super powers are i can turn invisible and fire power and fly also i have super strength.i have super speed.i like to beat up bad guys Declan S.P. 3. My name would be the Albino. I would have the incredible power of reflecting, and using my incredibly pale (nearly translucent)skin and hair to filter and reflect sunlight in large amounts and fling them at my enemy. My message is that Albino's are awesome and also that mankind should utilize the sun as Eco-Energy, and put a giant magnifying glass in the orbit of the Earth to burn the enemy like small, insignificant ants!!! Jerren F. period 31.my name would be camel boy.2. my power would be to stop time, super strength, and i have two humps on my back to beat the crap out of people. 3. the message i want to send to people is stacks on deck. Antoine G period 31.fantastic blue2.To stop hurricanes that are coming threw and my other super powers is to drive in nice and exspensive cars and , save the world from people that are hurting the world. I also have supper speed.3.my message is that will never let anyone harm me or the world and also i would not let the world end because of evil and stuburn villins,and know i'm everywhere Nile S.p.31. My name is flashing turtle and i have lightning power and super speed cause who needs to fly when u can run super fast. I would use my powers to fix power plants, cables, and lighting in homes also i will run to trouble fast and stop[ it Rebecca KPeriod 3My name is water woman, As everyone knows, the many bodies of water in the universe are dirty, poluted, and filled with chemicals. My super power is that i can drink one oceans water in less than a minute, then in less than five minutes my filter in the center of my stomach does its job by filtering out all the chemicals, polution, and ect. in the water, and i spit it back out, making the world a clean, less poluted place! This would benifit not just people, but sea life, which would increase our the amount of fresh fish. That means less people getting sick, and a much healthier enviroment! Sierra BPeriod.31.Mercedes2.I'm super fast, and i can shape shift to anything.3.You can't hide from me cause I'm like shadows cause I'm very sneaky,and just know even when you don't feel like your safe you are because I'm everywhere!!!!! Marcasia cperiod31. If i was a hero my name will be markaka.2. my super power is if i think of food it will a peer.3.The reason why i choose that power is because it will help the homeless so if i see any homeless person i will feed them by thinking about what they want. Sylvie S.Period 3If I were a super hero my name would be DeSine. My super power would be the ability to make people and their possessions and or stolen items colorless. This would make bad people sad that they don't have colors and then they would go cry. My message to the world is that bad things are punished, so don't do bad things!!!! And, that colorless is boring. Jade K.Period 3If I was a superhero my name would be Life Saver. I would have something no other superhero would. I would throw candy at people that would quickly stick to them and within 10 seconds it would melt them away. I would use it to protect citizens and keep them safe. I would be their Life Saver. My message is that anything bad can go away. And I can help. Bruno S.p-31.my name is LOONY TUNNY2.My power is every loony tune power imaginable. Also I make every bad guy choke they laugh so much.3.My message is that I will make all the strict workaholics loosen up. SO JUST LIVE LITTLE!!!!!!!!!!!!!!!!!!!!!!!!!!! nile s.p.3My name is joe the hobo i'm not poor thats just my super hero name i can fly and teleport any where i want f.b.i knows me very well i get new gadgets every month i will use my powers for the safety of others Ragan H. Period 9If i were a superhero my name would be Money girl. I can make money appear out of thin air. I would donate the money to good causes. The message i want to send out is if you want to donate some money, ask me and I will give you some. Yusuf K Period 9If i was a superhero, my name would be MegaStrength. My superpower would be to be able to lift any object. My message to send would be that even through the toughest times, you need to be strong. charlie h.9 period(continued)1) my supper hero name is fire boy.2) (other page)3)most people think fire is bad, but their wrong.Fire can be good at some times. with out fire we could not survive in the wild. danielle lperiod 91. funwomen2.fun women will make everthing fun if your feeling down she will bring your day up3. look out cause funwomen is here should would bring u joy Ross C.P. 91. If I were a super hero my name would be TGP: "The Time Guy Person"2. My super power would be to control time.3. With my powers I would do thingslike save someone from dying. For example if there was an old lady who had a heart attack and didn't get to the hospital on time. I could rewind time back to and hour before she had the heart attack and rush her to the hospital. Another thing I could do is save a child from drowning. I could stop a bank robbery or stop someone from getting hit by a car and Ben C.Period 91)If I were a super hero my name would be electroid2) My super power would be to control anything electronic3) I would use my powers to stop machine problems, stop identity theft and help create better appliances. Conal Duffy, Period 9I am the super pink elephant. I can stomp on the ground and send a wave across the ground to knock people of their feet, and Bounce in the air and land on people. I can shoot bananas at people too. I use my powers to protect the species of elephant from extinction and hunting. i got my powers from eating candy. SO DON'T EAT CANDY IF YOUR AN ELEPHANT. danielle lambperiod 9i disagree because animals and creativity don`t have nothing to do with that. Margaret Dadeperiod 91.Superhelper2.send helpers to help the people who need help than i come after them3.after they come and rescue them i would come and help the person who need help breshaun hunter super 'B' the message would be not to mess with me .if i was a super hero i would love to have the power /abilty of super speed, invisiblity and super freeze action!!!!!!!!!!!!!!!!!!!!!!! Jonathan T per. 9 1. My name is alion X. 2. he can catch people and fix things in a move of a hand.3. he tels and helps the police capter criminals Connor K. Period 4If I was a super hero my name would be Inferno. My super power would be that I could shoot fire and electricity out of any part of my body. I would like all citezens to know that you can be anything in the world that you what, it all comes with some hard work. That is why I am here, to protect every one of you from potential danger, so you can work towards those goals in life. If I were a superhero my name would be anonymous. My power would be quick , no one would never know who I am. I would help people with things but I would be so quick they wouldn't even know they've been helped.Latoya P. C. 4th p. Berryhill.C1.peace.2.my super is to bring peace to people .3.my super power would help people by briging peace to fighting , hating ect... Kyler D per.41. if i was a super hero my name would be flash beacuse i can run raely fast. 2. my super power would super speed and super strenth3. my super power would help people by if there stuck under something heavy i could get there fast and i could lift the stuf off befor the die. berryhil.C1. i would have to disagree because humankind is very creative but animals are to . like you see a spider some hate spiders but you don't know how creative they really are . like the common web you mite think it's just web , but it is really a design of lines that make a beautiful design . jones.c1.fire girl 2.i can help people of they home is on fire. 3.if there was a fire i would help people by exstinguishing the fire. Destiny J.period 4If I was a super my name would be courage. Because my friends say that when they are feeling sad i give them the courage to keep trying. The message i would send to the citizens is if you're feeling blue just call me. kyle f.per4my name will be the hawk.my supper power is to fly.i would help people if a i falling i would come and save them. Joanna Campbell Prd 8th 1.hi girl 2.greet people 3.i would greet people and make them happy and make they smile and it would make me happy to . Christian S. my superhero's name would be speedy, he can run super fast and has super strength. 1.danielle l.peroid 92.if i had the ablity to be a superheromy name would be baby talker. 3. the reason why i would be baby talker is because when baby cry they make me feel bad and i wont to have the ablity to know wat they wont and that way i can help the mom and the baby out in that would make me happy and the parent would be even happier because know they know wat is the matter. Chris B.Period 31. His name is Captain Redes.2. Super Speed is his super power.3. He is a good Guy. He is faster than both Superman and Captain America. Juanita W.period81. Ultrasonic Hearing Girl. I can hear people screaming from many states away. My superpower will help people that lose things such as their dog, or their cell phone.Or even listen on the White House, were they make decisions for president. Stephon B. 1st PeriodIf I were a superhero, I would be Mr. Incredible. My superpower would be the gift of help. My superpower would help police officers get criminals off the streets, help keep children safe, and help poor families get food and shelter. Travon Billupsperiod-81.Punch Face Man2.punch people in the face for no reason.3.My powers wouldn't help anyone. it'll just hurt them. My name would be IEZ. I would have the abilty to see from Anyone’s eye (including technoly) and see what thir seeng in my minds eye. IEZ would aslo be faster then the speed of light. In this way IEZ would be able to know when somthing bad is about to happen and get there and stop it.-Luke W. Period 9 Steven W.Period 8If I had a superpower I would be a bully stopper I would go up to bullies and take there lunch money and give it back to the kids they took it from. People would like me and all the people that where being bullied would like me and help me with my home work . Kyle Williams Period 8 If i was to have a super power it wold be to predict when trouble is coming and how it will happen because i would like to stay out of it and most of all keep some of my friends to of it i don't like trouble and i would sure do a lot to stop it. brittaney h. prd 4Mz. Ghetto SupastarI would sing softly to crimanls to make them surrender themselves to the police. 1.Margaret.d.2.my super powers will be a heart bubble.3.i would save people by if they want to fall in love or they are very desprate i would sneak into their home and make them stare at the bubble. then they will fall truly in love. and they will live happily ever after. darrenperiod 9i will be able to fly so i can go to califonia to meet iron man and be a superhero Kayla DunlapMy superhero name is Love.My power is happy love. It will help people by making them happy. Post a Comment
<urn:uuid:b84f3e42-81e7-4c65-b1a4-724f35878d2e>
CC-MAIN-2024-51
https://d304art.blogspot.com/2008/09/superhero.html?showComment=1220976540000
2024-12-02T08:11:02Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by-sa
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.994512
Search form Number of results: 147 Sort by: Situations (6) Regions (0) Countries (1) Situations views: | | Country views: | - 619 urban refugees and asylum seekers have been forcefully relocated to Dadaab since 18th April. Others came on their own. The majority originate from Somalia.highlight 04 Jun 2014 (10 years ago) - Dadaab refugees call for peace. World Refugee Day (20th June) will be celebrated in all five Dadaab camps. This year, refugees chose PEACE as the main theme.highlight 04 Jun 2014 (10 years ago) - *World Refugee Day (20th June) UNHCR and partners will lead the refugee community in Dadaab to commemorate World Refugee Day on 20th June. The global theme for this year is- “One family torn apart by war is too many.” The community has agreed to commemorate this day by conveying to the world, messages of peace through a campaign dubbed “31 Days of Peace Messages” which kicked off on 20th May. The community communication team is conveying these messages in camps as well as to local and international audiences through camp meetings, community radio and social media.highlight 13 Jun 2014 (10 years ago) - UNHCR and partners will lead the refugee community in Dadaab to commemorate World Refugee Day on 20th June. The global theme for this year is- “One family torn apart by war is too many.” The community has agreed to commemorate this day by conveying to the world, messages of peace through a campaign dubbed “31 Days of Peace Messages” which kicked off on 20th Mayhighlight 13 Jun 2014 (10 years ago) - The refugee community in Dadaab will commemorate WRD 2014 by conveying to the world, messages of peace through a campaign dubbed “31 Days of Peace Messages"highlight 13 Jun 2014 (10 years ago) - 19 refugee representatives from Dadaab took part in a 'Go and See' visit to Kismayo, Somalia, from 4 to 8 August. They will now share their thoughts and impressions with the other camp residents.highlight 08 Aug 2014 (10 years ago) - The Somali Prime Minister, H.E. Abdiweli Sheikh Ahmed, visited Dadaab Refugee Camps. He toured a hospital and a school and met refugee representatives.highlight 22 Aug 2014 (10 years ago) - UN Chief Ban Ki-moon and World Bank President Kim Yong Kim visit Dadaabhighlight 29 Oct 2014 (10 years ago) - 214 patients were operated in the 'Eye Camp' in Dadaab's Hagadera Hospitalhighlight 26 Oct 2014 (10 years ago) - Dadaab Camps are preparing for 16 Days of Activism which will start on 25 Novemberhighlight 05 Nov 2014 (10 years ago)
<urn:uuid:c9146d24-e0ca-4453-a287-f909b7addc3e>
CC-MAIN-2024-51
https://data.unhcr.org/en/search?type=highlight&sv_id=0&geo_id=178&sort=createDate&direction=asc&page=4
2024-12-02T06:50:32Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.99469
default search action - 2023 - [c2]John D. Coley, Eloise Davenport, Sarah Bissonnette, Andrea Burton, Kimberly Tanner: Relations Between Anthropocentric Thinking and Biological Misconceptions in Students attending Urban and Rural Universities. CogSci 2023 - 2017 - [c1]John D. Coley, Nicole Betz, Jessica Leffers, Yian Xu, Michal Fux, Kristin de Nesnera, Kimberly Tanner: Relations Between Intuitive Biological Thought and Scientific Misconceptions. CogSci 2017 manage site settings To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q. Unpaywalled article links Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy. Archived links via Wayback Machine Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy. Reference lists Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar. Citation data Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar. OpenAlex data Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex. last updated on 2024-05-03 20:46 CEST by the dblp team
<urn:uuid:91789b5a-5163-42c3-a62f-0eb42a2987f6>
CC-MAIN-2024-51
https://dblp1.uni-trier.de/pid/212/4388.html?view=by-type
2024-12-02T07:09:32Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
zero
1.0
json-ld
true
false
null
null
null
{ "abbr": [ "zero", "zero", "zero", "zero" ], "in_footer": [ false, false, true, true ], "in_head": [ true, true, false, false ], "location": [ "json-ld", "json-ld", "a_tag", "a_tag" ], "version": [ "1.0", "1.0", "1.0", "1.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.996835
default search action manage site settings To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
<urn:uuid:e44b9d50-6f59-4b22-b693-bb7329661c8d>
CC-MAIN-2024-51
https://dblp1.uni-trier.de/rec/journals/ibmrd/PlambeckERW02.html
2024-12-02T06:45:00Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
zero
1.0
json-ld
true
false
null
null
null
{ "abbr": [ "zero", "zero", "zero", "zero" ], "in_footer": [ false, false, true, true ], "in_head": [ true, true, false, false ], "location": [ "json-ld", "json-ld", "a_tag", "a_tag" ], "version": [ "1.0", "1.0", "1.0", "1.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.99938
The following code samples, which use the Google APIs Client Library for Python, are available for the YouTube Reporting API and YouTube Analytics API. You can download these code samples from the python folder of the YouTube APIs code sample repository on GitHub. - Bulk reports (YouTube Reporting API) - Targeted query reports (YouTube Analytics API) Bulk reports Retrieve reports This code sample demonstrates how to retrieve reports created by a specific job. It calls the jobs.list method to retrieve reporting jobs. It then calls the reports.list method with the jobId parameter set to a specific job id to retrieve reports created by that job. Finally, the sample prints out the download URL for each report. #!/usr/bin/python ### # # This script retrieves YouTube Reporting API reports. Use cases: # 1. If you specify a report URL, the script downloads that report. # 2. Otherwise, if you specify a job ID, the script retrieves a list of # available reports for that job and prompts you to select a report. # Then it retrieves that report as in case 1. # 3. Otherwise, the list retrieves a list of jobs for the user or, # if specified, the content owner that the user is acting on behalf of. # Then it prompts the user to select a job, and then executes case 2 and # then case 1. # Usage examples: # python retrieve_reports.py --content_owner_id=<CONTENT_OWNER_ID> --local_file=<LOCAL_FILE> # python retrieve_reports.py --content_owner_id=<CONTENT_OWNER_ID> --job_id=<JOB_ID> --local_file=<LOCAL_FILE> # python retrieve_reports.py --content_owner_id=<CONTENT_OWNER_ID> --report_url=<REPORT_URL> --local_file=<LOCAL_FILE> # ### import argparse import os import google.oauth2.credentials import google_auth_oauthlib.flow from googleapiclient.discovery import build from googleapiclient.errors import HttpError from googleapiclient.http import MediaIoBaseDownload from google_auth_oauthlib.flow import InstalledAppFlow from io import FileIO # The CLIENT_SECRETS_FILE variable specifies the name of a file that contains # the OAuth 2.0 information for this application, including its client_id and # client_secret. You can acquire an OAuth 2.0 client ID and client secret from # the {{ Google Cloud Console }} at # {{ https://cloud.google.com/console }}. # Please ensure that you have enabled the YouTube Data API for your project. # For more information about using OAuth2 to access the YouTube Data API, see: # https://developers.google.com/youtube/v3/guides/authentication # For more information about the client_secrets.json file format, see: # https://developers.google.com/api-client-library/python/guide/aaa_client_secrets CLIENT_SECRETS_FILE = 'client_secret.json' # This OAuth 2.0 access scope allows for read access to YouTube Analytics # monetary reports for the authenticated user's account. Any request that # retrieves earnings or ad performance metrics must use this scope. SCOPES = ['https://www.googleapis.com/auth/yt-analytics-monetary.readonly'] API_SERVICE_NAME = 'youtubereporting' API_VERSION = 'v1' # Authorize the request and store authorization credentials. def get_authenticated_service(): flow = InstalledAppFlow.from_client_secrets_file(CLIENT_SECRETS_FILE, SCOPES) credentials = flow.run_console() return build(API_SERVICE_NAME, API_VERSION, credentials = credentials) # Remove keyword arguments that are not set. def remove_empty_kwargs(**kwargs): good_kwargs = {} if kwargs is not None: for key, value in kwargs.iteritems(): if value: good_kwargs[key] = value return good_kwargs # Call the YouTube Reporting API's jobs.list method to retrieve reporting jobs. def list_reporting_jobs(youtube_reporting, **kwargs): # Only include the onBehalfOfContentOwner keyword argument if the user # set a value for the --content_owner argument. kwargs = remove_empty_kwargs(**kwargs) # Retrieve the reporting jobs for the user (or content owner). results = youtube_reporting.jobs().list(**kwargs).execute() if 'jobs' in results and results['jobs']: jobs = results['jobs'] for job in jobs: print ('Reporting job id: %s\n name: %s\n for reporting type: %s\n' % (job['id'], job['name'], job['reportTypeId'])) else: print 'No jobs found' return False return True # Call the YouTube Reporting API's reports.list method to retrieve reports created by a job. def retrieve_reports(youtube_reporting, **kwargs): # Only include the onBehalfOfContentOwner keyword argument if the user # set a value for the --content_owner argument. kwargs = remove_empty_kwargs(**kwargs) # Retrieve available reports for the selected job. results = youtube_reporting.jobs().reports().list( **kwargs ).execute() if 'reports' in results and results['reports']: reports = results['reports'] for report in reports: print ('Report dates: %s to %s\n download URL: %s\n' % (report['startTime'], report['endTime'], report['downloadUrl'])) # Call the YouTube Reporting API's media.download method to download the report. def download_report(youtube_reporting, report_url, local_file): request = youtube_reporting.media().download( resourceName=' ' ) request.uri = report_url fh = FileIO(local_file, mode='wb') # Stream/download the report in a single request. downloader = MediaIoBaseDownload(fh, request, chunksize=-1) done = False while done is False: status, done = downloader.next_chunk() if status: print 'Download %d%%.' % int(status.progress() * 100) print 'Download Complete!' # Prompt the user to select a job and return the specified ID. def get_job_id_from_user(): job_id = raw_input('Please enter the job id for the report retrieval: ') print ('You chose "%s" as the job Id for the report retrieval.' % job_id) return job_id # Prompt the user to select a report URL and return the specified URL. def get_report_url_from_user(): report_url = raw_input('Please enter the report URL to download: ') print ('You chose "%s" to download.' % report_url) return report_url if __name__ == '__main__': parser = argparse.ArgumentParser() parser.add_argument('--content_owner', default='', help='ID of content owner for which you are retrieving jobs and reports') parser.add_argument('--job_id', default=None, help='ID of the job for which you are retrieving reports. If not ' + 'provided AND report_url is also not provided, then the script ' + 'calls jobs.list() to retrieve a list of jobs.') parser.add_argument('--report_url', default=None, help='URL of the report to retrieve. If not specified, the script ' + 'calls reports.list() to retrieve a list of reports for the ' + 'selected job.') parser.add_argument('--local_file', default='yt_report.txt', help='The name of the local file where the downloaded report will be written.') args = parser.parse_args() youtube_reporting = get_authenticated_service() try: # If the user has not specified a job ID or report URL, retrieve a list # of available jobs and prompt the user to select one. if not args.job_id and not args.report_url: if list_reporting_jobs(youtube_reporting, onBehalfOfContentOwner=args.content_owner): args.job_id = get_job_id_from_user() # If the user has not specified a report URL, retrieve a list of reports # available for the specified job and prompt the user to select one. if args.job_id and not args.report_url: retrieve_reports(youtube_reporting, jobId=args.job_id, onBehalfOfContentOwner=args.content_owner) args.report_url = get_report_url_from_user() # Download the selected report. if args.report_url: download_report(youtube_reporting, args.report_url, args.local_file) except HttpError, e: print 'An HTTP error %d occurred:\n%s' % (e.resp.status, e.content) Create a reporting job This code sample demonstrates how to create a reporting job. It calls the reportTypes.list method to retrieve a list of available report types. It then calls the jobs.create method to create a new reporting job. #!/usr/bin/python # Create a reporting job for the authenticated user's channel or # for a content owner that the user's account is linked to. # Usage example: # python create_reporting_job.py --name='<name>' # python create_reporting_job.py --content-owner='<CONTENT OWNER ID>' # python create_reporting_job.py --content-owner='<CONTENT_OWNER_ID>' --report-type='<REPORT_TYPE_ID>' --name='<REPORT_NAME>' import argparse import os import google.oauth2.credentials import google_auth_oauthlib.flow from googleapiclient.discovery import build from googleapiclient.errors import HttpError from google_auth_oauthlib.flow import InstalledAppFlow # The CLIENT_SECRETS_FILE variable specifies the name of a file that contains # the OAuth 2.0 information for this application, including its client_id and # client_secret. You can acquire an OAuth 2.0 client ID and client secret from # the {{ Google Cloud Console }} at # {{ https://cloud.google.com/console }}. # Please ensure that you have enabled the YouTube Data API for your project. # For more information about using OAuth2 to access the YouTube Data API, see: # https://developers.google.com/youtube/v3/guides/authentication # For more information about the client_secrets.json file format, see: # https://developers.google.com/api-client-library/python/guide/aaa_client_secrets CLIENT_SECRETS_FILE = 'client_secret.json' # This OAuth 2.0 access scope allows for read access to the YouTube Analytics monetary reports for # authenticated user's account. Any request that retrieves earnings or ad performance metrics must # use this scope. SCOPES = ['https://www.googleapis.com/auth/yt-analytics-monetary.readonly'] API_SERVICE_NAME = 'youtubereporting' API_VERSION = 'v1' # Authorize the request and store authorization credentials. def get_authenticated_service(): flow = InstalledAppFlow.from_client_secrets_file(CLIENT_SECRETS_FILE, SCOPES) credentials = flow.run_console() return build(API_SERVICE_NAME, API_VERSION, credentials = credentials) # Remove keyword arguments that are not set. def remove_empty_kwargs(**kwargs): good_kwargs = {} if kwargs is not None: for key, value in kwargs.iteritems(): if value: good_kwargs[key] = value return good_kwargs # Call the YouTube Reporting API's reportTypes.list method to retrieve report types. def list_report_types(youtube_reporting, **kwargs): # Provide keyword arguments that have values as request parameters. kwargs = remove_empty_kwargs(**kwargs) results = youtube_reporting.reportTypes().list(**kwargs).execute() reportTypes = results['reportTypes'] if 'reportTypes' in results and results['reportTypes']: reportTypes = results['reportTypes'] for reportType in reportTypes: print 'Report type id: %s\n name: %s\n' % (reportType['id'], reportType['name']) else: print 'No report types found' return False return True # Call the YouTube Reporting API's jobs.create method to create a job. def create_reporting_job(youtube_reporting, report_type_id, **kwargs): # Provide keyword arguments that have values as request parameters. kwargs = remove_empty_kwargs(**kwargs) reporting_job = youtube_reporting.jobs().create( body=dict( reportTypeId=args.report_type, name=args.name ), **kwargs ).execute() print ('Reporting job "%s" created for reporting type "%s" at "%s"' % (reporting_job['name'], reporting_job['reportTypeId'], reporting_job['createTime'])) # Prompt the user to enter a report type id for the job. Then return the id. def get_report_type_id_from_user(): report_type_id = raw_input('Please enter the reportTypeId for the job: ') print ('You chose "%s" as the report type Id for the job.' % report_type_id) return report_type_id # Prompt the user to set a job name def prompt_user_to_set_job_name(): job_name = raw_input('Please set a name for the job: ') print ('Great! "%s" is a memorable name for this job.' % job_name) return job_name if __name__ == '__main__': parser = argparse.ArgumentParser() # The 'name' option specifies the name that will be used for the reporting job. parser.add_argument('--content-owner', default='', help='ID of content owner for which you are retrieving jobs and reports.') parser.add_argument('--include-system-managed', default=False, help='Whether the API response should include system-managed reports') parser.add_argument('--name', default='', help='Name for the reporting job. The script prompts you to set a name ' + 'for the job if you do not provide one using this argument.') parser.add_argument('--report-type', default=None, help='The type of report for which you are creating a job.') args = parser.parse_args() youtube_reporting = get_authenticated_service() try: # Prompt user to select report type if they didn't set one on command line. if not args.report_type: if list_report_types(youtube_reporting, onBehalfOfContentOwner=args.content_owner, includeSystemManaged=args.include_system_managed): args.report_type = get_report_type_id_from_user() # Prompt user to set job name if not set on command line. if not args.name: args.name = prompt_user_to_set_job_name() # Create the job. if args.report_type: create_reporting_job(youtube_reporting, args, onBehalfOfContentOwner=args.content_owner) except HttpError, e: print 'An HTTP error %d occurred:\n%s' % (e.resp.status, e.content) Targeted query reports Retrieve daily channel statistics This example calls the YouTube Analytics API to retrieve daily views and other metrics for the authorizing user's channel for the 2017 calendar year. The sample uses the Google APIs Python client library. The code requests the user's permission to access the https://www.googleapis.com/auth/yt-analytics.readonly scope. SCOPES = ['https://www.googleapis.com/auth/yt-analytics.readonly'] Your application might also need to request access to other scopes. For example, an application that calls the YouTube Analytics API and the YouTube Data API might need users to also grant access to their YouTube accounts. The authorization overview identifies scopes typically used in applications that call the YouTube Analytics API. Set up authorization credentials Before running this sample locally for the first time, you need to set up authorization credentials for your project: - Create or select a project in the Google API Console. - Enable the YouTube Analytics API for your project. - At the top of the Credentials page, select the OAuth consent screen tab. Select an Email address, enter a Product name if not already set, and click the Save button. - On the Credentials page, click the Create credentials button and select Oauth client ID. - Select the application type Other, enter the name "YouTube Analytics API Quickstart", and click the Create button. - Click OK to dismiss the resulting dialog. - Click the (Download JSON) button to the right of the client ID. - Move the downloaded file to your working directory. Install required libraries You also need to install the Google APIs Client Library for Python and some additional libraries: pip install --upgrade google-api-python-client pip install --upgrade google-auth google-auth-oauthlib google-auth-httplib2 Run the code Now, you are ready to actually test the sample: - Copy the code sample below to your working directory. - In the sample, update the value of the CLIENT_SECRETS_FILE variable to match the location of the file that you downloaded after setting up your authorization credentials. - Run the sample code in a terminal window: python yt_analytics_v2.py - Go through the authorization flow. The auth flow might automatically load in your browser, or you might need to copy the auth URL into a browser window. At the end of the authorization flow, if necessary, paste the authorization code displayed in the browser into your terminal window and click [return]. - The API query executes and the JSON response is output to the terminal window. Sample code # -*- coding: utf-8 -*- import os import google.oauth2.credentials import google_auth_oauthlib.flow from googleapiclient.discovery import build from googleapiclient.errors import HttpError from google_auth_oauthlib.flow import InstalledAppFlow SCOPES = ['https://www.googleapis.com/auth/yt-analytics.readonly'] API_SERVICE_NAME = 'youtubeAnalytics' API_VERSION = 'v2' CLIENT_SECRETS_FILE = 'YOUR_CLIENT_SECRET_FILE.json' def get_service(): flow = InstalledAppFlow.from_client_secrets_file(CLIENT_SECRETS_FILE, SCOPES) credentials = flow.run_console() return build(API_SERVICE_NAME, API_VERSION, credentials = credentials) def execute_api_request(client_library_function, **kwargs): response = client_library_function( **kwargs ).execute() print(response) if __name__ == '__main__': # Disable OAuthlib's HTTPs verification when running locally. # *DO NOT* leave this option enabled when running in production. os.environ['OAUTHLIB_INSECURE_TRANSPORT'] = '1' youtubeAnalytics = get_service() execute_api_request( youtubeAnalytics.reports().query, ids='channel==MINE', startDate='2017-01-01', endDate='2017-12-31', metrics='estimatedMinutesWatched,views,likes,subscribersGained' dimensions='day', sort='day' )
<urn:uuid:430568a4-9d15-488d-b318-60c27f53b937>
CC-MAIN-2024-51
https://developers-dot-devsite-v2-prod.appspot.com/youtube/reporting/v1/code_samples/python
2024-12-02T08:39:57Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.954902
Aggrephagy is a comparatively poorly understood cell maintenance mechanism that targets aggregated proteins, distinct from the ubiquitin-proteasome system that disposes of misfolded or otherwise problematic proteins. Alterations to protein structure break the proper function of the protein, and damaged machinery causes problems to a cell. Protein aggregation is a feature of neurodegenerative conditions, and scientists are in search of ways to encourage cells to more rapidly and efficiently remove these aggregates before they accumulate to pathological levels. The ubiquitin-proteasome system (UPS) and autophagy are the two primary cellular pathways of misfolded or damaged protein degradation that maintain cellular proteostasis. When the proteasome is dysfunctional, cells compensate for impaired protein clearance by activating aggrephagy, a type of selective autophagy, to eliminate ubiquitinated protein aggregates; however, the molecular mechanisms by which impaired proteasome function activates aggrephagy remain poorly understood. Here, we demonstrate that activation of aggrephagy is transcriptionally induced by the transcription factor NRF1 in response to proteasome dysfunction. Although NRF1 has been previously shown to induce the expression of proteasome genes after proteasome inhibition (i.e., the proteasome bounce-back response), our genome-wide transcriptome analyses identified autophagy-related p62 and GABARAPL1 as genes directly targeted by NRF1. Intriguingly, NRF1 was also found to be indispensable for the formation of p62-positive puncta and their colocalization with ULK1 and TBK1, which play roles in p62 activation via phosphorylation. Consistently, NRF1 knockdown substantially reduced the phosphorylation rate of p62. Finally, NRF1 selectively upregulated the expression of GABARAPL1, an ATG8 family gene, to induce the clearance of ubiquitinated proteins. Our findings highlight the discovery of an activation mechanism underlying NRF1-mediated aggrephagy through gene regulation when proteasome activity is impaired.
<urn:uuid:7694ad57-e0a5-4b90-b994-1557b6cd4ebf>
CC-MAIN-2024-51
https://www.fightaging.org/archives/2023/10/in-search-of-target-mechanisms-to-enhance-aggrephagy/?nc
2024-12-02T08:52:11Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.992176
- 1First Institute of Oceanography, Ministry of Natural Resources and Laboratory for Regional Oceanography and Numerical Modeling, Laoshan Laboratory, Qingdao, China - 2Shanghai Typhoon Institute, China Meteorological Administration, Shanghai, China - 3Shandong Key Laboratory of Marine Science and Numerical Modeling, Qingdao, China The Indian Ocean Dipole (IOD) is one of the dominant interannual variabilities in the Indian Ocean (IO), and an extreme IOD, in particular, has dramatic effects on the weather, agriculture, and ecosystem around it. Therefore, the formation of an extreme IOD has been a worldwide research focus. Among 13 positive IOD (PIOD) events, two type-east and two type-comparable PIODs developed into extreme events during the 1960–2020 period. This investigation focuses on the cause of the formation of the type-east extreme PIOD, as previous studies have discussed the origin of the type-comparable extreme PIOD. Composite analysis showed that, as an entity, the strong East Asian and Australian monsoon (EAAM) may result in an evident easterly wind anomaly around the Indonesian region of the Marine Continent during May to August of the years when type-east PIODs occurred. The easterly wind anomaly associated with the EAAM was stronger in the extreme IOD group, whereas it was relatively weak in the regular group. The difference in the easterly wind anomaly between the extreme and regular groups could result in a vertical motion anomaly by enhancing the anomalous westward current. The stronger vertical motion created an upwelling in the deep-layer cold water, resulting in a more distinct difference in the vertical temperature gradient. All these conditions promoted the transformation of the type-east PIODs that occurred in 1961 and 1994 into extreme events and are indicative of the importance of vertical advection terms in the formation of type-east extreme PIODs. This study reveals the cause of the formation of type-east extreme PIODs, which will be helpful in understanding IOD diversity. 1 Introduction The tropical Indian Ocean (TIO) has its own unique climate system because the equatorial Indian Ocean (IO) lacks a stable easterly wind and the thermocline is relatively flat along the equator (Schott et al., 2009; Cai et al., 2013). Therein, a remarkable sea surface temperature (SST) dipole mode, known as the Indian Ocean Dipole (IOD), occurs interannually in the TIO and has attracted much attention due to its prominent climate impacts along the TIO rim and on other remote regions (Saji et al., 1999; Webster et al., 1999; Ashok et al., 2003; Saji and Yamagata, 2003; Qiu et al., 2014; Li et al., 2016). The IOD has positive and negative phases. Positive IOD (PIOD) events are defined as above-normal SST anomalies (SSTAs) in the western TIO and below-normal SSTAs in the eastern TIO. Negative IOD (NIOD) events are the opposite of PIOD events (Saji et al., 1999). Moreover, the amplitude of the PIOD is generally larger than that of the NIOD (Hong et al., 2008a; Hong et al., 2008b), which might be the reason for the PIOD having led to more serious disasters. IOD events can be classified into many types according to their triggering mechanism, evolution, or SSTA pattern. For example, the classification of IODs either coincides with or is independent of the El Niño–Southern oscillation (ENSO) (Allan et al., 2001; Ashok et al., 2003; Fischer et al., 2005; Drbohlav et al., 2007; Hong et al., 2008b; Guo et al., 2015; Yang et al., 2015), but IODs could also be classified into spring- and autumn-type events based on their mature phase (Sun et al., 2014). In all classification criteria, the classification of IOD according to the SSTA pattern is of particular interest because an IOD with a different SSTA pattern has different effects on the climate over the IO and surrounding countries and even on remote regions (Birkett et al., 1999; Latif et al., 1999; Webster et al., 1999; Saji and Yamagata, 2003; Han et al., 2006; Cai et al., 2013; Nur’utami and Hidayat, 2016; Lestari et al., 2018). Previous studies have defined type-west IODs as those in which the SSTA amplitude in the western TIO exceeds twice that in the southeastern TIO, type-east IODs are those in which the SSTA amplitude in the southeastern TIO exceeds twice that in the western TIO, and type-comparable IODs have comparable SSTA amplitudes at both poles (Sun et al., 2014; Cai et al., 2020; Jiang et al., 2022). Following the definition of the IOD and the classification criteria, we identified 13 PIOD and nine NIOD events during the past ~61 years from 1960 to 2020. Of the 13 PIODs, those in 1972, 1987, 2012, and 2015 were classified as type-west PIODs; the events in 1961,1967, 1994, and 2006 were classified as type-east PIODs; and those in 1963, 1982, 1997, 2002, and 2019 were classified as type-comparable PIODs. Compared with regular IOD events, extreme IOD events have always led to much more severe natural disasters (Xiao et al., 2020), such as floods, droughts, and wildfires, over the IO and its surrounding regions. For example, in 2019, an extreme PIOD caused a catastrophic drought in northern Australia. Such climatic conditions tend to trigger forest fires and are also unfavorable for the development of rain, which helps control fires. The Australian forest fires lasted from September to December and resulted in the severe loss of wildlife resources. During the past 61 years, from 1960 to 2020, four extreme PIOD events occurred in 1961, 1994, 1997, and 2019. Of these, the events in 1961 and 1994 were classified as type-east PIODs, while those in 1997 and 2019 were considered to be type-comparable PIODs. In comparison to that of regular type-comparable PIODs, the formation of extreme type-comparable PIODs is attributed to stronger Bjerknes feedback and/or wind–evaporation–SST (WES) feedback, which are positive feedbacks that promote the development of PIODs. There are still marginal differences in the development process of the extreme type-comparable PIODs between 1997 and 2019, although the type-comparable PIODs showed similar formation mechanisms. The formation of the extreme PIOD in 1997 was mainly attributed to a very powerful Bjerknes feedback, which was thought to be associated with the super El Niño that occurred in the same year (Saji et al., 1999; Webster et al., 1999). The other extreme PIOD with type-comparable characteristics occurred in 2019, mainly due to two positive feedback processes: one was the Bjerknes feedback, which was caused by the residual consequence of the weak 2018 Pacific warm conditions (Du et al., 2020), and the other process was a WES feedback, which was triggered by the strengthening Australian high and the weakening sea level pressure over the South China Sea/Philippine Sea (Lu and Ren, 2020). Although previous studies have investigated the formation mechanism of extreme PIODs with type-comparable characteristics, the mechanism of extreme PIODs with type-east characteristics remains poorly understood. Research on this issue will enhance our understanding of the formation of extreme IODs and will help improve forecasts of possible disastrous events associated with the IOD. Therefore, the present study aimed to investigate the causes and conditions of the formation of type-east extreme PIODs. In Section 2, the data and method used in this study are described. Section 3 presents the analysis and results. Finally, the summary and discussion are given in Section 4. 2 Data and methods For this study, we used the following data: 1) monthly SST data from the Extended Reconstructed SST product of the National Oceanic and Atmospheric Administration (NOAA), which has a 2° × 2° horizontal resolution; 2) monthly wind field data with 2.5° × 2.5° horizontal resolution, which were obtained from the National Centers for Environmental Prediction (NCEP) and the National Center for Atmospheric Research (NCAR) reanalysis dataset (Kalnay, 1996) ; 3) multilevel oceanic 3D temperature and velocity data from the Simple Ocean Data Assimilation (SODA version 2.2.4) reanalysis dataset; and 4) surface heat flux data (Kumar and Hu, 2012) from the ensemble mean of the NCEP–NCAR reanalysis data. The dipole mode index (DMI), which measures the strength of the IOD, was defined as the difference between the area-averaged SSTAs at the west pole (10° S–10° N, 50°–70° E) and the east pole (10° S–0°, 90°–110° E) (Saji et al., 1999). A DMI value exceeding one standard deviation above normal during the September to November period was regarded as a classic IOD event. As shown in the time series of the DMI (Figure 1), there were 13 PIOD events, with four type-east PIOD events (1961, 1967, 1994, and 2006), five type-comparable PIOD events (1963, 1982, 1997, 2002, and 2019), and four type-west PIOD events (1972, 1987, 2012, and 2015). Notably, four PIOD events (i.e., 1961, 1994, 1997, and 2019) whose amplitudes exceeded twice the standard deviation of the DMI were classified into the extreme PIOD group. The PIODs in 1961 and 1994 showed type-east features, such as the dipole pattern being mainly due to the SSTA at the east pole. Figure 1 Time series of the normalized dipole mode index (DMI) derived from the National Oceanic and Atmospheric Administration (NOAA) Extended Reconstructed SST V5 for the 1960–2020 period. The black and dotted lines indicate one and two times the standard deviation, respectively. To investigate the specific dynamic and thermodynamic air–sea processes causing the difference between the extreme and regular groups of type-east PIODs, a mixed-layer budget was used to analyze the temperature tendency. The mixed-layer temperature tendency equation (Li et al., 2002; Wang et al., 2012) is given below: where u, v, and ω represent the three dimensions of the oceanic current; T is the mixed-layer temperature; ( )' denotes the anomaly of variables; represents the climatological mean variables; Qnet is the summation of the downward shortwave radiation absorbed in the mixed layer (Qsw), net downward surface longwave radiation, and surface latent and sensible heat fluxes; R is the residual term; ρ is the seawater density; cp is the specific heat of seawater; and H is the mixed-layer depth. Here, H was defined as the depth at which the ocean temperature was 0.8°C lower than the surface temperature (Wang et al., 2012; Chen et al., 2016). All the budget terms in Eq. 1 were integrated from the surface to the mixed-layer depth. Considering the shortwave penetration below the mixed layer, the Qsw absorbed in the mixed layer is given as follows (Wang 2012): where Qsurf is the net downward surface shortwave radiation. 3 Results To investigate the cause of the type-east extreme PIOD formation, we first identified the extreme and regular PIOD events by analyzing the DMI. The normalized DMI results showed 13 classic PIOD events that occurred in 1961, 1963, 1967, 1972, 1982, 1987, 1994, 1997, 2002, 2006, 2012, 2015, and 2019 (Figure 1). Of these 13 PIODs, four events that occurred in 1961, 1994, 1997, and 2019 were apparently stronger than the remaining events and were classified as the extreme group. The DMI, which was determined using the SSTAs at the west and east poles, was the main judgment basis for the IOD. According to the dominance of the SSTAs at the different poles of the IOD, the PIOD could be classified into three types: type-east, type-comparable, and type-west. For this reason, there were some differences in the formation mechanism of the different types of PIODs. Of the four extreme PIODs, the extreme events in 1961 and 1994 were type-east PIODs, while the remaining extreme events in 1997 and 2019 were classified as type-comparable PIODs. In addition, it appeared that no type-west PIOD cases developed into extreme events during the past 60 years. Previous studies have discussed the reasons for the 1997 and 2019 type-comparable PIODs having been able to develop into extreme events. Considering the lack of understanding on the causes of the formation of extreme events in type-east PIODs, we conducted the following detailed research. The composite analysis showed the evolutions of the SSTAs for the extreme and regular groups at the east and west poles (Figure 2). The SSTA at the east pole was lower in the extreme group than that in the regular group from May to September (Figure 2A), and the difference was above the 90% significance level; however, the composites of the west pole SSTAs showed little difference between the extreme and regular groups (Figure 2B). In addition, the SSTAs were not obviously different between the extreme and regular groups in the years (−) and (+) because the significance level was less than 90% (Figure 2). These results illustrate that the SSTA at the east pole primarily determined whether or not the type-east PIOD could develop into extreme or regular events. Furthermore, the type-east PIOD generally occurred in the summer, matured in the autumn, and ended in the winter. Its lifetime was concentrated within 1 year, and the SSTA signal associated with the IOD appeared to have little continuity in the year just before and the year right after the PIOD event in the IO (Figure 2). Figure 2 Temporal evolution of the composite sea surface temperature anomalies (SSTAs; in degree Celsius) at the east pole (A) and west pole (B). The red and green lines indicate the results derived from the extreme and regular Indian Ocean Dipole (IOD) groups, respectively. Here, minus and plus signs denote 1 year before and 1 year after the positive IOD (PIOD) year, respectively. The composites of the east pole SSTAs in the extreme and regular groups were very similar in April of the type-east PIOD year; subsequently, the SSTA in the extreme group deceased at a faster rate than that in the regular group, and the SSTA difference between the two groups reached its peak in September (Figure 2). Therefore, we regarded the May to August period as the tendency analysis key period, as the obvious SSTA difference between the extreme and regular groups occurred from April to May and the amplitude of the difference reached its maximum in September, which also indicated that the tendency is around zero at this time. The evolutions of the SSTA tendency in the two groups showed that the gradually enlarging SSTA difference could be attributed to the cumulative effect of the SSTA tendency during the May to August period (Figure 3). Thus, a key issue that should be addressed is the cause of the SSTA tendency difference during this period. Figure 3 Temporal evolution of the composite east-pole sea surface temperature anomaly (SSTA) tendency (in degree Celsius per month) for the extreme Indian Ocean Dipole (IOD) group (red) and the regular IOD group (green). Here, Eq. 1 was utilized to evaluate the difference in the tendency of the mixed-layer temperature anomaly (MLTA) between the extreme and regular groups during the May to August period. Figure 4 shows the implementation of the heat budget on the differences in the MLTAs between the two groups. Among the diagnostic terms, the estimated MLTA difference tendency (term 11), which is the sum of the components of the tendency equation (terms 1–10), approximated the actual MLTA difference tendency (term 12). This finding implies that the mixed-layer heat budget was approximately balanced. Note that the most important component that mainly contributed to the tendency of MLTA difference between the two groups was vertical advection (Figure 4), denoting the well-known thermocline feedback. Figure 4 Composite mixed-layer heat budget terms (in degree Celsius per second) for the difference between the extreme and regular groups during the May to August period in the positive Indian Ocean Dipole (PIOD) year. Terms 1–10 denote , , −u'∂T′/∂x , , , −v'∂T′/∂y , , , −ω'∂T′/∂z , and , respectively. Term 11 is the sum of the first 10 terms, while term 12 is the mixed-layer temperature tendency, ∂T'/∂t . Vertical advection includes the vertical gradient of the mean temperature by the upwelling difference (extreme group minus regular group) (term 7), the mean upwelling by the vertical gradient of the temperature difference (term 8), and the upwelling difference by the vertical gradient of the temperature difference (term 9). During the onset phase (May to June), the heat budget results showed that terms 7, 8, and 9 all promoted the MLTA difference between the two groups. Therein, terms 7 and 8 were approximately −6.26 × 10−8°C s−1 and −3.01 × 10−11°C s−1, respectively. The absolute value of term 7 was much greater than that of term 8, making the largest contribution to the tendency. The vertical motion difference played the most important role in causing the mixed-layer temperature difference between the two groups in this period. However, term 1 () provided the largest positive contribution (−1.22 × 10−8°C s−1) to the SSTA tendency (−3.85 × 10−8°C s−1) between the two groups in May. Therefore, the differences in the vertical motion and vertical temperature gradient could be attributed to the anomalous westward current between the two groups (Figures 5A, B). The westward current difference occurred in May and gradually strengthened the vertical motion in the following months, which could more efficiently carry the deep-layer cold water to the upper layer, which then led to a colder MLTA in the east pole of the IOD (Figure 5B). Subsequently, the westward current difference could have been maintained by the east–west SST difference, and it continued to strengthen the vertical motion upwelling the deep-layer cold water. With the accumulation effect from the upwelling associated with the vertical motion difference, the vertical gradient of the sea temperature difference gradually became more crucial to the difference in the MLTA. Eventually, the difference in the vertical temperature gradient made the largest contribution on the SSTA tendency difference between the two groups (Figure 5C). The vertical advection provided the most important contribution to the tendency difference between extreme and regular groups during the whole development phase of the IOD (from May to August). Moreover, the contributions of terms 8, 9 and 7 of the vertical advection are large, media and small in order (Figure 4). Thus, the westward current difference between the two groups played a key role in the entire development phase. Figure 5 Composite longitudinal depth section of the oceanic temperature (shading; in degree Celsius) and current (vector; zonal velocity in meters per second and vertical velocity in millimeters per second) difference between the extreme and regular positive Indian Ocean Dipole (PIOD) groups averaged over 10° S–0° in May (A) and the periods from May to June (B) and May to August (C). To understand the cause of the westward current difference between the extreme and regular groups, we investigated the differences between the atmospheric circulation and mixed-layer current. The westward current difference at the east pole appeared to be attributed to the easterly wind difference based on an analysis of the differences among the atmospheric circulation, upper oceanic current, and the MLTAs between the extreme and regular groups during the May to August period (Figure 6). The next question to be discussed is what caused the easterly wind difference. Figure 6 Composite of the difference in the mixed-layer temperature (shading; in degree Celsius), current (vector; in meters per second), and the 850-hPa wind (streamline) between the extreme and regular groups during the development phase (from May to August) of the Indian Ocean Dipole (IOD). We analyzed the differences in the SST, atmospheric circulation, and oceanic mixed-layer current between the extreme and regular groups during the onset phase, which probably gave rise to the differences in the subsequent evolution, in order to determine the reasons for the PIOD intensity difference between the two groups. There was a negative SSTA at the east pole, and the SSTA at the east pole was colder in the extreme group than in the regular group (Figure 7). Moreover, the anomalous mixed-layer currents were located westward at the east pole in the two groups and were consistent with the easterly wind anomaly in the region (Figure 7). This finding further indicates that the easterly wind anomaly played an important role in the formation of the type-east PIOD, and it confirmed that the difference in the wind anomalies between the two groups was the dominant reason for the different IOD intensities. Figure 7 Composite of the anomalies of the sea surface temperature (SST) (shading, in degree Celsius), current (vector, in meters per second), and the 850-hPa wind (streamline) in the extreme (A) and regular (B) groups during the onset phase (from May to June). The Asian–Australian monsoon, which occurred over the 40°–160° E, 30° S–30° N region, had profound impacts on the IOD (Webster et al., 1999; Li et al., 2002). The East Asian and Australian monsoons (EAAMs), which are key components of the Asian–Australian monsoon system, could be strong as an entity during some boreal summers, and under this condition, the EAAMs could jointly produce an easterly wind anomaly near the Marine Continent (MC) of Indonesia (Xu and Guan, 2017a; Xu and Guan, 2017b; Chen and Guan, 2017). The joint monsoon index of the EAAMs (Chen et al., 2017; Chen et al., 2020) was larger in the extreme group than in the regular group, which suggests that the EAAMs, particularly for the Australian winter monsoon, were likely to be stronger in the extreme group than in the regular group. The difference in the easterly wind anomaly in the region of the MC and the eastern TIO may be attributed to the EAAM difference between the two groups. The composite analyses on precipitation and wind indicated that the negative precipitation anomaly occupied the Australian and east pole areas of the IOD and induced an anticyclonic wind anomaly at the 850-hPa level, which showed an anomalous easterly wind at the east pole in the May to June period of the extreme group (Figure 8A). In the same period of the regular group, the negative precipitation anomaly occurred on Java Island and its surrounding areas. Although the precipitation anomaly likewise induced an easterly wind anomaly at the east pole (Figure 8B), the easterly wind anomaly was relatively weak in comparison to the easterly wind anomaly for the extreme group (Figure 8C). From May to August, the precipitation anomaly, wind anomaly, and the difference between the extreme and regular groups were more obvious (Figure 9). The results further confirmed that the stronger Australian high due to the EAAM intensity difference made the easterly wind anomaly stronger in the extreme group than in the regular group. The westward current difference that was forced by the easterly wind difference eventually propelled the formation of extreme PIOD. Figure 8 Composite of the precipitation anomaly (shading, in millimeters per day) and the 850-hPa wind anomaly (vector, in meters per second) for the extreme (A) and regular (B) groups and the difference between the two groups (C) during the May to June period. Figure 9 The same as Figure 8, but for the May to August period. 4 Summary and discussion The IOD is the most notable interannual signal in the TIO and includes positive and negative events, similar to ENSO. The PIODs could be classified into type-east, type-comparable, and type-west according to their spatial pattern and dynamics. Four super PIOD events occurred during the 1960–2020 period, including those in 1961, 1994, 1997, and 2019. Among the four extreme cases, the events that occurred in 1961 and 1994 were type-east PIOD events, while those that occurred in 1997 and 2019 were type-comparable PIOD events. The aim of this study was to investigate the reasons for the type-east PIODs in 1961 and 1994 possibly developing into super events. A composite analysis of the SSTAs verified that it was mainly due to the SSTA difference at the east pole that the type-east PIOD was remarkably stronger in the extreme group than in the regular group. The mixed-layer heat budget showed that the tendency of the SSTA difference between the extreme and regular groups was primarily dependent on the vertical advection terms during the May to August period. Further analysis illustrated that the vertical temperature gradient difference played the most important role in the difference in the type-east PIOD intensities between the extreme and regular groups. The difference in the vertical temperature gradient between the two groups, which was closely associated with the vertical motion difference, became the most important factor modulating the tendency because the vertical motion could cool the MLTA by upwelling the cold water from the deep layer. The vertical motion difference could be mainly induced by the western current difference, which was forced by the easterly wind difference between the extreme and regular groups in the east TIO. The composite results showed that the difference in the easterly wind anomaly may be attributed to the difference in the EAAM intensity during boreal summer. The East Asian summer monsoon and the winter Australian monsoon, as an entity, were stronger in the extreme group than in the regular group. While the EAAMs were anomalously strong during boreal summer, they intensified the Australian high and northwestern subtropical anticyclone, i.e., the anticyclone anomaly wind field in the northwestern subtropical Pacific and Australia, which facilitated the easterly wind anomaly near the equator region covering the east pole area. The easterly wind difference associated with the EAAMs ultimately produced the extreme type-east PIOD events in 1961 and 1994 and the regular events in 1967 and 2006. Very complex relationships exist between the East Asian summer monsoon and the Australian winter monsoon because they may be affected by ENSO and even some atmospheric processes in middle- and high-latitude regions. Except for the complementary relationship between the East Asian summer monsoon and the Australian winter monsoon, as an entity, they also had simultaneously homodromous variations. However, the environmental factors and processes modulating the EAAMs are still unknown and need to be further researched to improve the forecasting of extreme PIOD events. Data availability statement The data that support the findings of this study are publicly available and can be derived from the following sources: TC best-track dataset (https://www.ncdc.noaa.gov/ibtracs/index.php?name=ib-v4-access), and NCEP/NCAR and NOAA reanalysis data (https://psl.noaa.gov/data/gridded/reanalysis/). Author contributions ZX and YZ gathered and analyzed data, ZL and YF proposed the scientific question, discussed the results and co-wrote the manuscript. All authors edited the manuscript. Funding This study was financially supported by the Laoshan Laboratory (nos. LSKJ202202700 and LSKJ202202704), the Shanghai Typhoon Institute (no. TFJJ202206) and WESTPAC/IOC. Acknowledgments The authors thank JTWC, NCEP/NCAR, and NOAA for the use of the datasets employed herein. Conflict of interest The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. Publisher’s note All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher. References Allan R. J., Chambers D., Drosdowsky W., Hendon H., Latif M., Nicholls N., et al. (2001). Is there an Indian ocean dipole and is it independent of the El niño–southern oscillation? CLIVAR Exchanges 6, 18–22. Cai W., Yang K., Wu L. X., Huang G., Santoso A., Benjamin N., et al. (2020). Opposite response of strong and moderate positive Indian ocean dipole to global warming. Nat. Clim. Change 11, 27–32. doi: 10.1038/s41558-020-00943-1 Cai W., Zheng X. T., Weller E., Collins M., Cowan T., Lengaigne M., et al. (2013). Projected response of the Indian ocean dipole to greenhouse warming. Nat. Geosci. 6 (12), 999–1007. doi: 10.1038/ngeo2009 Chen W., Guan Z. Y., Yang H. D. (2020). Complementary relationship between East Asian summer monsoon and Australian winter monsoon and the related circulation anomalies. Trans. Atmos. Sci. 43 (5), 834–844. doi: 10.13878/j.cnki.dqkxxb.20200616001 Fischer A. S., Terray P., Guilyardi E., Gualdi S., Delecluse P. (2005). Two independent triggers for the Indian ocean dipole/zonal mode in a coupled GCM. J. Clim. 18, 3428–3449. doi: 10.1175/JCLI3478.1 Han W., Shinoda T., Fu L. L., Mccreary J. P. (2006). Impact of atmospheric intraseasonal oscillations on the indian ocean dipole during the 1990s. J. Phys. Oceanogr. 36 (4), 670–690. doi: 10.1175/JPO2892.1 Jiang J. L., Liu Y. M., Mao J. Y., Li J. P., Zhao S. W., Yu Y. Q. (2022). Three types of positive Indian ocean dipoles and their relationships with the south Asian summer monsoon. J. Clim. 35, 405–424. doi: 10.1175/JCLI-D-21-0089.1 Latif M., Dommenget D., Dima M., Grotzner A. (1999). The role of Indian ocean sea surface temperature in forcing east African rainfall anomalies during December–January 1997/98. J. Clim. 12, 3497–3504. doi: 10.1175/1520-0442(1999)012<3497:TROIOS>2.0.CO;2 Lestari D. O., Sutriyono E., Sabaruddin I. (2018). Severe drought event in Indonesia following 2015/16 El niño/ positive Indian dipole events. J. Phys. Conf. Ser. 1011 012040. doi: 10.1088/1742-6596/1011/1/012040 Li Z., Li T., Yu W., Li K., Liu Y. (2016). What controls the interannual variation of tropical cyclone genesis frequency over bay of Bengal in the post-monsoon peak season? Atmos. Sci. Lett. 17, 148–154. doi: 10.1002/asl.636 Li T., Zhang Y. S., Lu E., Wang D. L. (2002). Relative role of dynamic and thermodynamic processes in the development of the Indian ocean dipole: An OGCM diagnosis. Geophys. Res. Lett. 29 (23), 2110. doi: 10.1029/2002GL05789 Nur’utami M. N., Hidayat R. (2016). Influences of IOD and ENSO to Indonesian rainfall variability: Role of atmosphere ocean interaction in the indo-pacific sector. Procedia. Environ. Sci. 33, 196–203. doi: 10.1016/j.proenv.2016.03.070 Sun S. W., Fang Y., Tana, Liu B. C. (2014). Dynamical mechanisms for asymmetric SSTA patterns associated with some Indian ocean dipoles. J. Geophys. Res. Oceans. 119, 3076–3097. doi: 10.1002/2013JC009651 Wang L., Li T., Zhou T. J. (2012). Intraseasonal SST variability and air-sea interaction over the kuroshio extension region during boreal summer. J. Clim. 25, 1619–1634. doi: 10.1175/JCLI-D-11-00109.1 Xiao F., Wang D., Leung M. Y. (2020). Early and extreme warming in the south China Sea during 2015/2016: Role of an unusual Indian ocean dipole event. Geophys. Res. Lett. 47 (17), e2020GL089936. doi: 10.1029/2020GL089936 Xu Q., Guan Z. Y. (2017a). Interdecadal change of diabatic forcing over key region of the maritime continent and its possible relations with east Asian summer monsoon anomalies. J. Trop. Meteorol. (in Chinese). 33, 21–29. Xu Q., Guan Z. Y. (2017b). Interannual variability of summertime outgoing longwave radiation over the maritime continent in relation to East Asian summer monsoon anomalies. J. Meteorol. 31, 665–677. doi: 10.1007/s13351-017-6178-3 Keywords: Indian Ocean Dipole (IOD), extreme event analysis, Asian–Australian monsoon, easterly wind anomaly, heat budget analysis Citation: Li Z, Xu Z, Zheng Y and Fang Y (2023) Air sea conditions facilitate a transformation of the positive Indian Ocean Dipole with distinct east pole characteristics into an extreme event. Front. Mar. Sci. 10:1106130. doi: 10.3389/fmars.2023.1106130 Received: 23 November 2022; Accepted: 06 February 2023; Published: 01 March 2023. Edited by: Jinbao Song, Zhejiang University, ChinaReviewed by: DX Wang, Sun Yat-sen University, ChinaWeichen Tao, Institute of Atmospheric Physics (CAS), China Copyright © 2023 Li, Xu, Zheng and Fang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. *Correspondence: Zhi Li, bGl6aGlAZmlvLm9yZy5jbg==
<urn:uuid:5146958f-bb97-436d-be20-a7a2923d70a7>
CC-MAIN-2024-51
https://www.frontiersin.org/journals/marine-science/articles/10.3389/fmars.2023.1106130/full
2024-12-02T09:23:03Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.985632
Computer-Assisted Porcelain Laminate Veneer Preparation: A Scoping Review of Stereolithographic Template Design and Fabrication Workflows Abstract :1. Introduction 2. Materials and Methods - What are the key steps involved in the digital workflow for designing and manufacturing stereolithographic templates in computer-assisted PLV preparation? - What are the limitations of stereolithographic template designs that may impact the tooth preparation accuracy? 2.1. Literature Search - (i) - Articles detailing a digital workflow for designing and fabricating stereolithographic templates in computer-assisted PLV preparation. - (ii) - Clinical studies involving the preparation of PLV for six or more teeth. - (iii) - Articles published in English. - (i) - Articles focusing on conventional veneer preparation procedures. - (ii) - Articles using templates for tooth reduction assessment. - (iii) - In vitro studies and review articles. 2.2. Data Extraction 2.3. Quality Assessment 3. Results 4. Discussion 4.1. Three-Dimensional Diagnostic Data Acquisition and Virtual Patient Model Generation 4.2. Virtual Diagnostic Wax-Up and Esthetic Pre-Evaluative Temporary Approach 4.3. Virtual Tooth Preparation 4.4. Stereolithographic Template Designs 4.5. Stereolithographic Template Fabrication 4.6. Limitations 4.7. Future Directions 5. Conclusions Author Contributions Funding Institutional Review Board Statement Informed Consent Statement Data Availability Statement Conflicts of Interest References - Minase, D.A.; Sathe, S.; Bhoyar, A.; Dahihandekar, C.; Jaiswal, T. Porcelain Laminate Veneers: A Case Report. Cureus 2023, 15, e34220. [Google Scholar] [CrossRef] [PubMed] - Ge, C.; Green, C.C.; Sederstrom, D.A.; McLaren, E.A.; Chalfant, J.A.; White, S.N. Effect of tooth substrate and porcelain thickness on porcelain veneer failure loads in vitro. J. Prosthet. Dent. 2018, 120, 85–91. [Google Scholar] [CrossRef] [PubMed] - Al-Fouzan, A.F. Gravimetric analysis of removed tooth structure associated with different preparation designs. Saudi J. Dent. Res. 2016, 7, 1–6. [Google Scholar] [CrossRef] - Gao, J.; He, J.; Fan, L.; Lu, J.; Xie, C.; Yu, H. Accuracy of reduction depths of tooth preparation for porcelain laminate veneers assisted by different tooth preparation guides: An in vitro study. J. Prosthodont. 2022, 31, 593–600. [Google Scholar] [CrossRef] [PubMed] - Jurado, C.; Watanabe, H.; Tinoco, J.V.; Valenzuela, H.U.; Perez, G.G.; Tsujimoto, A. A Conservative Approach to Ceramic Veneers: A Case Report. Oper. Dent. 2020, 45, 229–234. [Google Scholar] [CrossRef] - Silva, B.P.D.; Stanley, K.; Gardee, J. Laminate veneers: Preplanning and treatment using digital guided tooth preparation. J. Esthet. Restor. Dent. 2020, 32, 150–160. [Google Scholar] [CrossRef] - Unkovskiy, A.; Unkovskiy, N.; Spintzyk, S. A virtual patient concept for esthetic and functional rehabilitation in a fully digital workflow. Int. J. Comput. Dent. 2021, 24, 405–417. [Google Scholar] - Luo, T.; Li, J.; Xie, C.; Yu, H. Accuracy of three digital waxing-guided trial restoration protocols for controlling the depths of tooth preparation for ceramic veneers. J. Prosthet. Dent. 2024, 131, 56–63. [Google Scholar] [CrossRef] - Ozer, F.; Pak-Tunc, E.; Esen Dagli, N.; Ramachandran, D.; Sen, D.; Blatz, M.B.; Kang, S.Y.; Lee, H.N.; Kim, W.C. Evaluation of marginal discrepancy of pressable ceramic veneer fabricated using CAD/CAM system: Additive and subtractive manufacturing. J. Adv. Prosthodont. 2018, 10, 347–353. [Google Scholar] - Marques, S.; Ribeiro, P.; Gama, C.; Herrero-Climent, M. Digital guided veneer preparation: A dental technique. J. Prosthet. Dent. 2024, 131, 554–559. [Google Scholar] [CrossRef] - Figueira, J.; Guaqueta, N.; Ramirez, D.I.; Kois, J. Veneer tooth preparation utilizing a novel digital designed workflow: A case report. J. Esthet. Restor. Dent. 2023, 35, 803–809. [Google Scholar] [CrossRef] [PubMed] - Coachman, C.; Paravina, R.D. Digitally enhanced esthetic dentistry—From treatment planning to quality control. J. Esthet. Restor. Dent. 2016, 28 (Suppl. S1), S3–S4. [Google Scholar] [CrossRef] [PubMed] - Mangano, C.; Luongo, F.; Migliario, M.; Mortellaro, C.; Mangano, F.G. Combining intraoral scans, cone beam computed tomography and face scans: The virtual patient. J. Craniofac. Surg. 2018, 29, 2241–2246. [Google Scholar] [CrossRef] [PubMed] - Harris, B.T.; Montero, D.; Grant, G.T.; Morton, D.; Llop, D.R.; Lin, W.S. Creation of a 3-dimensional virtual dental patient for computer-guided surgery and CAD-CAM interim complete removable and fixed dental prostheses: A clinical report. J. Prosthet. Dent. 2017, 117, 197–204. [Google Scholar] [CrossRef] [PubMed] - Sucharew, H.; Macaluso, M. Methods for research evidence synthesis: The scoping review approach. J. Hosp. Med. 2019, 14, 416–418. [Google Scholar] [CrossRef] - Tricco, A.C.; Lillie, E.; Zarin, W.; O’Brien, K.K.; Colquhoun, H.; Levac, D.; Moher, D.; Straus, S.E. PRISMA extension for scoping reviews (PRISMA-ScR): Checklist and explanation. Ann. Intern. Med. 2018, 169, 467–473. [Google Scholar] [CrossRef] - Peters, M.D.; Godfrey, C.M.; Khalil, H.; McInerney, P.; Parker, D.; Soares, C.B. Guidance for conducting systematic scoping reviews. JBI Evid. Implement. 2015, 13, 141–146. [Google Scholar] [CrossRef] - Moola, S.; Munn, Z.; Tufanaru, C.; Aromataris, E.; Sears, K.; Sfetcu, R.; Mu, P.F. Chapter 7: Systematic Reviews of Etiology and Risk. In Joanna Briggs Institute Reviewer’s Manual, 2nd ed.; Aromataris, E., Munn, Z., Eds.; The Joanna Briggs Institute: Adelaide, Australia, 2017; Volume 5, pp. 217–269. [Google Scholar] - Zhong Yi, L.I.; He Fei, B.A.I.; Yi Jiao ZHAO, Y.W.; Hong Qiang, Y.E.; Yu Chun, S.U.N. 3D Evaluation of Accuracy of Tooth Preparation for Laminate Veneers Assisted by Rigid Constraint Guides Printed by Selective Laser Melting. Chin. J. Dent. Res. 2020, 23, 183–189. [Google Scholar] - Wang, S.; Zhao, W.; Ye, H.; Liu, Y.; Zhou, Y. Preliminary application and evaluation of digital step-by-step tooth-preparation templates. J. Prosthet. Dent. 2023, 130, 102–107. [Google Scholar] [CrossRef] - Taha, Y.; Raslan, F.; Ali, A.; Roig, M. Guided tooth preparation device fabricated with a complete digital workflow: A dental technique. J. Prosthet. Dent. 2021, 125, 221.e1–221.e4. [Google Scholar] [CrossRef] - Caponi, L.; Raslan, F.; Roig, M. Fabrication of a facially generated tooth reduction guide for minimally invasive preparations: A dental technique. J. Prosthet. Dent. 2022, 127, 689–694. [Google Scholar] [CrossRef] [PubMed] - Liu, C.; Guo, J.; Gao, J.; Yu, H. Computer-assisted tooth preparation template and predesigned restoration: A digital workflow. Int. J. Comput. Dent. 2020, 23, 351–362. [Google Scholar] [PubMed] - Abulhamael, S.M.; Papathanasiou, A.; Kostagianni, A.; Jain, S.; Finkelman, M.; Mourão, C.F.; Ali, A. Evaluation of marginal and internal adaptation of veneers generated by the guided prosthetic tooth preparation system. J. Esthet. Restor. Dent. 2024, 36, 911–919. [Google Scholar] [CrossRef] [PubMed] - Gao, J.; Jia, L.; Tan, X.; Yu, H. Three-dimensional quantification of enamel preservation in tooth preparation for porcelain laminate veneers: A fully digital workflow in vitro study. Oper. Dent. 2022, 47, 183–189. [Google Scholar] [CrossRef] [PubMed] - Yousry, M.; Hammad, I.; El Halawani, M.; Aboushelib, M. Preparation of ultrathin translucent zirconia laminate veneers using 3D printing reduction guides. J. Prosthet. Dent. 2024, 131, 548–553. [Google Scholar] [CrossRef] - Sartori, N.; Ghishan, T.; O’Neill, E.; Hosney, S.; Zoidis, P. Digitally designed and additively manufactured tooth reduction guides for porcelain laminate veneer preparations: A clinical report. J. Prosthet. Dent. 2024, 131, 768–773. [Google Scholar] [CrossRef] - Villalobos-Tinoco, J.; Jurado, C.A.; Robles, M.; D’Atri, E.; Afrashtehfar, K.I. Tooth-reduction 3D-printed guides for facilitating the provision of ultrathin laminate veneers. A cross-shaped novel design. Int. J. Esthet. Dent. 2023, 18, 390–404. [Google Scholar] - Robles, M.; Jurado, C.A.; Azpiazu-Flores, F.X.; Villalobos-Tinoco, J.; Afrashtehfar, K.I.; Fischer, N.G. An Innovative 3D Printed Tooth Reduction Guide for Precise Dental Ceramic Veneers. J. Funct. Biomater. 2023, 14, 216. [Google Scholar] [CrossRef] - Luo, T.; Zhang, J.; Fan, L.; Huang, Y.; Yu, J.; Yu, H. A digital workflow with the virtual enamel evaluation and stereolithographic template for accurate tooth preparation to conservatively manage a case of complex exogenous dental erosion. J. Esthet. Restor. Dent. 2022, 34, 733–740. [Google Scholar] [CrossRef] - Gao, J.; Li, J.; Liu, C.; Fan, L.; Yu, J.; Yu, H. A stereolithographic template for computer-assisted teeth preparation in dental esthetic ceramic veneer treatment. J. Esthet. Restor. Dent. 2020, 32, 763–769. [Google Scholar] [CrossRef] - Taut, M.; Mitariu, L.; Manziuc, M.; Negucioiu, M.; Kui, A.; Boutros, R.; Buduru, S. Digital versus analog workflow for six upper veneers: A case report. Rom. J. Oral Rehabil. 2022, 14, 104–109. [Google Scholar] - Li, J.; Joda, T.; Revilla-León, M.; Saleh, M.H.A.; Chen, Z.; Wang, H.L. Recommendations for successful virtual patient-assisted esthetic implant rehabilitation: A guide for optimal function and clinical efficiency. J. Esthet. Restor. Dent. 2024, 36, 186–196. [Google Scholar] [CrossRef] [PubMed] - McLaren, E.; Schoenbaum, T. The bonded functional esthetic prototype: Part 1. Inside Dent. 2013, 9, 84–92. [Google Scholar] - Ward, D.H. Proportional smile design: Using the recurring esthetic dental proportion to correlate the widths and lengths of the maxillary anterior teeth with the size of the face. Dent. Clin. N. Am. 2015, 59, 623–638. [Google Scholar] [CrossRef] [PubMed] - Omar, D.; Duarte, C. The application of parameters for comprehensive smile esthetics by digital smile design programs: A review of literature. Saudi Dent. J. 2018, 30, 7–12. [Google Scholar] [CrossRef] - Zhai, Y.; Lados, D.A.; LaGoy, J.L. Additive manufacturing: Making imagination the major limitation. JOM 2014, 66, 808–816. [Google Scholar] [CrossRef] - Olsson, A.; Hellsing, M.S.; Rennie, A.R. New possibilities using additive manufacturing with materials that are difficult to process and with complex structures. Phys. Scr. 2017, 92, 053002. [Google Scholar] [CrossRef] - Attaran, M. The rise of 3-D printing: The advantages of additive manufacturing over traditional manufacturing. Bus. Horiz. 2017, 60, 677–688. [Google Scholar] [CrossRef] - Bae, E.J.; Jeong, I.D.; Kim, W.C.; Kim, J.H. A comparative study of additive and subtractive manufacturing for dental restorations. J. Prosthet. Dent. 2017, 118, 187–193. [Google Scholar] [CrossRef] - Grande, F.; Tesini, F.; Pozzan, M.C.; Zamperoli, E.M.; Carossa, M.; Catapano, S. Comparison of the accuracy between denture bases produced by subtractive and additive manufacturing methods: A pilot study. Prosthesis 2022, 4, 151–159. [Google Scholar] [CrossRef] - Le, V.; Keßler, A.; Folwaczny, M. Influence of DLP and SLA printer technology on the accuracy of surgical guides for implant dentistry in free-end situations. Int. J. Comput. Dent. 2023, 26, 219–226. [Google Scholar] - Labakoum, B.; Farhan, A.; Taleb, L.B.; Mouhsen, A.; Lyazidi, A. Effects of autoclaving and disinfection on 3D surgical guides using LCD technology for dental implant. 3D Print. Med. 2024, 10, 1–9. [Google Scholar] [CrossRef] [PubMed] - Park, J.M.; Jeon, J.; Koak, J.Y.; Kim, S.K.; Heo, S.J. Dimensional accuracy and surface characteristics of 3D-printed dental casts. J. Prosthet. Dent. 2021, 126, 427–437. [Google Scholar] [CrossRef] [PubMed] - Guttridge, C.; Shannon, A.; O’Sullivan, A.; O’Sullivan, K.J.; O’Sullivan, L.W. Biocompatible 3D printing resins for medical applications: A review of marketed intended use, biocompatibility certification, and post-processing uguidance. Ann. 3D Print. Med. 2022, 5, 100044. [Google Scholar] [CrossRef] - Raszewski, Z.; Chojnacka, K.; Kulbacka, J.; Mikulewicz, M. Mechanical Properties and Biocompatibility of 3D Printing Acrylic Material with Bioactive Components. J. Funct. Biomater. 2022, 14, 13. [Google Scholar] - Jian-Peng, S.; Jin-Gang, J.; Wei, Q.; Zhi-Yuan, H.; Hong-Yuan, M.; Shan, Z. Digital Interactive Design and Robot-Assisted Preparation Experiment of Tooth Veneer Preparation: An In Vitro Proof-of-Concept. IEEE Access 2023, 11, 30292–30307. [Google Scholar] [CrossRef] - Jiang, J.; Guo, Y.; Huang, Z.; Zhang, Y.; Wu, D.; Liu, Y. Adjacent surface trajectory planning of robot-assisted tooth preparation based on augmented reality. Eng. Sci. Technol. Int. J. 2022, 27, 101001. [Google Scholar] [CrossRef] Database | Keywords | ---|---| Web of Science | TS = (((veneers) OR (porcelain laminated veneers) OR (ceramic veneers)) AND ((printed) OR (templates) OR (manufactured) OR (guided) OR (assisted) OR (designed) OR (digital)) AND ((tooth reduction) OR (tooth preparation))) | PubMed | TS = (((veneers) OR (porcelain laminated veneers) OR (ceramic veneers)) AND ((printed) OR (templates) OR (manufactured) OR (guided) OR (assisted) OR (designed) OR (digital)) AND ((tooth reduction) OR (tooth preparation))) | Scopus | ({veneers} OR {porcelain laminated veneers} OR {ceramic veneers}) AND ({printed} OR {templates} OR {manufactured} OR {designed} OR {digital} OR {guided} OR {assisted}) AND ({tooth reduction} OR {tooth preparation}) AND PUBYEAR > 2013 AND PUBYEAR < 2025 AND (LIMIT-TO (DOCTYPE, “ar”)) AND (LIMIT-TO (LANGUAGE, “English”)) AND (LIMIT-TO (EXACTKEYWORD, “Computer Aided Design”) OR LIMIT-TO (EXACTKEYWORD, “Computer-Aided Design”) OR LIMIT-TO (EXACTKEYWORD, “Dental Veneers”) OR LIMIT-TO (EXACTKEYWORD, “Dental Veneer”) OR LIMIT-TO (EXACTKEYWORD, “CAD/CAM”) OR LIMIT-TO (EXACTKEYWORD, “Three Dimensional Printing”) OR LIMIT-TO (EXACTKEYWORD, “Workflow”) OR LIMIT-TO (EXACTKEYWORD, “Computer Aided Design/computer Aided Manufacturing”) OR LIMIT-TO (EXACTKEYWORD, “3D Printing”) OR LIMIT-TO (EXACTKEYWORD, “CAD-CAM”) OR LIMIT-TO (EXACTKEYWORD, “Computer-aided Design”) OR LIMIT-TO (EXACTKEYWORD, “Cad/cams”) OR LIMIT-TO (EXACTKEYWORD, “Additive Manufacturing”) OR LIMIT-TO (EXACTKEYWORD, “Computer Aided Manufacturing”) OR LIMIT-TO (EXACTKEYWORD, “Three Dimensional Imaging”) OR LIMIT-TO (EXACTKEYWORD, “Imaging, Three-Dimensional”) OR LIMIT-TO (EXACTKEYWORD, “Printing, Three-Dimensional”) OR LIMIT-TO (EXACTKEYWORD, “Tooth Preparation”)) | Authors and Year | Types of Study | Number of Teeth (Tooth Type) | Types of Scanners | STL Diagnostic Data Acquisition | Virtual Patient Model | Digital Wax-Up | Aesthetic Validation Procedure | ---|---|---|---|---|---|---|---| Silva et al., 2020 [6] | Case report | Case 1: 10 teeth (teeth 15 to 25) | Case 1: Extraoral scanner (3Shape D2000) | Case 1: Indirect scans of maxillary and mandibular cast | Case 1: Maxillary cast scan | Case 1: Digital wax-up was made on maxillary digital cast | Case 1: Mock-up was completed using three different digital wax-ups | Case 2: 10 teeth (teeth 15 to 25) | Case2: Intraoral scanner (3Shape Trios3) | Case2: Direct scans of Maxillary and mandibular dentitions | Case 2: Intraoral scans | Case 2: Digital wax-up was created using Digital Smile Design planning software | Case 2: Mock-up was completed using a silicone index taken from a printed wax cast and Luxatemp Bisacryl | || Gao et al., 2020 [31] | Case report | 8 teeth (teeth 14 to 24) | - Intraoral scanner (3Shape TRIOS) - Face scanner (3DMD) - CBCT (3D Accui tomo 170) | - Direct scans of maxillary and mandibular dentition - Facial scan - CBCT scan of maxilla skeletal | Superimposition of intraoral, facial and CBCT scans using Exocad software 2018 | Digital wax-up was created on virtual patient mounted on virtual articulator | Not completed | Luo et al., 2022 [30] | Case report | 16 teeth (teeth 11 to 24, teeth 34 to 44) | - Intraoral scanner (Trios Color Pod) - CBCT (3D Accui tomo 170) - Face scanner (3dMDs) | - Direct scans of maxillary and mandibular dentition - Facial scan - CBCT scan of maxilla and mandible skeletal | Superimposition of CBCT, intraoral and face scans using Exocad software 2018 | Digital wax-up was created on virtual patient mounted on virtual articulator | Not completed | Tinoco et al., 2023 [28] | Case report | 10 teeth (teeth 15 to 25) | Laboratory scanner (Degree of Freedom HD) | Indirect scans of maxillary and mandibular casts | Diagnostic casts scan | Not mentioned | Intraoral mock-up was performed using Structure Premium | Robles et al., 2023 [29] | Case report | 8 teeth (teeth 14 to 24) | Laboratory scanner (Degree of Freedom HD) | Indirect scans of maxillary and mandibular casts | Diagnostic casts scan | Digital wax-up was created on digital diagnostic casts | Diagnostic mock-up was performed using temporary bis-acrylic material | Figueira et al., 2023 [11] | Case report | 10 teeth (teeth 15 to 25) | -Intraoral scanner (3Shape) -Extraoral photog raphs (Kois Facial Reference Glasses) -CBCT | -Direct scans of maxillary and mandibular dentition -Indirect scans of diagnostic casts | Superimposition of extraoral photographs and intraoral scans | Diagnostic wax-up was created on virtual patient | Diagnostic mock-up was performed using Bonded Functional Esthetic Prototype (BFEP) | Marques et al., 2024 [10] | Case report | 6 teeth (teeth 13 to 23) | Intraoral scanner (CS3600; Carestream) | Direct scans of maxillary and mandibular dentition | Superimposition of extraoral photographs and intraoral scans | Digital wax-up was created on digital diagnostic casts | Trial restoration was performed using bis-acrylic resin | Authors and Years | CAD Software Used for Template Designs | Virtual Tooth Preparation | Number of Templates | Template Designs | Types of 3D Printer | Types of Template Resins | Limitations of the Template Design | ---|---|---|---|---|---|---|---| Silva et al., 2020 [6] | First Fit software | Virtual tooth reduction was performed from digital wax-up using First Fit software | Case 1: 6 | Each template was designed with a window slot to engage the special First Fit handpiece | Formlabs 2 | Not mentioned | 1. A specially designed bur was required 2. No guidance for tooth reduction in interproximal areas and the cervical finish line | Case 2: 8 | ||||||| Gao et al., 2020 [31] | Exocad 2018 | Desired volume was reduced from digital wax-up using “off-set” tool | 1 | Template was designed with cylindrical guide tubes on labial and incisal surfaces | ProJet MJP 3600 MultiJet | Resin (VisiJet S300) | 1. Calibrated bur with stopper was required 2. Only provides depth groove for subsequent ve neer preparation | Luo et al., 2022 [30] | Exocad 2018 | Not mentioned | 1 | The templates were designed with tubes at designated points on labial, incisal and palatal surfaces | ProJet MJP 3600 MultiJet | Resin (VisiJet S300) | 1. Calibrated bur with stopper was required 2. Only provides depth groove for subsequent ve neer preparation | Tinoco et al., 2023 [28] | Exocad version 2.4 | Not mentioned | 1 | Template incorporated a cross-shaped design | Mono 4K, Anycubic | Transparent photo-polymerizable resin (Anycubic Clear UV Resin) | Only provide depth groove for subsequence veneer preparation | Robles et al., 2023 [29] | Exocad (Exocad 2.4) | Not mentioned | 1 | Template incorporated a cross-shaped design | Mono 4K, Anycubic | Transparent photopolymerizable resin (Anycubic Clear UV Resin) | Only provides depth groove for subsequent veneer preparation | Figueira et al., 2023 [11] | 3Shape | Virtual tooth preparation is performed using virtual burs | 1 | An open window was designed on the labial surface of template | Not mentioned | Not mentioned | Free-hand tooth preparation at the cervical finish line is required | Marques et al., 2024 [10] | Meshmixer | Desired volume was reduced from digital wax-up | 5 | Each template was designed with open access to the labial surfaces of the prepared tooth and rotary instrument access sleeved windows | Max UV. Asiga (DLP) 62 μm | Clear resin (Freeprint Ortho; Detax). | Free-hand polishing is needed after guided tooth preparation | Authors and Year | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | Total Yes (Max 8) | ---|---|---|---|---|---|---|---|---|---| Gao et al., 2020 [31] | Yes | No | Yes | Yes | Yes | Yes | Unclear | Yes | 6 | Luo et al., 2022 [30] | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | 8 | Tinoco et al., 2023 [28] | Yes | No | Yes | Yes | Yes | Yes | No | Yes | 6 | Robles et al., 2023 [29] | Yes | No | Yes | Yes | Yes | Yes | No | Yes | 6 | Figueira et al., 2023 [11] | Yes | No | Yes | Yes | Yes | Yes | No | Yes | 6 | Marques et al., 2024 [10] | Unclear | No | Yes | Yes | Yes | Yes | No | Yes | 5 | Authors and Year | B1 | B2 | B3 | B4 | B5 | B6 | B7 | B8 | B9 | B10 | Total Yes (Max 10) | ---|---|---|---|---|---|---|---|---|---|---|---| Silva et al., 2020 [6] | Unclear | Yes | Yes | Unclear | Unclear | Yes | Yes | Yes | Yes | N/A | 6 | Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. | © 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Guan, X.; Beh, Y.H.; Tew, I.M. Computer-Assisted Porcelain Laminate Veneer Preparation: A Scoping Review of Stereolithographic Template Design and Fabrication Workflows. Dent. J. 2024, 12, 302. https://doi.org/10.3390/dj12100302 Guan X, Beh YH, Tew IM. Computer-Assisted Porcelain Laminate Veneer Preparation: A Scoping Review of Stereolithographic Template Design and Fabrication Workflows. Dentistry Journal. 2024; 12(10):302. https://doi.org/10.3390/dj12100302 Chicago/Turabian StyleGuan, Xin, Yew Hin Beh, and In Meei Tew. 2024. "Computer-Assisted Porcelain Laminate Veneer Preparation: A Scoping Review of Stereolithographic Template Design and Fabrication Workflows" Dentistry Journal 12, no. 10: 302. https://doi.org/10.3390/dj12100302 APA StyleGuan, X., Beh, Y. H., & Tew, I. M. (2024). Computer-Assisted Porcelain Laminate Veneer Preparation: A Scoping Review of Stereolithographic Template Design and Fabrication Workflows. Dentistry Journal, 12(10), 302. https://doi.org/10.3390/dj12100302
<urn:uuid:8a32851b-2cf8-4c43-9c05-d9bae018a1b4>
CC-MAIN-2024-51
https://www.mdpi.com/2304-6767/12/10/302
2024-12-02T08:07:28Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.78629
Before the terrorist attacks that left more than 125 people dead and hundreds wounded in Paris on Friday, November 13, 2015, the city was set to host the 21st Conference of the Parties (COP21) for the United Nations Framework Convention on Climate Change, starting on November 30, 2015. It was just announced that the conference will go on as planned. I applaud France for its commitment to the global environment amid its national tragedy and mourning. The decision emphasizes that countries are now beginning to realize that putting a cap on rising temperatures is just as important as curbing terrorism if the world is to survive. And I have hope that finally, with this particular convention taking place in Paris at this precise moment, all of us throughout the world will also understand that. Not that successful in the past Just a few days ago, the World Meteorological Organization released another report stating that the concentration of greenhouse gases in the Earth’s atmosphere hit a record high in 2014. Last year on November 4, I wrote to you about how levels of carbon dioxide, the major greenhouse gas, had hit 400 parts per million (ppm). Scientists say that greenhouse concentrations need to remain under 450 parts per million by 2100, which means we need to set a goal of keeping the average global temperature increase to no more than 3.6 degrees Fahrenheit (or 2 degrees Celsius) above the preindustrial level. Anything higher would change the climate so dramatically that neither humans nor ecosystems could easily adapt. That’s why many regard the Paris conference as a critical window of opportunity to save the planet before it’s too late. At COP21, the delegates from nearly 200 countries are hoping to reach a historic agreement to curb greenhouse gas emissions. Last week, scientists in the United Kingdom predicted that the global mean temperature in 2015 would mark a one-degree-Celsius rise above preindustrial levels for the first time ever—which researcher Stephen Belcher called a clear move into “uncharted territory” for climate change. Unfortunately, the emissions cuts countries have pledged in advance of the Paris conference aren’t enough to keep us within the two-degree limit. If carbon emissions are left unchecked, according to the Intergovernmental Panel on Climate Change, the world could see a four-degree-Celsius rise by the end of the century, translating into food insecurity, health crises, mass migration and violent conflict over resources. In other words, we’d have a global catastrophe. A lot of pressure is on Paris. Climate change conferences have not been that successful in the past. Since its inaugural 1995 meeting in Berlin, the COP has convened every year in cities around the world to review the plan of action for stabilizing greenhouse gases. Yet, CO2 levels continue to rise. Last year’s conference in Lima, Peru, did little than pave the way for more talking about climate change. Now, the time may be right Although no one would have wished for a scenario where the issues of terrorism and climate change would bump up together as they are in Paris now, it is an awakening. The Paris attacks demonstrate how volatile an unstable world can be. Kudos to France for its decision to soldier on with dealing with two of the world’s biggest problems at this time. This may be the moment when world leaders will be especially motivated to push a real greenhouse-gas-curbing agreement through, when climate-change mitigation is actually still feasible. According to the United Nations Conference on Climate Change, a 2013 meta-study compiled almost 12,000 research abstracts published by over 29,000 researchers between 1991 and 2011. Among them, 3,896 articles stated a position on the causes of global warming over the past 50 years: 97.1 percent of them endorsed the consensus that it is human-caused. So, let’s hope we’re done with banning the language of climate change. Let’s hope we’re done with denying that the planet is warming faster than ever due to human activities. For France, for the world, let’s finally demand that all nations come together to do something about it. If not Paris now, then where and when? Here’s to finding your true places and natural habitats, Candy
<urn:uuid:02117001-d84b-4042-abff-e7af9c7fb5f1>
CC-MAIN-2024-51
https://www.nathab.com/blog/applauding-paris-climate-change-conference-2015-will-go-on/
2024-12-02T08:02:02Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00341.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.998125
thumbnail testing by Lazur - uploaded on May 1, 2015, 1:59 am There seem to be a pixelation issue on thumbnails of images in portrait format (and/or with small cliparts as well? Or was that solved already?). These images may point out if there is a problem. Log into OpenClipart - Tags - 2015 Lazur URH clipart issue openclipart raster remix 217882 render renderig test thumbnail thumbnail_issue wave_of_ridiculous_thumbnails_here W.O.R.T.H - Safe for Work? - Yes
<urn:uuid:6eff6ad8-c4ce-42ad-a6a2-80de8cae29ad>
CC-MAIN-2024-51
https://openclipart.org/detail/217883/thumbnail-testing
2024-12-03T11:36:20Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00241.warc.gz
zero
1.0
json-ld
true
false
null
null
null
{ "abbr": [ "zero" ], "in_footer": [ false ], "in_head": [ true ], "location": [ "json-ld" ], "version": [ "1.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.994543
Skip to main content An initiative of the South Australian Maritime Museum Toggle navigation Ships People Ports Photos About Log in My Archive Log in Primary tabs Create new account Log in (active tab) Request new password Username * Password * Log in
<urn:uuid:b6b2b218-7d10-4df9-8bad-69ec2d13067d>
CC-MAIN-2024-51
https://passengers.history.sa.gov.au/user/login?current=node/988478
2024-12-03T11:26:43Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00241.warc.gz
by
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.880453
Medium Privacy Policy You can see our previous Privacy Policy here. This Privacy Policy explains how A Medium Corporation (“Medium,” “we,” or “us”) collects, uses, and discloses information about you. This Privacy Policy applies when you use our websites, mobile applications, and other online products and services that link to this Privacy Policy (collectively, our “Services”), contact our customer service team, engage with us on social media, or otherwise interact with us. We may change this Privacy Policy from time to time. If we make changes, we will notify you by revising the date at the top of this policy and, in some cases, we may provide you with additional notice (such as adding a statement to our website or providing you with a notification). We encourage you to review this Privacy Policy regularly to stay informed about our information practices and the choices available to you. CONTENTS - Collection of Information - Use of Information - Sharing of Information - Third-Party Embeds - Transfer of Information to the United States and Other Countries - Your Choices - Your California Privacy Rights - Additional Disclosures for Individuals in Europe - Contact Us COLLECTION OF INFORMATION Information You Provide to Us We collect information you provide directly to us. For example, you share information directly with us when you create an account, fill out a form, submit or post content through our Services, purchase a membership, communicate with us via third-party platforms, request customer support, or otherwise communicate with us. The types of personal information we may collect include your name, display name, username, bio, email address, business information, your content, including your avatar image, photos, posts, responses, and series published by you, and any other information you choose to provide. In some cases, we may also collect information you provide about others, such as when you purchase a Medium membership as a gift for someone. We will use this information to fulfill your request and will not send communications to your contacts unrelated to your request, unless they separately consent to receive communications from us or otherwise engage with us. We do not collect payment information through our Services. We rely on third parties to process payments in connection with our Services. Any information you provide to facilitate such a payment is subject to the third-party payment processor’s privacy policy, and we encourage you to review this policy before you provide any information to the payment processor. Information We Collect Automatically When You Interact with Us In some instances, we automatically collect certain information, including: - Activity Information: We collect information about your activity on our Services, such as your reading history and when you share links, follow users, highlight posts, and clap for posts. - Transactional Information: When you purchase a membership, we collect information about the transaction, such as subscription details, purchase price, and the date of the transaction. - Device and Usage Information: We collect information about how you access our Services, including data about the device and network you use, such as your hardware model, operating system version, mobile network, IP address, unique device identifiers, browser type, and app version. We also collect information about your activity on our Services, such as access times, pages viewed, links clicked, and the page you visited before navigating to our Services. - Information Collected by Cookies and Similar Tracking Technologies: We use tracking technologies, such as cookies and web beacons, to collect information about you. Cookies are small data files stored on your hard drive or in device memory that help us improve our Services and your experience, see which areas and features of our Services are popular, and count visits. Web beacons (also known as “pixel tags” or “clear GIFs”) are electronic images that we use on our Services and in our emails to help deliver cookies, count visits, and understand usage. We also work with third party analytics providers who use cookies, web beacons, device identifiers, and other technologies to collect information about your use of our Services and other websites and applications, including your IP address, web browser, mobile network information, pages viewed, time spent on pages or in mobile apps, and links clicked. This information may be used by Medium and others to, among other things, analyze and track data, determine the popularity of certain content, deliver content targeted to your interests on our Services, and better understand your online activity. For more information about cookies and how to disable them, see Your Choices below. Information We Collect from Other Sources We obtain information from third-party sources. For example, we may collect information about you from social networks, accounting services providers and data analytics providers. Additionally, if you create or log into your Medium account through a third-party platform (such as Apple, Facebook, Google, or Twitter), we will have access to certain information from that platform, such as your name, lists of friends or followers, birthday, and profile picture, in accordance with the authorization procedures determined by such platform. Information We Derive We may derive information or draw inferences about you based on the information we collect. For example, we may make inferences about your location based on your IP address or infer reading preferences based on your reading history. USE OF INFORMATION We use the information we collect to provide, maintain, and improve our Services, which includes publishing and distributing user-generated content, personalizing the posts you see and operating our metered paywall. We also use the information we collect to: - Create and maintain your Medium account; - Process transactions and send related information, such as confirmations, receipts, and user experience surveys; - Send you technical notices, security alerts, and support and administrative messages; - Respond to your comments and questions and provide customer service; - Communicate with you about new content, products, services, and features offered by Medium and provide other news and information we think will interest you (see Your Choices below for information about how to opt out of these communications at any time); - Monitor and analyze trends, usage, and activities in connection with our Services; - Detect, investigate, and prevent security incidents and other malicious, deceptive, fraudulent, or illegal activity and protect the rights and property of Medium and others; - Debug to identify and repair errors in our Services; - Comply with our legal and financial obligations; and - Carry out any other purpose described to you at the time the information was collected. SHARING OF INFORMATION We share personal information in the following circumstances or as otherwise described in this policy: - We share personal information with other users of the Services. For example, if you use our Services to publish content, post comments or send private notes, certain information about you will be visible to others, such as your name, photo, bio, other account information you may provide, and information about your activities on our Services (e.g., your followers and who you follow, recent posts, claps, highlights, and responses). - We share personal information with vendors, service providers, and consultants that need access to personal information in order to perform services for us, such as companies that assist us with web hosting, storage, and other infrastructure, analytics, payment processing, fraud prevention and security, customer service, communications, and marketing. - We may disclose personal information if we believe that disclosure is in accordance with, or required by, any applicable law or legal process, including lawful requests by public authorities to meet national security or law enforcement requirements. If we are going to disclose your personal information in response to legal process, we will give you notice so you can challenge it (for example by seeking court intervention), unless we are prohibited by law or believe doing so may endanger others or cause illegal conduct. We will object to legal requests for information about users of our Services that we believe are improper. - We may share personal information if we believe that your actions are inconsistent with our user agreements or policies, if we believe that you have violated the law, or if we believe it is necessary to protect the rights, property, and safety of Medium, our users, the public, or others. - We share personal information with our lawyers and other professional advisors where necessary to obtain advice or otherwise protect and manage our business interests. - We may share personal information in connection with, or during negotiations concerning, any merger, sale of company assets, financing, or acquisition of all or a portion of our business by another company. - Personal information is shared between and among Medium and our current and future parents, affiliates, and subsidiaries and other companies under common control and ownership. - We share personal information with your consent or at your direction. - We also share aggregated or de-identified information that cannot reasonably be used to identify you. THIRD-PARTY EMBEDS Medium does not host some of the content displayed on our Services. Users have the ability to post content that is actually hosted by a third party, but is embedded in our pages (an “Embed”). When you interact with an Embed, it can send information about your interaction to the hosting third party just as if you were visiting the third party’s site directly. For example, when you load a Medium post page with a YouTube video Embed and watch the video, YouTube receives information about your activity, such as your IP address and how much of the video you watch. Medium does not control what information third parties collect through Embeds or what they do with the information. This Privacy Policy does not apply to information collected through Embeds. The privacy policy belonging to the third party hosting the Embed applies to any information the Embed collects, and we recommend you review that policy before interacting with the Embed. TRANSFER OF INFORMATION TO THE UNITED STATES AND OTHER COUNTRIES Medium is headquartered in the United States, and we have operations and service providers in the United States and other countries. Therefore, we and our service providers may transfer your personal information to, or store or access it in, jurisdictions that may not provide levels of data protection that are equivalent to those of your home jurisdiction. For example, we transfer personal data to Amazon Web Services, one of our service providers that processes personal information for us in various data center locations across the globe, including those listed here. We will take steps to ensure that your personal information receives an adequate level of protection in the jurisdictions in which we process it. YOUR CHOICES Account Information You may access, correct, delete and export your account information at any time by logging into the Services and navigating to the Settings page. Please note that if you choose to delete your account, we may continue to retain certain information about you as required by law or for our legitimate business purposes. Cookies Most web browsers are set to accept cookies by default. If you prefer, you can usually adjust your browser settings to remove or reject browser cookies. Please note that removing or rejecting cookies could affect the availability and functionality of our Services. Communications Preferences You may opt out of receiving certain communications from us, such as digests, newsletters, and activity notifications, by following the instructions in those communications or through your account’s Settings page. If you opt out, we may still send you administrative emails, such as those about your account or our ongoing business relations. Mobile Push Notifications With your consent, we may send push notifications to your mobile device. You can deactivate these messages at any time by changing the notification settings on your mobile device. YOUR CALIFORNIA PRIVACY RIGHTS The California Consumer Privacy Act or “CCPA” (Cal. Civ. Code § 1798.100 et seq.) affords consumers residing in California certain rights with respect to their personal information. If you are a California resident, this section applies to you. In the preceding 12 months, we have collected the following categories of personal information: identifiers, commercial information, internet or other electronic network activity information, and inferences. For details about the precise data points we collect and the categories of sources of such collection, please see the Collection of Information section above. We collect personal information for the business and commercial purposes described in the Use of Information section above. In the preceding 12 months, we have disclosed the following categories of personal information for business purposes to the following categories of recipients: Medium does not sell your personal information. Subject to certain limitations, you have the right to (1) request to know more about the categories and specific pieces of personal information we collect, use, and disclose about you, (2) request deletion of your personal information, (3) opt out of any sales of your personal information, if we engage in that activity in the future, and (4) not be discriminated against for exercising these rights. You may make these requests by emailing us at [email protected] or by completing this webform. We will verify a webform request by asking you to provide identifying information. We will not discriminate against you if you exercise your rights under the CCPA. If we receive your request from an authorized agent, we may ask for evidence that you have provided such agent with a power of attorney or that the agent otherwise has valid written authority to submit requests to exercise rights on your behalf. This may include requiring you to verify your identity. If you are an authorized agent seeking to make a request, please contact us. ADDITIONAL DISCLOSURES FOR INDIVIDUALS IN EUROPE If you are located in the European Economic Area (“EEA”), the United Kingdom, or Switzerland, you have certain rights and protections under applicable law regarding the processing of your personal data, and this section applies to you. Legal Basis for Processing When we process your personal data, we will do so in reliance on the following lawful bases: - To perform our responsibilities under our contract with you (e.g., providing the products and services you requested). - When we have a legitimate interest in processing your personal data to operate our business or protect our interests (e.g., to provide, maintain, and improve our products and services, conduct data analytics, and communicate with you). - To comply with our legal obligations (e.g., to maintain a record of your consents and track those who have opted out of non-administrative communications). - When we have your consent to do so (e.g., when you opt in to receive non-administrative communications from us). When consent is the legal basis for our processing your personal data, you may withdraw such consent at any time. Data Retention We store personal data associated with your account for as long as your account remains active. If you close your account, we will delete your account data within 14 days. We store other personal data for as long as necessary to carry out the purposes for which we originally collected it and for other legitimate business purposes, including to meet our legal, regulatory, or other compliance obligations. Data Subject Requests Subject to certain limitations, you have the right to request access to the personal data we hold about you and to receive your data in a portable format, the right to ask that your personal data be corrected or erased, and the right to object to, or request that we restrict, certain processing. To exercise your rights: - If you sign up for a Medium account, you may at any time request an export of your personal information from the Settings page, or by going to Settings and then selecting Account within our app. - You may correct information associated with your account from the Settings page, or by going to Settings and then selecting Account within our app, and the Customize Your Interests page to update your interests. - You may withdraw consent by deleting your account at any time through the Settings page, or by going to Settings and then selecting Account within our app (except to the extent Medium is prevented by law from deleting your information). - You may object at any time to the use of your personal data by contacting [email protected]. Questions or Complaints If you have a concern about our processing of personal data that we are not able to resolve, you have the right to lodge a complaint with the Data Protection Authority where you reside. Contact details for your Data Protection Authority can be found using the links below: - For individuals in the EEA: https://edpb.europa.eu/about-edpb/board/members_en - For individuals in the UK: https://ico.org.uk/global/contact-us/ - For individuals in Switzerland: https://www.edoeb.admin.ch/edoeb/en/home/the-fdpic/contact.html CONTACT US If you have any questions about this Privacy Policy, please contact us at [email protected]. If you are from the EEA or the United Kingdom and have questions about this Privacy Policy, please contact us at [email protected] or our privacy representatives as follows: Privacy representative for EEA Unit 3D North Point House North Point Business Park New Mallow Road Cork T23AT2P Ireland Or here. Privacy representative for the United Kingdom 37 Albert Embankment London SE1 7TL United Kingdom Or here.
<urn:uuid:8fe5ab6c-9c9d-4581-aa8a-85f16e9e3976>
CC-MAIN-2024-51
https://policy.medium.com/medium-privacy-policy-f03bf92035c9?source=post_page-----7654108cf1a--------------------------------
2024-12-03T11:56:20Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00241.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.993109
Abstract Book review of Building a Bridge: How the Catholic Church and the LGBT Community Can Enter into a Relationship of Respect, Compassion, and Sensitivity by James Martin, S.J. DOI 10.15365/joce.2203072019 First Page 94 Last Page 97 Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License. Recommended Citation Moreno, L. (2019). Book Review: Building a Bridge: How the Catholic Church and the LGBT Community Can Enter into a Relationship of Respect, Compassion, and Sensitivity. Journal of Catholic Education. https://doi.org/10.15365/joce.2203072019
<urn:uuid:721d0d8a-0ea4-4970-85bc-ecc933c26bc6>
CC-MAIN-2024-51
https://digitalcommons.lmu.edu/ce/vol22/iss3/7/
2024-12-04T14:59:47Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00141.warc.gz
by
3.0
link_tag
true
false
null
null
null
{ "abbr": [ "by", "by", "by" ], "in_footer": [ false, false, false ], "in_head": [ true, false, false ], "location": [ "link_tag", "a_tag", "a_tag" ], "version": [ "3.0", "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.756013
WOCE Sea Level, WSL (2006): Daily sea level from coastal tide gauge station Fort_Denison in 1971 (Research quality database) [dataset]. Sea Level Center, University of Hawaii, PANGAEA, https://doi.org/10.1594/PANGAEA.427359 Always quote citation above when using data! You can download the citation in several formats below. Related to: Further details: Quality assessment of sea level data from station Fort Denison. Fort_Denison.txt Project(s): Coverage: Latitude: -33.849000 * Longitude: 151.233000 Date/Time Start: 1971-01-01T12:00:00 * Date/Time End: 1971-12-31T12:00:00 Event(s): Parameter(s): License: Creative Commons Attribution 3.0 Unported (CC-BY-3.0) Size: 365 data points
<urn:uuid:49db57bf-5124-472a-ba95-dbb35cd9c364>
CC-MAIN-2024-51
https://doi.pangaea.de/10.1594/PANGAEA.427359
2024-12-04T15:03:32Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00141.warc.gz
by
3.0
json-ld
true
false
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ false, false ], "in_head": [ true, false ], "location": [ "json-ld", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.736869
Within the ENCORE+ Quality Workshop 2 I did a short presentation about how we are dealing with quality ensurance when uploading OER to our OER-repository at Graz University of Technology. Find here my slides: This works happens within our Open Education Austria Advanced project – thanks to all to let this happen 🙂
<urn:uuid:71ed75ce-c9cd-4999-8f07-0e86beb98d77>
CC-MAIN-2024-51
https://elearningblog.tugraz.at/archives/tag/quality-ensurance
2024-12-04T14:47:38Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00141.warc.gz
by-sa
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.987763
electronic book review digital futures of literature, theory, criticism, and the arts Electronic Book Review (ebr ) is an online, open access, peer-reviewed journal of critical writing produced and published by the emergent digital literary network. ISSN: 1553-1139
<urn:uuid:42128884-6cda-44b1-a7f3-bc07f4440347>
CC-MAIN-2024-51
https://electronicbookreview.com/author_essay/author_essay-464-2110/
2024-12-04T14:39:25Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00141.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997529
start Permission Denied Sorry, you don't have enough rights to continue. Login You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. Sorry, you don't have enough rights to continue. You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in.
<urn:uuid:03b18f1e-bb46-4b74-a859-17f683c3f544>
CC-MAIN-2024-51
http://bigdigs.org/
2024-12-05T20:00:58Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00041.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.999747
Skip to Content Articles Sign In Navigation Home ≣ Vault ≣ Ratings Listening Tests Articles About Attic ][ Hall of Fame ][ Breadcrumbs SoundExpert Articles coinhive Entries with tag coinhive . Crowdfunding audio research with open and legit mining of cryptocurrency in browser Published Date 11/13/18 9:19 AM A perfectly white use case for Coinhive JS miner Read More About Crowdfunding audio research with open and legit mining of cryptocurrency in browser » By Serge Smirnoff 589769 Views, 0 Comments audio quality coinhive crowdfunding jsecoin mining monero portable players RSS (Opens New Window) Showing 1 result.
<urn:uuid:21722240-368c-4889-b92c-e0ac5a960732>
CC-MAIN-2024-51
http://soundexpert.org/articles;jsessionid=58637EDA001A82C0511FFA6058B4D8FB?p_p_id=33&p_p_lifecycle=0&p_p_state=normal&p_p_mode=view&p_p_col_id=column-1&p_p_col_count=1&p_r_p_564233524_tag=coinhive
2024-12-05T18:25:46Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00041.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.947934
December 2022 Google SEO office hours How to reduce my site from 30,000 products to 2,500? Alan: Vertical Web asks, my old site is going from 30,000 products down to 2,500. I will generate 400,000 301 redirects. Is it better to start on a clean URL and redirect what needs to be redirected to the new site or do it on an old URL? We generally recommend keeping your existing domain name where possible. We support redirecting to a new domain name as Google will recognize the 301 permanent redirect and so understand your content is moved. However, there's greater risk of losing traffic, if a mistake is made in the migration project, it is fine to clean up old pages and either have them return a 404 or redirect to new versions, even if this affects lots of pages on your site. Does Google ignore links to a page that was a 404 ? Gary: Sina is asking, it's been formerly asserted that Google ignores links to a 404 page. I want to know whether links to that page will still be ignored when it is no longer 404 . Well, as soon as a page comes back online, the links will be counted again to that page after the linking pages have been recrawled and the fillings have been deemed still relevant by our systems. Do speed metrics other than Core Web Vitals affect my site's rankings? John: If my website is failing on the Core Web Vitals, but performs excellently on GTMetrix speed test, does that affect my search rankings? Well, maybe. There are different ways to test speed, different metrics, and there's testing either on the user side or in a lab. My recommendation is to read up on the different approaches and to work out which one is appropriate for you and your website. Why doesn't Google remove all spam? Duy: Somebody asked, why does Google not remove spam web pages? Well, over the years we blogged about several spam specific algorithms that either demote or remove spam results completely. One such example is SpamBrain, our artificial intelligence system that's very good at catching spam. Sometimes for some queries where we don't have any good results to show, you might still see low quality results. If you see spam sites are still ranking, please continue to send them to us using the spam report form. We don't take immediate manual actions on user spam reports, but we do actually use the spam reports to monitor and improve our coverage in future spam updates. Thank you so much. Do too many 301 redirects have a negative effect? John: Lisa asked. I create 301 redirects for every 404 error that gets discovered on my website. Do too many 301 redirects have a negative effect on search ranking for a website? And if so, how many is too many? You can have as many redirecting pages as you want, millions is fine if that's what you need or want. That's said, focus on what's actually a problem so that you don't create more unnecessary work for yourself. It's fine to have 404 pages and to let them drop out of search, you don't need to redirect. Having 404 errors listed in Search Console is not an issue, if you know that those pages should be returning 404 . How does Google determine what is a product review? Alan: John asks, how does Google determine what is a product review for the purposes of product review updates? If it's affecting non-product pages, how can site owners prevent that? Check out our Search Central documentation on best practices for product reviews, for examples of what we recommend, including in product reviews. It is unlikely that a non-product page would be mischaracterized as a product review. And it is unlikely that it would have a significant effect on ranking, even if it was. It's more likely to be other ranking factors or algorithm changes that has impacted the ranking of your page. Should I delete my old website when I make a new one? John: I bought a Google domain that came with a free web page. I now decided to self-host my domain, and I wanted to know if I should delete my free Google page. I don't want to have two web pages. If you set up a domain name for your business and have since moved on to a new domain, you should ideally redirect the old one to the new domain, or at least delete the old domain. Keeping an old website online when you know that it's obsolete is a bad practice and can confuse both search engines and users. Should paginated pages be included in an XML sitemap? Alan: Should paginated pages such as /category?page=2 be included in an XML sitemap? It make sense for me, but I almost never see it. You can include them, but assuming each category page has a link to the next category page that may not be much benefit, we will discover the subsequent pages automatically. Also, since subsequent pages are for the same category, we may decide to only index the first category page on the assumption that the subsequent pages are not different enough to return separately in search results. My site used to be hacked, do I have to do something with the hacked pages? John: Nacho asks, we were hacked early in 2022 and still see Search Console 404 error pages from spammy pages created by the hacker. These pages were deleted from our database. Is there anything else that I should do? Well, if the hack is removed, if the security issue is resolved, and if the pages are removed, then you're essentially all set. These things can take a while to disappear completely from all reports, but if they're returning 404 , that's fine. Does Google care about fast sites? Alan: Tarek asks, does Google care about fast sites? Yes. Google measures Core Web Vitals for most sites, which includes factors such as site speed, and Core Web Vitals is used as a part of the page experience ranking factor. While it's not something that overrides other factors like relevance, it is something that Google cares about and equally important users care about it too. Can Google follow links inside a menu that shows on mouseover ? Lizzi: Abraham asks, can Google follow links inside a menu that appears after a mouseover on an item? Hey, Abraham. Great question. And yes, Google can do this. The menu still needs to be visible in the HTML and the links need to be crawlable, which means they need to be proper A tags with an href= attribute. You can use the URL inspection tool in Google Search Console to see how Google sees the HTML on your site, and check to see if the menu links are there. Hope that helps. Why did reporting shift between my mobile and desktop URLs? John: Luki asked, we use sub-domains for desktop and mobile users. We found a strange report in Search Console in early August where the desktop performance has changed inversely with the mobile performance. And the result is that our traffic has decreased. For the technical aspect of the indexing and reporting, shifting to the mobile version of a site is normal and expected. This happens with mobile first indexing and can be visible in reports if you look at the host names individually. However, assuming you have the same content on mobile and desktop, that wouldn't affect ranking noticeably. If you're seeing ranking or traffic changes, they would be due to other reason. Does having many redirects affect crawling or ranking? Gary: Marc is asking, do many redirects, let's say twice as many as actual URLs, affect crawling or ranking in any way? Well, you can have as many redirects as you like on your site overall, there shouldn't be any problem there. Just make sure that individual URLs don't have too many hops in the redirect chains, if you are chaining redirects, otherwise you should be fine. Can I use an organization name instead of an author's name? Lizzi: Anonymous is asking, when an article has no author, should you just use organization instead of person on author markup? Will this have a lesser impact on results? It's perfectly fine to list an organization as the author of an article. We say this in our article structured data documentation. You can specify an organization or person as an author, both are fine. You can add whichever one is accurate for your content. What can we do if someone copies our content? Duy: Somebody asked a competitor's copying all of our articles with small changes. In time, it ranks higher than us. DMCA doesn't stop them or seem to lower their ranking. What else can we do, their site has more authority. If the site simply scrapes content without creating anything of original value, that's clearly a violation of our spam policies, and you can report them to us using our spam report form so that we can improve our algorithms to catch similar sites. Otherwise, you can start a thread on our Search Central Help community, so product experts can advise on what would be some of the possible solutions. They would also be able to escalate to us for further assessment. Do URL, page title, and H1 tag have to be the same? Lizzi: Anonymous is asking: URL, page title, and H1 tag. Do they have to be the same? Great question, and no, they don't need to be exactly the same. There's probably going to be some overlap in the words you're using. For example, if you have a page that's titled "How to Knit a Scarf", then it probably makes sense to use some of those words in the URL too, like /how-to-knit-a-scarf or /scarf-knitting-pattern , but it doesn't need to be a word for word match. Use the descriptive words that make sense for your readers and for you when you're maintaining your site structure and organization. And that'll work out for search engines as well. Is redirecting through a page blocked by robots.txt a valid way to prevent passing PageRank? John: Sha asks, is redirecting through a page blocked by robots.txt still a valid way of preventing links from passing PageRank? If the goal is to prevent signals from passing through a link, it's fine to use a redirecting page that's blocked by robots.txt. Why is my site flagged as having a virus? Alan: Some pages in my website collect customer information, but my site is always reported as being infected via a virus or deceptive by Google. How can I avoid this happening again without removing those pages? Your site might have been infected by a virus without you knowing it. Check out web.dev/request-a-review for instructions on how to register your site in Search Console, check for security alerts, then request Google to review your site again after removed any malicious files. Some break-ins hide themselves from the site owner so they can be hard to track down Is there any way to get sitelinks on search results? Lizzi: Rajath is asking, is there any way to get sitelinks on SERPs? Good question. One thing to keep in mind is that there's not really a guarantee that sitelinks or any search feature will show up. Sitelinks specifically only appear if they're relevant to what the user was looking for, and if it'll be useful to the user to have those links. There are some things that you can do to make it easier for Google to show sitelinks. However, like making sure you have a logical site structure, and that your titles, headings, and link text are descriptive and relevant. There's more on that in our documentation on sitelinks, so I recommend checking that out. Does having two hyphens in a domain name have a negative effect? John: My site's domain name has two hyphens. Does that have any negative effect on its rankings? There's no negative effect from having multiple dashes in a domain. How important are titles for e-commerce category pages pagination? Alan: Bill asks, how important are unique page titles for e-commerce category product listing page pagination? Would it be helpful to include the page number in the title? There is a good chance that including the page number in your information about a page will have little effect. I would include the page number if you think it's gonna help users understand the context of a page. I would not include it on the assumption it'll help with ranking or increasing the likelihood of the page being indexed. Is it better to post one article a day, or many a day? John: Is it better for domain ranking to regularly post one article every day or to post many articles every day? So here's my chance to give the SEO answer: it depends. You can decide how you want to engage with your users on the downside, that means there's no absolute answer for how often you should publish. On the upside, this means that you can decide for yourself. What is the main reason for de-indexing a site after a spam update? Gary: Faiz Ul Ameen is asking what is the main reason for de-indexing of sites after the Google spam update? Well, glad you asked. If you believe you were affected by the Google Spam update, you have to take a really, really deep look on your content and, considerably improve it. Check out our spam policies, and read more about the Google spam update on Search Central. Can Google read infographic images? John: Zaid asks, can Google read infographic images? What's the best recommendation there? While it's theoretically possible to scan images for text, I wouldn't count on it when it comes to web search. If there's text that you want your pages to be recognized for, then place that as text on your pages. For infographics, that can be in the form of captions and alt texts, or just generally, well, you know, text on the page. Is it possible to remove my site completely if it was hacked? Gary: Anonymous is asking whether it's possible to completely remove a site from Google Search, because it has been hacked and leads to thousands of invalid links. Well, first and for foremost, sorry to hear that your site was hacked. Our friends at web.dev have great documentation about how to prevent this from happening in the future, but they also have documentation about how to clean up after a hack. To answer your specific question, you can remove your site from search by serving a 404 or similar status code, or by adding noindex rules to your pages. We will need to recrawl your site to see the status codes and noindex rules. But that's really the best way to do it. Why does my Search Console miss a period of data? John: I'm missing months of data from my domain property on Search Console, from April 2022. It connects directly to August 2022. What happened? This can happen if a website loses verification in Search Console for a longer period of time. Unfortunately, there is no way to get this data back. One thing you could try, however, is to verify a different part of your website and see if it shows some of the data there. How can I deindex some bogus URLs? Gary: Anonymous is asking, I want to deindex some bogus URLs. There's really only a handful ways to deindex URLs: removing the page and serving a 404 or 410 or similar status code. Or by adding a noindex rule to the pages and allowing Googlebot to crawl those pages. These you can all do on your own site. You don't need any specific tool. But Googlebot will need to recrawl those pages to see the new statuses and rules. If we are talking about only a couple pages, then you can request indexing of these pages in Search Console. Why is some structured data detected only in the schema validator? Lizzi: Frank asks, why is some structured data markup detected on the schema validator, but not on Google's rich result test? Hey Frank. This is a really common question. These tools are actually measuring different things. I think you're referencing the schema.org Markup Validator, which is checking if your syntax in general is correct, whereas the Rich Result Test is checking if you have markup that may enable you to get a rich result in Google Search. It doesn't actually check every type that's on schema.org, it only checks those that are listed in the list of structured data markup that Google supports, which is about 25 to 30 features, so it's not fully comprehensive of everything that you'd see on schema.org, for example. Do you have people who can make a website for me? John: Do you have people that I can work with to create a functioning site? Unfortunately no. We don't have a team that can create a website for you. If you need technical help, my recommendation would be to use a hosted platform that handles all of the technical details for you. There are many fantastic platforms out there now, everything from Blogger from Google, to Wix, or Squarespace, Shopify, and many more. They all can work very well with search and usually they can help you to get your site off the ground. Why are some sites crawled and indexed faster? Gary: Ibrahim is asking why are some websites crawled and indexed faster than others? This is a great question. Much of how fast a site is crawled and indexed depends on how the site is perceived on the internet. For example, if there are many people talking about the site, it's likely the site's going to be crawled and indexed faster. However, the quality of the content also matters a great deal. A site that's consistently publishing high quality content is going to be crawled and indexed faster. Why do Google crawlers get stuck with a pop-up store selector? Alan: Why do Google crawlers get stuck with a pop-up store selector? It can depend on how the store selector is implemented in HTML. Google follows a href links on a page. If the selector is implemented in JavaScript, Google might not see that the other stores exist, and so might not find the product pages for those stores. How can I verify my staging site in Search Console? Gary: Anonymous is asking if we have a staging site that is allow-listing only specific developer's IP addresses, if we upload a Search Console HTML file, which I suppose is the verification file, will Search Console be able to verify that site? Well, the short answer is no. To remove your staging site from Search, using the removal tool for site owners first you need to ensure that Googlebot can actually access the site, so you can verify it in Search Console. We publish our list of IP addresses on Search Central. So you can use that list to allow-list the IPs that belong to Googlebot so it can access the verification file. Then you can use the removal tool to remove the staging site. Just make sure that the staging site in general is serving a status code that suggests it cannot be indexed such as 404 or 410 . How can I get a desktop URL indexed? John: How can we get a desktop URL indexed? The message Search Console says page is not indexed because it's a page with a redirect. We have two separate URLs for our brand, desktop and mobile. With mobile first indexing, that's normal. Google will focus on the mobile version of a page. There's nothing special that you need to do about that, and there's no specific trick to index just the desktop version. Is it possible to report sites for stolen content? Lizzi: Christian is asking, is it possible to report sites for stolen content, such as text, original images, that kind of thing? Yes, you can report a site. Do a search for "DMCA request Google", and use the "report content on Google" troubleshooter to file a report. Is adding Wikipedia links a bad practice? John: Is adding Wikipedia links to justify the content a bad practice? Well, I'd recommend adding links to things that add value to your pages. Blindly adding Wikipedia links to your pages doesn't add value. Is there any difference if an internal link is under the word "here"? Lizzi: Gabriel is asking, is there any difference if an internal link is under the word "here" or if it is linked in a keyword? Hey Gabriel, good question. It doesn't matter if it's an internal link to something on your site or if it's an external link pointing to something else, "here" is still bad link text. It could be pointing to any page and it doesn't tell us what the page is about. It's much better to use words that are related to that topic so that users and search engines know what to expect from that link. Why does my news site's traffic go up and down? Gary: Niraj is asking, I follow the same pattern of optimization, but my news website traffic is up and down. Well, for most sites it's actually normal to have periodic traffic fluctuations. For example, seasonality effects e-commerce sites quite a bit. For news sites, specifically user interest in the topics you cover can cause fluctuations, but all in all, it is normal and not something that you have to worry about usually. Is changing the URL often impacting my SEO performance? John: Is changing the URL often impacting my SEO performance? For example, a grocery site might change a URL from /christmas/turkey-meat to /easter/turkey-meat . The page is the same, the URL is just changed with a redirect. I wouldn't recommend constantly changing URLs. At the same time, if you must change your URLs, then definitely make sure to redirect appropriately. How does freshness play a role in ranking seasonal queries like Black Friday deals? Alan: How does freshness play a role in ranking? For seasonal queries like Black Friday deals, it makes sense to update frequently as news or deals are released, but what about something less seasonal? You may decide to update a Black Friday deals page frequently to reflect the latest offers as they come out. Remember, however, that Google does not guarantee how frequently a page will be reindexed, so not all of the updates are guaranteed to be indexed. Also, a good quality page that does not change much may still be returned in search results if we think it's content is still relevant. I would recommend focusing on creating useful content and not spending too much time thinking about how to make static pages more dynamic. Is there a way to appeal SafeSearch results? John: Adam asks, is there a way to appeal SafeSearch results? I work with a client that has been blocked from their own brand term while resellers and affiliates are still appearing. So first off, I think it's important to realize that SafeSearch is not just about adult content. There's a bit of nuance involved there, so it's good to review the documentation. Should you feel that your website is ultimately incorrectly classified, there's a review request link in an article called "SafeSearch and your website" in the Search developer documentation. How can I update my site's brand name? Lizzi: Danny is asking. My site name is in search is reflecting the old domain's brand name, even with structured data and metatags. What else can I do to update this information? Hello, Danny. The site name documentation has a troubleshooting section with a list of things to check that's more detailed than what I can cover here. You want to make sure that your site name is consistent across the entire site, not just in the markup. And also check any other versions of your site and make sure that those are updated too, for example, http and https . If you're still not having any luck, go to the Search Console help forum and make posts there. The folks there can help. When migrating platforms, do URLs need to remain the same? John: Aamir asks, while migrating a website from Blogger to WordPress, do the URLs need to be the same, or can I do a bulk 301 redirect? You don't need to keep the URLs the same. With many platform migrations, that's almost impossible to do. The important part is that all old URLs redirect to whatever specific new URLs are relevant. Don't completely redirect from one domain to the home page of another. Instead, redirect on a per URL basis. How much do I have to do to update an algorithmic penalty? Duy: Johan asked if a website gets algorithmically penalized for thin content, how much of the website's content do you have to update before the penalty is lifted? Well, it's generally a good idea to clean up low quality content or spammy content that you may have created in the past. For algorithmic actions, it can take us several months to reevaluate your site again to determine that it's no longer spammy. How can I fix long indexing lead times for my Google-owned site? John: Vinay asks, we've set up Google Search Console for a Google owned website where the pages are dynamically generated. We'd like to get insights into what we should do to fix long indexing lead times. Well, it's interesting to see someone from Google posting here. As you listeners might know, my team is not able to give any Google sites SEO advice internally, so they have to pop in here like anyone else. First off, as with any bigger website, I'd recommend finding an SEO agency to help with this holistically. Within Google, in the marketing organization, there are folks that work with external SEO companies, for example. Offhand, one big issue I noticed was that the website doesn't use normal HTML links, which basically makes crawling it a matter of chance. For JavaScript sites, I'd recommend checking out the guidance in our documentation and our videos. How does the helpful content system determine that visitors are satisfied? Duy: Joshua asked, how exactly does the helpful content system determine whether visitors feel they've had a satisfying experience? We published a pretty comprehensive article called "What creators should know about Google's August 2022 helpful content update" where we outline the type of questions you can ask yourself to determine whether or not you're creating helpful content for users. Such as, are you focusing enough on people first content? Are you creating content to attract search users using lots of automation tools? Did you become an expert on a topic overnight and created many articles seemingly out of nowhere? Personally, I think not just SEOs, but digital marketers, content writers, and site owners should be familiar with these concepts in order to create the best content and experience for users. Should we 404 or noindex pages created by bots on our website? John: Ryan asks, bots have swarmed our website and caused millions of real URLs with code tacked on to be indexed on our website through a vulnerability in our platform. Should we 404 of these pages or noindex them? Either using a 404 HTTP result code or a noindex robots metatag is fine. Having these on millions of pages doesn't cause problems. Depending on your setup. You could also use robots.txt to disallow crawling of those URLs. The effects will linger in Search Console's reporting for a longer time, but if you're sure that it's fixed, you should be all set. Will adding a single post in Spanish to my English site affect my search rankings? Lizzi: Bryan asks if my site is all in English and I add a single post in Spanish, will that affect search rankings? Hey, Bryan. Sure. That's totally fine. It's not going to harm your search rankings. I also recommend checking out our guide to managing multilingual websites as there's a lot more to cover when you're thinking about publishing content in multiple languages. Do all penalties show up in Search Console? Duy: Stepan asked, in Google Search Console there exists a section called Manual Actions. Does Google show all penalties there and always notify domain owners when a domain is hit with some penalties? We have manual actions, which are issued by human reviewers and algorithmic actions, which are driven entirely by our spam algorithms such as Spambrain. We only communicate manual actions to site owners through Search Console. You can search for manual actions report. There's a page there that lists a lot of information to help you understand more about our different types of manual actions, as well as how to file a reconsideration request when you receive and already address the manual action. Will SEO decline? Should I study something different? John: Caroline asks, will SEO decline in favor of SEA and SMA? I'm starting my internship and need to know if I better redirect my path or continue on my way and specialize myself in accessibility. I'm not quite sure what SMA is, but regardless, there are many critical parts that lead to a website's and a business' success. I definitely wouldn't say that you shouldn't focus on SEO, but at the same time, it's not, well, the answer to everything. My recommendation would be to try things out. Find where your passions and your talents lie, and then try more of that. Over the years things will definitely change, as will your interests. In my opinion, it's better to try and evolve than to wait for the ultimate answer. Does the number of outgoing links affect my rankings? Duy: Jemmy asked, does the number of outgoing links both internal and external, dilute PageRank, or is PageRank distributed differently for each type of link? I think you might be overthinking several things. First of all, focusing too much on PageRank, through building unnatural links whether it violates a policy or not, takes time and effort away from other more important factors on your, such as helpful content and great user experience. Second of all, sites with internal links allowed us to discover not only new pages, but also understand your site better. Limiting them explicitly would likely do more harm than good.
<urn:uuid:5342b51b-af56-4aa3-8265-22cd999273d2>
CC-MAIN-2024-51
http://webproxy.stealthy.co/index.php?q=https%3A%2F%2Fdevelopers.google.com%2Fsearch%2Fhelp%2Foffice-hours%2F2022%2Fdecember
2024-12-05T20:14:58Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00041.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.999467
Gün, Lamiha, Assisant professor. PhD. Economics Department, Turgut Özal University, Ankara, Turkey., Turkey Reminder - How to do online submission to another Journal? - If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen: Submission Guidelines for Canadian Social Science We are currently accepting submissions via email only. The registration and online submission functions have been disabled. Please send your manuscripts to [email protected],or [email protected] for consideration. We look forward to receiving your work. Articles published in Canadian Social Science are licensed under Creative Commons Attribution 4.0 (CC-BY). Canadian Social Science Editorial Office Address: 1020 Bouvier Street, Suite 400, Quebec City, Quebec, G2K 0K9, Canada. Telephone: 1-514-558 6138 Website: Http://www.cscanada.net; Http://www.cscanada.org E-mail:[email protected]; [email protected] Copyright © Canadian Academy of Oriental and Occidental Culture
<urn:uuid:71826f5a-d934-40ff-9aef-09b9037d3bef>
CC-MAIN-2024-51
http://www.cscanada.net/index.php/css/search/authors/view?firstName=Lamiha&middleName=&lastName=G%C3%BCn&affiliation=Assisant%20professor.%20PhD.%20Economics%20Department%2C%20Turgut%20%C3%96zal%20University%2C%20Ankara%2C%20Turkey.&country=TR
2024-12-05T20:25:49Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00041.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.938312
LI, Zhanfang, Associate Professor, Ph.D.. School of Foreign Languages, North China Electric Power University, Beijing, China. Reminder - How to do online submission to another Journal? - If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen: Submission Guidelines for Canadian Social Science We are currently accepting submissions via email only. The registration and online submission functions have been disabled. Please send your manuscripts to [email protected],or [email protected] for consideration. We look forward to receiving your work. Articles published in Canadian Social Science are licensed under Creative Commons Attribution 4.0 (CC-BY). Canadian Social Science Editorial Office Address: 1020 Bouvier Street, Suite 400, Quebec City, Quebec, G2K 0K9, Canada. Telephone: 1-514-558 6138 Website: Http://www.cscanada.net; Http://www.cscanada.org E-mail:[email protected]; [email protected] Copyright © Canadian Academy of Oriental and Occidental Culture
<urn:uuid:65f8e25e-9950-4736-ae64-3b559a21c04a>
CC-MAIN-2024-51
http://www.cscanada.net/index.php/css/search/authors/view?firstName=Zhanfang&middleName=&lastName=LI&affiliation=Associate%20Professor%2C%20Ph.D..%20School%20of%20Foreign%20Languages%2C%20North%20China%20Electric%20Power%20University%2C%20Beijing%2C%20China.&country=
2024-12-05T19:57:44Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00041.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.936546
The International Society for Photogrammetry and Remote Sensing is a non-governmental organization devoted to the development of international cooperation for the advancement of photogrammetry and remote sensing and their applications. The Society operates without any discrimination on grounds of race, religion, nationality, or political philosophy. Useful Links Useful External Links Our Contact ISPRS c/o Leibniz University Hannover Institute of Photogrammetry and GeoInformation Nienburger Str. 1 D-30167 Hannover GERMANY Email: [email protected]
<urn:uuid:65314832-4a09-41e8-86db-01892553d11f>
CC-MAIN-2024-51
https://isprs-archives.copernicus.org/articles/XLVIII-4-W1-2022/187/2022/isprs-archives-XLVIII-4-W1-2022-187-2022-metrics.html
2024-12-06T21:00:45Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00841.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.958276
FAKTOR-FAKTOR YANG BERHUBUNGAN DENGAN PARTISIPASI PRIA DALAM KELUARGA BERENCANA DI KECAMATAN RUMBAI PESISIR TAHUN 2012 Abstract The man participation in family planning (FP) mean to take part in this program inspite of founding good sexual behavior for themselves and their wife. This research explore several factors which related to man participation in FP program on Rumbai Pesisir Sub district, Municipality of Pekanbaru in the year of 2012.Research design is case control study, with case is the man not participate in FP program while as control is the man whom taking part on the FP in the year of 2012. Result the man with acces difficulty to family planning program 10 times risk not to participate compared with the counterpart/control (CI 95% : OR = 5,3 – 17,9), men not supported by social and cultural aspect for family planning program 4 times risk not to participate (CI 95% : OR= 2,4 – 7,9), men with negative opinion to family palnning program 4 times risk not to participate(CI 95%: OR = 1,3 – 7,0), while the man from low income family 2 times risk not to participate (CI 95% : OR = 1,2 – 3,5) compared with their counterparts respectively. Conclusion: Multivariate analysis revealed that independent variable related to man participation , the family planning program, social and cultural aspect, opinión to family planning program and family income. Wife age is the only Independence variabel related counter directionally. Parity, education level and knowladge to family planning program are three variables not related to men participation, meanwhile family planning service quality is the confounding variable to service acces variable and social and cultural variable. Suggestion : increase quality and acces of family planning services including site of service, concellor, cost and spesific family planning promotion for mankind. Family planning and health service program is distributed to all area of Rumbai Pesisir subsdistric and to increase the support of public figure and all stake holder for Family planning program.
<urn:uuid:6be48d5a-0021-4f84-946e-d95a5484b8f2>
CC-MAIN-2024-51
https://jurnal.pkr.ac.id/index.php/JPK/article/view/33
2024-12-06T20:59:12Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00841.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.98639
1. NAME▲ spi_setup - setup SPI mode and clock rate 2. SYNOPSIS ▲ int spi_setup(struct spi_device * spi ); 3. ARGUMENTS ▲ spi the device whose settings are being modified 4. CONTEXT ▲ can sleep, and no requests are queued to the device 5. DESCRIPTION ▲ SPI protocol drivers may need to update the transfer mode if the device doesnAqt work with its default. They may likewise need to update clock rates or word sizes from initial values. This function changes those settings, and must be called from a context that can sleep. Except for SPI_CS_HIGH, which takes effect immediately, the changes take effect the next time the device is selected and data is transferred to or from it. When this function returns, the spi device is deselected. Note that this call will fail if the protocol driver specifies an option that the underlying controller or its driver does not support. For example, not all hardware supports wire transfers using nine bit words, LSB-first wire encoding, or active-high chipselects. 6. COPYRIGHT ▲
<urn:uuid:24785364-d9f6-43be-a4c1-67137e974e57>
CC-MAIN-2024-51
https://man.developpez.com/man9/spi_setup/
2024-12-06T19:25:03Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00841.warc.gz
by
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997129
You've followed a link to a topic that doesn't exist yet. If permissions allow, you may create it by clicking on Create this page. This website uses cookies. By using the website, you agree with storing cookies on your computer. Also you acknowledge that you have read and understand our Privacy Policy. If you do not agree leave the website.More information about cookies
<urn:uuid:d06394ea-04a2-47d4-b0bb-04caa3f431f0>
CC-MAIN-2024-51
https://openwrt.org/pt-br/docs/guide-developer/releases/goals/21.02
2024-12-06T20:27:42Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00841.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.999773
Mental disorders as a share of total disease burden About this data Related research and writing Sources and processing This data is based on the following sources How we process data at Our World in Data All data and visualizations on Our World in Data rely on data sourced from one or several original data providers. Preparing this original data involves several processing steps. Depending on the data, this can include standardizing country names and world region definitions, converting units, calculating derived indicators such as per capita measures, as well as adding or adapting metadata such as the name or the description given to an indicator. At the link below you can find a detailed description of the structure of our data pipeline, including links to all the code used to prepare data across Our World in Data. Reuse this work - All data produced by third-party providers and made available by Our World in Data are subject to the license terms from the original providers. Our work would not be possible without the data providers we rely on, so we ask you to always cite them appropriately (see below). This is crucial to allow data providers to continue doing their work, enhancing, maintaining and updating valuable data. - All data, visualizations, and code produced by Our World in Data are completely open access under the Creative Commons BY license. You have the permission to use, distribute, and reproduce these in any medium, provided the source and authors are credited. Citations How to cite this page To cite this page overall, including any descriptions, FAQs or explanations of the data authored by Our World in Data, please use the following citation: “Data Page: Mental disorders as a share of total disease burden”, part of the following publication: Esteban Ortiz-Ospina and Max Roser (2016) - “Global Health”. Data adapted from IHME, Global Burden of Disease. Retrieved from https://ourworldindata.org/grapher/mental-and-substance-use-as-share-of-disease [online resource] How to cite this data In-line citationIf you have limited space (e.g. in data visualizations), you can use this abbreviated in-line citation: IHME, Global Burden of Disease (2024) – with minor processing by Our World in Data Full citation IHME, Global Burden of Disease (2024) – with minor processing by Our World in Data. “Mental disorders as a share of total disease burden” [dataset]. IHME, Global Burden of Disease, “Global Burden of Disease - Deaths and DALYs” [original data]. Retrieved December 6, 2024 from https://ourworldindata.org/grapher/mental-and-substance-use-as-share-of-disease
<urn:uuid:4bf84711-9466-446d-b373-3aca8897a48b>
CC-MAIN-2024-51
https://ourworldindata.org/grapher/mental-and-substance-use-as-share-of-disease?tab=chart&country=POL
2024-12-06T20:31:32Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00841.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.987504
Tuberculosis death rate in people without HIV What you should know about this indicator Sources and processing This data is based on the following sources How we process data at Our World in Data All data and visualizations on Our World in Data rely on data sourced from one or several original data providers. Preparing this original data involves several processing steps. Depending on the data, this can include standardizing country names and world region definitions, converting units, calculating derived indicators such as per capita measures, as well as adding or adapting metadata such as the name or the description given to an indicator. At the link below you can find a detailed description of the structure of our data pipeline, including links to all the code used to prepare data across Our World in Data. Reuse this work - All data produced by third-party providers and made available by Our World in Data are subject to the license terms from the original providers. Our work would not be possible without the data providers we rely on, so we ask you to always cite them appropriately (see below). This is crucial to allow data providers to continue doing their work, enhancing, maintaining and updating valuable data. - All data, visualizations, and code produced by Our World in Data are completely open access under the Creative Commons BY license. You have the permission to use, distribute, and reproduce these in any medium, provided the source and authors are credited. Citations How to cite this page To cite this page overall, including any descriptions, FAQs or explanations of the data authored by Our World in Data, please use the following citation: “Data Page: Tuberculosis death rate in people without HIV”. Our World in Data (2024). Data adapted from World Health Organization. Retrieved from https://ourworldindata.org/grapher/tuberculosis-mortality-rates-excludes-people-who-are-also-infected-with-hiv [online resource] How to cite this data In-line citationIf you have limited space (e.g. in data visualizations), you can use this abbreviated in-line citation: World Health Organization - Global Health Observatory (2024) – processed by Our World in Data Full citation World Health Organization - Global Health Observatory (2024) – processed by Our World in Data. “Tuberculosis death rate in people without HIV” [dataset]. World Health Organization, “Global Health Observatory” [original data]. Retrieved December 6, 2024 from https://ourworldindata.org/grapher/tuberculosis-mortality-rates-excludes-people-who-are-also-infected-with-hiv
<urn:uuid:15045793-35d5-4e4e-a4cf-ba51fe5e2434>
CC-MAIN-2024-51
https://ourworldindata.org/grapher/tuberculosis-mortality-rates-excludes-people-who-are-also-infected-with-hiv?tab=chart&country=POL
2024-12-06T20:29:08Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00841.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.987982
Have you found an error? Do you have any suggestions for making our service even better or any other questions about this page? Please write to us and we'll make sure we get back to you. I hereby confirm the use of my personal data within the context of the enquiry made.
<urn:uuid:7fd8508c-909e-43d1-85d7-4b7c61e3b114>
CC-MAIN-2024-51
https://collections.mnaha.lu/fullscreen/mnha22725/1/
2024-12-07T23:16:51Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00741.warc.gz
zero
1.0
a_tag
false
false
null
null
null
{ "abbr": [ "zero" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "1.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.999219
Ann Kristine Jansen1*, Camila Dias Nascimento Rocha2, Gilberto Simeone Henriques1, Rodrigo Ribeiro dos Santos3 1Department of Nutrition, Universidade Federal de Minas Gerais, Brazil 2Pos Graduation Program, Universidade Federal de Minas Gerais, Brazil 3Department of Medicine, Universidade Federal de Minas Gerais, Brazil *Corresponding author:Ann Kristine Jansen, Department of Nutrition, Universidade Federal de Minas Gerais, Brazil Submission: July 05, 2022; Published: July 21, 2022 ISSN 2578-0093Volume7 Issue5 Reduction in the quality or quantity of Muscle Mass (MM) constitutes the current concept of sarcopenia, a condition related to functional loss [1], falls, fractures and dependence, hospitalizations, and mortality [2]. Minerals are related to the prevention of sarcopenia [3], as they influence the functions of the antioxidant system [4,5], muscle synthesis [4] and muscle contraction and relaxation [6]. Some studies [7-9] found an association between minerals and loss of muscle mass, strength, and physical performance, also suggesting a role in the treatment of sarcopenia. The role of Ca in sarcopenia has been suggested through the modulation of calpains and cysteine proteases responsible for regulating key processes in myogenesis [10]. Adequate Ca intake may be associated with lower chances of sarcopenia [8,11], but these findings are conflicting [8,9,12]. This may be due to the difference in the Ca intake of the populations studied and the serum levels of 25-hydroxyvitamin D, which were significantly lower in the studies that found an association between Ca and sarcopenia [8] than in the studies that did not, [9,12]. However, the study by Seo et al. [8] showed that after adjusting of 25-hydroxyvitamin D, Ca intake remained associated with sarcopenia [8]. Phosphorus (P) is as important as Ca in bone and muscle health. The ideal ratio of Ca: P intake is about 1:5, however, it is usually lower when there is a high consumption of processed foods [13]. A lack of P can lead to muscle weakness, and sarcopenic elderly people seem to consume less P in their diets than non-sarcopenic people [12]. A cross-sectional analysis of 7,421 subjects found an inverse association between phosphate and muscle strength in the elderly [14], but more research is needed to consolidate a link between P and muscle mass preservation. Magnesium (Mg) depletion can cause changes in muscle cells by increasing oxidative stress and decreasing intracellular Ca homeostasis [4]. A recent cross-sectional study with 396,283 participants found an inverse association between Mg intake and sarcopenia [11]. The “In CHIANTI” study found a significant and strong relationship between circulating Mg and muscle performance in the elderly [15]. The “Maastricht Sarcopenia Study” demonstrated 12% lower Mg consumption in the sarcopenic group, compared to non-sarcopenic elderly people, but without differences in serum concentrations [9]. In the study by Verlaan et al. [12], Mg intake also differed significantly between sarcopenic and non-sarcopenic individuals, and in the last two studies, dietary Mg intake in sarcopenic elderly was below the recommendation, leading to the belief that this nutrient may be important to prevent and treat sarcopenia in these individuals [12]. In a cross-sectional analysis, individuals who reported higher potassium (K) intake were associated with lower probability of developing sarcopenia [11]. K is important for the maintenance of cell membrane and the regulation of smooth, cardiac and skeletal muscle [13]. Any sudden changes in the intra and extracellular concentration of Na and K can affect muscle function. Se seems to have a positive association with muscle mass, physical performance, and sarcopenia, even if there is consumption below the recommendation and low serum concentrations [9,12]. Through selenoproteins (SelP), Se influences muscle synthesis and function, although the exact underlying mechanisms remain unclear [16]. The variation in the Se state seems to influence different cellular pathways, such as the mTOR pathway, which correlates with the aging process [17]. Se intake was lower in sarcopenic older adults compared to non-sarcopenic older adults [9,12] and associated with better results on the walk, chair, and balance test [18]. However, Chaput et al. [19] found no association between Se and muscle mass, which can be explained by the high mineral intake, which was twice the recommendation [19]. Zinc (Zn), on the other hand, is involved in metabolic, structural, catalytic, co-catalytic and regulatory functions, being an integral part of antioxidant enzymes, such as copper-zinc-superoxide dismutase [20], delaying oxidative processes, which contribute to the muscle atrophy [4,6]. Iron (Fe), due to its role in oxygen transport, in a deficiency state, it seems to reduce physical performance. But the relationship of these minerals with sarcopenia are not described in the literature. According to a recent review, possible effects of sodium (Na) on sarcopenia remain unclear because of an insufficient number of articles [7]. According to these findings, minerals have a high potential for the prevention and treatment of sarcopenia due to their numerous functions. However, the lack of intervention and case-control studies limits conclusions about their effects in this condition, especially regarding supplementation. What is clear is the low intake of these micronutrients and the association with sarcopenia. The dietary consumption of these minerals, through food, should be encouraged in elderly people. © 2022 Ann Kristine Jansen. This is an open access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and build upon your work non-commercially.
<urn:uuid:01ffcc55-6e1a-483d-b75a-9133f798e834>
CC-MAIN-2024-51
https://crimsonpublishers.com/ggs/fulltext/GGS.000674.php
2024-12-08T00:40:58Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00741.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.984105
Use email button above to contact. Our Community Norms as well as good scientific practices expect that proper credit is given via citation. Please use the data citation above, generated by the Dataverse. CC0 - "Public Domain Dedication" No guestbook is assigned to this dataset, you will not be prompted to provide any information on file download. This file has already been deleted (or replaced) in the current version. It may not be edited. Restricting limits access to published files. You can add or edit Terms of Access for the dataset, and allow people to Request Access to restricted files. The file will be deleted after you click on the Delete button. Files will not be removed from previously published versions of the dataset. Please select one or more files. Share this dataset on your favorite social media networks. Citations for this dataset are retrieved from Crossref via DataCite using Make Data Count standards. For more information about dataset metrics, please refer to the User Guide. The restricted file(s) selected may not be downloaded because you have not been granted access. You may request access to the restricted file(s) by clicking the Request Access button. Click Continue to download the files you have access to download. Are you sure you want to delete this dataset and all of its files? You cannot undelete this dataset. Are you sure you want to delete this draft version? Files will be reverted to the most recently published version. You cannot undelete this draft. Private URL can only be used with unpublished versions of datasets. Are you sure you want to disable the Private URL? If you have shared the Private URL with others they will no longer be able to use it to access your unpublished dataset. The file(s) will be deleted after you click on the Delete button. This dataset contains restricted files you may not compute on because you have not been granted access. Are you sure you want to deaccession? The selected version(s) will no longer be viewable by the public. Are you sure you want to deaccession this dataset? It will no longer be viewable by the public. Please select two versions to view the differences. Please select a file or files to be downloaded. Please select a file or files for access request. Select existing file tags or create new tags to describe your files. Each file can have more than one tag. You need to Sign Up or Log In to request access to this file. ???file.mapData.unpublished.message??? Please confirm and/or complete the information needed below in order to continue. Upon downloading files the guestbook asks for the following information. Account Information Use the Download URL in a Wget command or a download manager to download this package file. Download via web browser is not recommended. User Guide - Downloading a Dataverse Package via URL https://data.brin.go.id/api/access/datafile/ Please confirm and/or complete the information needed below in order to request access to files in this dataset. You will not be able to make changes to this dataset while it is in review. Are you sure you want to republish this dataset? Select if this is a minor or major version update. This dataset cannot be published until Publikasi Produsen Data is published by its administrator. This dataset cannot be published until Publikasi Produsen Data and Fungsi Data&BI are published. Return this dataset to contributor for modification. Copyright © 2024, Repositori Ilmiah Nasional, Badan Riset dan Inovasi Nasional RIN Dataverse Support Please fill this out to prove you are not a robot.
<urn:uuid:d2171697-c987-4203-b8e1-527bdafc3a45>
CC-MAIN-2024-51
https://data.brin.go.id/dataset.xhtml;jsessionid=0649b274e529da1163a6ed9369ae?persistentId=hdl%3A20.500.12690%2FRIN%2FJVEUYA&version=&q=&fileTypeGroupFacet=&fileAccess=Public&fileTag=&fileSortField=date&fileSortOrder=
2024-12-07T23:28:09Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00741.warc.gz
zero
1.0
json-ld
true
false
null
null
null
{ "abbr": [ "zero" ], "in_footer": [ false ], "in_head": [ true ], "location": [ "json-ld" ], "version": [ "1.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997673
Stack Exchange log in help Stack Exchange Data Explorer Home Queries Users Compose Query SELECT COUNT(Id) FROM Badges 0 Please login or register to vote for this query. (click on this box to dismiss) Q&A about the site for power users of web applications SELECT COUNT(Id) FROM Badges view current version edited nov 12 created nov 12 anonymous Enter Parameters Run Query Cancel Options: Text-only results Include execution plan Switch to main site Hold tight while we fetch your results Results [:current/:total] Messages Graph Execution Plan Download CSV Download XML :records returned in :time ms:cached help sites blog chat data legal contact us feedback Site design / logo © 2024 Stack Exchange Inc; user contributions licensed under cc by-sa ; see the licensing help page for more info rev 2023.1.23.89 Data Explorer works best with JavaScript enabled
<urn:uuid:55a0d06d-85d5-45e7-9c4b-d21927bc005b>
CC-MAIN-2024-51
https://data.stackexchange.com/meta.webapps/revision/1872831/2291007
2024-12-08T00:57:00Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00741.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.974512
Projekt „ e-Puszcza ”. Podlaskie cyfrowe repozytorium przyrodniczych danych naukowych. Use email button above to contact. Our Community Norms as well as good scientific practices expect that proper credit is given via citation. Please use the data citation above, generated by the Dataverse. No waiver has been selected for this dataset. No guestbook is assigned to this dataset, you will not be prompted to provide any information on file download. Upon downloading files the guestbook asks for the following information. Account Information Share this dataset on your favorite social media networks. Citations for this dataset are retrieved from Crossref via DataCite using Make Data Count standards. For more information about dataset metrics, please refer to the User Guide. The restricted file(s) selected may not be downloaded because you have not been granted access. Click Continue to download the files you have access to download. Are you sure you want to delete this dataset and all of its files? You cannot undelete this dataset. Are you sure you want to delete this draft version? Files will be reverted to the most recently published version. You cannot undelete this draft. Private URL can only be used with unpublished versions of datasets. Are you sure you want to disable the Private URL? If you have shared the Private URL with others they will no longer be able to use it to access your unpublished dataset. The file(s) will be deleted after you click on the Delete button. Files will not be removed from previously published versions of the dataset. This dataset contains restricted files you may not compute on because you have not been granted access. Are you sure you want to deaccession? The selected version(s) will no longer be viewable by the public. Are you sure you want to deaccession this dataset? It will no longer be viewable by the public. Please select two versions to view the differences. Please select a file or files to be downloaded. Please select a file or files for access request. Please select a file or files to be deleted. Please select unrestricted file(s) to be restricted. Please select restricted file(s) to be unrestricted. Please select a file or files to be edited. Select existing file tags or create new tags to describe your files. Each file can have more than one tag. You need to Sign Up or Log In to request access to this file. Please confirm and/or complete the information needed below in order to continue. Use the Download URL in a Wget command or a download manager to download this package file. Download via web browser is not recommended. User Guide - Downloading a Dataverse Package via URL https://dataverse.openforestdata.pl/api/access/datafile/ Please confirm and/or complete the information needed below in order to request access to files in this dataset. You will not be able to make changes to this dataset while it is in review. Are you sure you want to publish this dataset? Once you do so it must remain published. This dataset cannot be published until Otwarte dane OFD is published. Would you like to publish both right now? Once you publish this dataset it must remain published. Are you sure you want to republish this dataset? Select if this is a minor or major version update. This dataset cannot be published until Otwarte dane OFD is published by its administrator. This dataset cannot be published until Otwarte dane OFD and Bazy danych IBS PAN / MRI PAS databases are published. Return this dataset to contributor for modification. Copyright © 2024 openforestdata.pl Support Please fill this out to prove you are not a robot.
<urn:uuid:91ff7881-0f21-4385-a5af-492dc965a064>
CC-MAIN-2024-51
https://dataverse.openforestdata.pl/dataset.xhtml;jsessionid=ddcc949894420eec7dff7f26560f?persistentId=doi%3A10.48370%2FOFD%2FDVQWUV&version=&q=&fileTypeGroupFacet=%22Unknown%22&fileAccess=Public&fileSortField=date
2024-12-08T01:00:32Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00741.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by", "by", "by", "by", "by", "by" ], "in_footer": [ false, false, false, false, false, false ], "in_head": [ false, false, false, false, false, false ], "location": [ "a_tag", "a_tag", "a_tag", "a_tag", "a_tag", "a_tag" ], "version": [ "4.0", "4.0", "4.0", "4.0", "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997944
In his speech, Vladimir Putin spoke of the need to give more attention to the quality of Russia’s military-technical cooperation with foreign partners. The President said that in view of the recent terrorist attacks on the United States and many countries’ efforts to unite forces in the fight against terrorism, military-technical cooperation acquired special significance. It is important not only to maintain a high quality of Russian hardware but also to ensure a proper level of servicing it.
<urn:uuid:a60712a2-40e1-41a1-91cf-508a261b0108>
CC-MAIN-2024-51
http://en.kremlin.ru/events/president/news/40549/print
2024-12-09T04:23:56Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.998958
- hbeetham joined the session A Strategy to Conduct OER Qualification Measures for University Lecturers [1537] 7 years, 8 months ago - Home - OER18 - Programme - Participate - News - Our Supporters - About - Conference Themes - Keynote Speakers - Plenary Panelists - Meet the co-chairs - Meet the Conference Committee - Call for Proposals [now closed] - Sponsorship and Exhibition - Financial assistance - Guidelines for Presenters and Session Chairs - Guidelines for Reviewers - Venue and Travel Information - Registration - Terms of Use - Help
<urn:uuid:42ad1a7b-777d-4df5-a125-8de3ec878d5c>
CC-MAIN-2024-51
http://oer17.oerconf.org/participants/hbeetham/activity/897/
2024-12-09T03:41:12Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.723855
Selected Tags Click on a tag to remove itMore Tags Click on a tag to add it and filter downAndroid-library packages Showing projects tagged as Views, UI Widget, Android, Layout Widget, Custom View, and Android-library - - - - - - - - - - 1.3 0.0 JavaA really simple library that help you to display a custom toast with many colors (for : success, warning, danger, info, dark, light, primary...etc ), or with rounded corners, or event with image. -
<urn:uuid:55e8076e-6f1a-4090-9142-ae2f7ded4cc4>
CC-MAIN-2024-51
https://android.libhunt.com/packages/views/ui-widget/android/layout-widget/custom-view/android-library
2024-12-09T04:08:13Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.98811
BackgroundFetchFailEvent class Null safety Constructors Properties - bubbles → bool? - read-only, inherited - cancelable → bool? - read-only, inherited - composed → bool? - read-only, inherited - currentTarget → EventTarget? - read-only, inherited - defaultPrevented → bool - read-only, inherited - eventPhase → int - read-only, inherited - fetches → List< BackgroundFetchSettledFetch> ? - read-only - hashCode → int - The hash code for this object. [...] read-only, inherited - id → String? - read-only, inherited - isTrusted → bool? - read-only, inherited - matchingTarget → Element - A pointer to the element whose CSS selector matched within which an event was fired. If this Event was not associated with any Event delegation, accessing this value will throw an UnsupportedError. read-only, inherited - path → List< EventTarget> - read-only, inherited - runtimeType → Type - A representation of the runtime type of the object. read-only, inherited - target → EventTarget? - read-only, inherited - timeStamp → num? - read-only, inherited - type → String - read-only, inherited Methods - composedPath( ) → List< EventTarget> - inherited - noSuchMethod( Invocation invocation) → dynamic - Invoked when a non-existent method or property is accessed. [...] inherited - preventDefault( ) → void - inherited - stopImmediatePropagation( ) → void - inherited - stopPropagation( ) → void - inherited - toString( ) → String - Returns a string representation of this object. inherited - waitUntil( Future f) → void - inherited
<urn:uuid:c4e8e9a6-0564-4506-bc87-fe16b31b0fb9>
CC-MAIN-2024-51
https://api.dart.dev/stable/2.10.4/dart-html/BackgroundFetchFailEvent-class.html
2024-12-09T05:03:19Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.975422
First time here? Check out the FAQ! Sign in English tags users badges ALL UNANSWERED Ask Your Question Give us your feedback! Dear Visitor , we look forward to hearing your feedback. Please type and send us your message below. Your name (optional): Email: I don't want to give my email or receive a response: Please note: Askbot requires javascript to work properly, please enable javascript in your browser, here is how
<urn:uuid:64aef0bb-e7da-474d-b58a-7fda7883080a>
CC-MAIN-2024-51
https://askbot.org/en/feedback/?next=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJuZXh0X3VybCI6Ii9lbi9xdWVzdGlvbi8yODU2L2Nhbi1pLXVzZS1teXNxbC1pbm5vZGIvIn0.97k-4RyxFhEYSfMGtQel72ZAg6CtAcn8uKgC1-pq7l4
2024-12-09T04:56:36Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by-sa
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.99709
Public Lab is an open community which collaboratively develops accessible, open source, Do-It-Yourself technologies for investigating local environmental health and justice issues. close | All topics » If you cannot use the ReCaptcha to verify you are not a bot, use this alternative verification. By signing up, you agree to the Code of Conduct, which applies to all online and in-person spaces managed by the Public Lab community and non-profit. You also agree to our Privacy Policy. As an open source community, we believe in open licensing of content so that other members of the community can leverage your work legally -- with attribution, of course. By joining the Public Lab site, you agree to release the content you post here under a Creative Commons Attribution Sharealike license, and the hardware designs you post under the CERN Open Hardware License 1.1 (full text). This has the added benefit that others must share their improvements in turn with you. or sign up to join the Public Lab community Forgot your password? Reset it here Follow related tags: Follow
<urn:uuid:c7254c6f-8638-433f-83e7-dd4fa15905d7>
CC-MAIN-2024-51
https://stable.publiclab.org/questions/tag/spectrometry-turbidity
2024-12-09T04:04:22Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by-sa
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa", "by-sa", "by-sa", "by-sa" ], "in_footer": [ true, true, false, false ], "in_head": [ false, false, false, false ], "location": [ "a_tag", "a_tag", "a_tag", "a_tag" ], "version": [ "3.0", "3.0", "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.99832
Show your appreciation to this photographer by linking back to their work and improving their exposure on StockSnap. Photo by Matt Bango on StockSnap By signing up, you agree to the Terms & Conditions and Privacy Policy. You'll also receive our newsletter, which you can unsubscribe to at any time. Please enter the email address you provided during registration and we'll send you instructions on how to reset your password. We'll be sending you an email shortly with instructions on how to reset your password. This request will expire in 24 hours. Please be sure to check your spam folder. Enter your email and we’ll send you our most popular photos every week straight to your inbox. We can't seem to reach the server to continue with your request. Please reload the page and try again.
<urn:uuid:7553885a-1712-4a15-a7ae-84149a24c561>
CC-MAIN-2024-51
https://stocksnap.io/photo/feet-beach-XYSEJHZL8M
2024-12-09T04:46:20Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
zero
1.0
json-ld
true
false
null
null
null
{ "abbr": [ "zero", "zero" ], "in_footer": [ false, false ], "in_head": [ true, false ], "location": [ "json-ld", "a_tag" ], "version": [ "1.0", "1.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.998031
First you need to teach the Live Image Environment how to speak ZFS Code: sudo su - apt install -y zfsutils-linux Then find out what ZFS pools can be imported Code: zpool export -a zpool import Doing that command will list all pools that are not already imported. Lets say the pool you wanted to use was MyPool. Then to import it Code: zpool import -f -N -R /mnt MyPool Repeat that for any other pools that you want to mount... Then list the dataset structure Let's say your recognise the base dataset structure as something like Code: zfs list MyPool/DATA/ubuntu_2404 Then you would do Code: zfs mount MyPool/DATA/ubuntu_2404 zfs mount -a You should now be able to access any files within that pool's filesystem, under the /mnt folder. Note thatthose instructions are just to access the files, not to repiar an OS within that, which would then take chrooting into that filesystem.
<urn:uuid:e27b3b56-bcc4-44ae-9aa0-36ed2c3a9f3d>
CC-MAIN-2024-51
https://ubuntuforums.org/showthread.php?t=2497377&s=4ba19444ade8dccfa7bf0abfde035883&p=14188538
2024-12-09T05:30:04Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.995256
Frings, D., Albery, I. P., Kimber, C., Naughton, F., Sideropoulos, V. and Dawkins, L. (2024) Change in vaping, smoking and dual‐use identities predicts quit success and cigarette usage: A prospective study of people quitting smoking with electronic cigarette support. British Journal of Health Psychology, 29 (4). pp. 877-888. ISSN 1359-107X Preview | PDF (Frings_etal_2024_BritishJHealthPsychol) - Published Version Available under License Creative Commons Attribution. Download (360kB) | Preview | Abstract Objective: Electronic cigarettes (ECs) are an efficacious support for some but not all people wishing to stop using tobacco. While advice and practical support have been identified as increasing quit success, little research has explored the role of changes in smoking and EC-related social identities. Methods: A prospective study following 573 people attempting to quit smoking with EC support. Self-report measures of identification with being a smoker, non-smoker, vaper and dual user (people using ECs and tobacco products) were taken prior to the quit attempt and at a 12-week follow-up. Results: Baseline identifications with being a smoker, non-smoker or dual user were not associated with smoking outcomes. Baseline vaper identity baseline was linked to more frequent tobacco abstinence at follow-up and lower levels of cigarette smoking. Levels of social identification at follow-up were consistently linked with outcomes, with vaper identity and non-smoking identities being protective and dual user identity being related to lower abstinence rates but decreased tobacco usage. Changes in identity over time were the most consistent predictor of outcomes. Conclusions: Findings have implications for smoking cessation practice, informing how and when identity-based interventions may be effective and our understanding of how identity transitions occur. Item Type: | Article | ---|---| Additional Information: | Funding information: This study was funded by the Medical Research Council ] (MRC/PHIND; Grant ref: MR/T002352/1). Data availability statement: Data are available via London South Bank University Open Research (https://openresearch.lsbu.ac.uk/). The analysis was not pre-registered. | Faculty \ School: | Faculty of Medicine and Health Sciences > School of Health Sciences | Depositing User: | LivePure Connector | Date Deposited: | 12 Jul 2024 08:31 | Last Modified: | 13 Nov 2024 00:52 | URI: | https://ueaeprints.uea.ac.uk/id/eprint/95890 | DOI: | 10.1111/bjhp.12735 | Downloads Downloads per month over past year Actions (login required) View Item |
<urn:uuid:cd6160e2-5a9c-47fb-a4b4-c91c2d901b8e>
CC-MAIN-2024-51
https://ueaeprints.uea.ac.uk/id/eprint/95890/
2024-12-09T05:12:16Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.955579
Photographs - The Wellcome Trust Centre for the History of Medicine at UCL - Date: - 1997 - Reference: - GC/253/A/2/4/4 - Part of: - Wellcome Witnesses to Twentieth Century Medicine Seminars - Archives and manuscripts Collection contents About this work Description File consists of contact sheets only (no photographs) taken at the seminar on ,"The M.R.C. Common Cold Unit", which was held at the Wellcome Institute on 13 May 1997. The seminar was part of the Wellcome Witnesses to Twentieth Century Medicine meetings also known as the Witness Seminars. The transcript of this seminar was published with three other seminars in Volume 2 of the Witness Seminar series, E.M. Tansey, D.A. Christie, L.A. Reynolds (editors), Making the Human Body Transparent: The Impact of N.M.R. and M.R.I.; Research in General Practice; Drugs in Psychiatric Practice; The M.R.C. Common Cold Unit, (London: Wellcome Trust, 1998). Contact sheets (copyright Wellcome Centre Medical Photographic Library) are pictures of the participants and audience and include: Contact sheets C038271 and C038272. Publication/Creation Physical description Where to find it Location Status Access Closed stores Permanent link Identifiers Accession number - 809
<urn:uuid:ab93f2b2-0479-4cc8-9743-695a30426cb7>
CC-MAIN-2024-51
https://wellcomecollection.org/works/radf33ug
2024-12-09T04:11:00Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.944675
UPGRADE 100 and How to Web are organizing a meetup in Bucharest on the 27th of November, bringing together ambitious founders from the Romanian startup ecosystem, international investors, product experts, […] This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT Privacy & Cookies Policy Privacy Overview This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience. Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
<urn:uuid:e07333c6-c62f-4024-a3c6-0dfecbb17c45>
CC-MAIN-2024-51
https://www.adhugger.net/tag/amcham-romania/
2024-12-09T03:35:41Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by-sa
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.999378
Holbrook, S., Rassweiler, A., Lauer, M. (2017) Coral reef fishery household survey, Moorea, French Polynesia, 2014-2015. Biological and Chemical Oceanography Data Management Office (BCO-DMO). Version Date 2017-01-30 [if applicable, indicate subset used]. http://lod.bco-dmo.org/id/dataset/676105 [access date] If you wish to use this dataset, it is highly recommended that you contact the original principal investigators (PI). Should the relevant PI be unavailable, please contact BCO-DMO ([email protected]) for additional guidance. For general guidance please see the BCO-DMO Terms of Use document.
<urn:uuid:f5ae4830-5779-4ca0-bb6d-84c9b52ebc20>
CC-MAIN-2024-51
https://www.bco-dmo.org/dataset/676105
2024-12-09T04:17:33Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.733153
Kachina Doll (Hoho?) Arts of the Americas MEDIUM Wood, feathers, wool, string, pigment DATES late 19th century DIMENSIONS 8 9/16 × 2 15/16 × 2 5/16 in. (21.7 × 7.5 × 5.9 cm), without feathers (show scale) ACCESSION NUMBER 04.297.5561 CREDIT LINE Museum Expedition 1904, Museum Collection Fund MUSEUM LOCATION This item is not on view CAPTION Hopi Pueblo. Kachina Doll (Hoho?), late 19th century. Wood, feathers, wool, string, pigment, 8 9/16 × 2 15/16 × 2 5/16 in. (21.7 × 7.5 × 5.9 cm), without feathers. Brooklyn Museum, Museum Expedition 1904, Museum Collection Fund, 04.297.5561. Creative Commons-BY (Photo: Brooklyn Museum, CUR.04.297.5561_front.jpg) IMAGE front, CUR.04.297.5561_front.jpg. Brooklyn Museum photograph, 2011 "CUR" at the beginning of an image file name means that the image was created by a curatorial staff member. These study images may be digital point-and-shoot photographs, when we don\'t yet have high-quality studio photography, or they may be scans of older negatives, slides, or photographic prints, providing historical documentation of the object. RIGHTS STATEMENT Creative Commons-BY You may download and use Brooklyn Museum images of this three-dimensional work in accordance with a Creative Commons license. Fair use, as understood under the United States Copyright Act, may also apply. Please include caption information from this page and credit the Brooklyn Museum. If you need a high resolution file, please fill out our online application form (charges apply). For further information about copyright, we recommend resources at the United States Library of Congress, Cornell University, Copyright and Cultural Institutions: Guidelines for U.S. Libraries, Archives, and Museums, and Copyright Watch. For more information about the Museum's rights project, including how rights types are assigned, please see our blog posts on copyright. If you have any information regarding this work and rights to it, please contact [email protected]. RECORD COMPLETENESS Not every record you will find here is complete. More information is available for some works than for others, and some entries have been updated more recently. Records are frequently reviewed and revised, and we welcome any additional information you might have.
<urn:uuid:9a5d5156-4033-4610-b989-e46f36084a0f>
CC-MAIN-2024-51
https://www.brooklynmuseum.org/opencollection/objects/17025
2024-12-09T04:02:26Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.977618
Imagine being able to choose or build the algorithm that drives your X or LinkedIn post feed. That’s what this is! To experiment with custom feeds, I’ve built the Network Nook. Over the last few weeks I’ve been adjusting the ‘algorithm’, which currently consists of terms with scores that match the post content and tags. After a few fun mistakes (giving ‘isis’ a high score doesn’t work so well) the signal to noise ratio is now to a point that I find the feed interesting and useful. For the details on how custom feeds work and sample code go to the AT Protocol website but here’s the TL;DR: - Subscribe to the post firehose (yes, the full post firehose is part of the open nature of AT Protocol). - Filter the posts based on an algorithm of your choice. - Expose an HTTP endpoint that provides a list of the posts IDs that the algorithm matched. - The user’s PDS and the AppView (AT Protocol terms) hydrate the post IDs into content and build the feed. The service that provides Network Nook lives on my VM but feels every bit as core to BlueSky as the main Following and Discover feeds. I started down this path building everything from scratch. It’s surprisingly simple but part way in I found Supercell. With Supercell’s embedded RHAI scripts I’ve been able to do what I’ve needed so far. There are also several no-code ways to create feeds: And probably more… there’s a lot of innovation happening in the AT Protocol ecosystem. Next I want to add multi-term matches and something like the test tube icon the Science Feed uses to enable users to target the feed. Between the pure timeline-based “Following” feed, much more transparency by being built on an open foundation and choice enabled by features like custom feeds, it feels like BlueSky has the foundation to be a better, and less easily abused [1] social network. Semi-related, Character Limit is a great read. Definitely worth your time. [1] – Seriously, who wouldn’t feel bad cheating like that?
<urn:uuid:ab914931-8aca-427d-aa68-3009aed20f1e>
CC-MAIN-2024-51
https://www.coverfire.com
2024-12-09T04:01:46Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00641.warc.gz
by-sa
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.999016
Skip to content www.gov.nt.ca Contact Search Datasets Open Data Toggle navigation Datasets Groups About Log in Home Datasets Order by Relevance Name Ascending Name Descending Last Modified Go 1 dataset found Formats: HTML Tags: gender health physical activity Organizations: Bureau of Statistics Filter Results Health Behaviour Indicators, Aged 15 and Over (Smoking, Alcohol Use & Physica... Health Behaviour Indicators, Aged 15 and Over (Smoking, Alcohol Use & Physical Activity) HTML You can also access this registry using the API (see API Docs ).
<urn:uuid:2471b7aa-f2df-4727-ae41-21ccf3b69139>
CC-MAIN-2024-51
https://opendata.gov.nt.ca/dataset/?res_format=HTML&tags=gender&tags=health&tags=physical+activity&organization=bureau-of-statistics
2024-12-10T09:48:03Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00765.warc.gz
by
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.791781
Show pagesourceOld revisionsBacklinksBack to top × Keenetic Techdata + Device pages ↓ Techdata pageDevice pageTechdata: Keenetic 4G (KN-1210)Techdata: Keenetic 4G (KN-1211)Techdata: Keenetic Explorer (KN-1613)Techdata: Keenetic Speedster (KN-3010)Techdata: Keenetic Start (KN-1110)Techdata: Keenetic Start/Starter (KN-1111) This website uses cookies. By using the website, you agree with storing cookies on your computer. Also you acknowledge that you have read and understand our Privacy Policy. If you do not agree leave the website.OKMore information about cookies Last modified: 2024/03/06 05:10by raylynnknight
<urn:uuid:91e95246-5b14-4244-b61b-aef5f47f7c46>
CC-MAIN-2024-51
https://openwrt.org/toh/hwdata/keenetic/start
2024-12-10T07:48:23Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00765.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.882503
In particular, we learn a joint embedding of raw house attributes, geo-spatial neighborhood, and most importantly from textual description and images representing the house; and finally use a downstream regression model to predict the house price from this jointly learned embedding vector. In this paper, we develop a framework to generate faithful and salient text from mixed-modal data, which includes images and structured data ( represented in knowledge graphs or tables). In this paper, we introduce a new approach to code generation tasks leveraging multi-agent prompting that uniquely replicates the full cycle of program synthesis as observed in human developers. Ranked #1 on Code Generation on MBPP With the advent of deep learning-based methods, different sophisticated techniques have been proposed for text detection and text recognition from the natural scene. By using these Word2vec graph based features, we perform classification to perform author attribution and genre detection tasks. Social structures and real-world incidents often influence contemporary literary fiction. Knowledge Graph (KG)-to-Text generation aims at generating fluent natural-language text that accurately represents the information of a given knowledge graph. In this paper, we propose a novel contrastive learning based deep learning framework for patient similarity search using physiological signals. In this paper, we propose a novel deep learning approach, Seismic Contrastive Graph Neural Network (SC-GNN), for highly accurate seismic intensity prediction using a small portion of initial seismic waveforms from a few seismic stations. A specialized BERT model named BSpell has been proposed in this paper targeted towards word for word correction in sentence level. We achieve the above edge by formulating a multi-objective custom loss function that does not need ground truth labels to quantify the quality of a given data-space partition, making it entirely unsupervised. Though there has been a large body of recent works in language modeling (LM) for high resource languages such as English and Chinese, the area is still unexplored for low resource languages like Bengali and Hindi. In this paper, we propose a deep learning-based framework, called DeepAltTrip, that learns to recommend top-k alternative itineraries for given source and destination POIs. Our work categorizes and critically analyzes the recent POI recommendation works based on different deep learning paradigms and other relevant features. Smartwatches or fitness trackers have garnered a lot of popularity as potential health tracking devices due to their affordable and longitudinal monitoring capabilities. Extensive experiments with a large number of regression techniques show that the embeddings produced by our proposed GSNE technique consistently and significantly improve the performance of the house price prediction task regardless of the downstream regression model. Motivated by this, in this paper, we present a user study conducted on the road networks of Melbourne, Dhaka and Copenhagen that compares the quality (as perceived by the users) of the alternative routes generated by four of the most popular existing approaches including the routes provided by Google Maps. In this paper, we introduce a new variant of crowd counting problem, namely "Categorized Crowd Counting", that counts the number of people sitting and standing in a given image. We introduce a novel keyword-aware influential community query KICQ that finds the most influential communities from an attributed graph, where an influential community is defined as a closely connected group of vertices having some dominance over other groups of vertices with the expertise (a set of keywords) matching with the query terms (words or phrases). Being motivated by the success of CNNs in image classification, deep learning based approaches have been developed in this paper for detecting diseases and pests from rice plant images.
<urn:uuid:eb1e0562-2405-4ba4-bf2e-8bb03a6aed65>
CC-MAIN-2024-51
https://paperswithcode.com/search?q=author%3AMohammed+Eunus+Ali
2024-12-10T09:33:17Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00765.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.996647
Data Updated: 6 November 2023 This collection of the National Library of Italy in Florence (partner of the Europeana Collections 1914-1918 project), comprises material from the First World War period: mostly newspapers, but also monographs and propaganda material. Data Updated: 6 November 2023 Percy Benzie Abery's digitised photographic collection includes The Builth Wells Historical Pageant photograph album of approximately 160 photographs, newspaper cuttings and other ephemera of the majestic pageant which was performed at the grounds of Llanelwedd Hall on 11 August 1909.
<urn:uuid:79d9c04d-e575-4437-b1c1-4e0018418040>
CC-MAIN-2024-51
https://pro.europeana.eu/index.php/tags/social-history?page=1&page_data=1
2024-12-10T08:38:08Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00765.warc.gz
by-sa
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.982898
Creating a Docker Exporter Project¶ Create a Docker project if you want to deploy your integration solutions inside a Docker environment. This project directory allows you to package multiple integration projects into a single Docker image and then build and push to the Docker registries. Tip If you want to simultaneously create all the projects required for your use case, read about the integration project solution. Prerequisites¶ Creating the Docker project¶ Follow the steps given below. - Open WSO2 Integration Studio and click Miscellaneous → Create Docker Exporter Project in the Getting Started view as shown below. - In the New Docker Project dialog that opens, enter a name for the Docker project and other parameters as shown below. Enter the following information: Parameter Description Docker Project Name Required. Give a name for the Docker project. Base Image Repository Required. Select the base Micro Integrator Docker image for your solution. Use one of the following options: - wso2/wso2mi: This is the community version of the Micro Integrator Docker image, which is stored in the public WSO2 Docker registry. This is selected by default. - docker.wso2.com: This is the Micro Integrator Docker image that includes product updates. This image is stored in the private WSO2 Docker registry. Note that you need a valid WSO2 subscription to use the Docker image with updates. - You can also use a custom Docker image from a custom repository. Base Image Tag Required. Specify the tag of the base image that you are using. Target Image Repository Required. The Docker repository to which you will later push this Docker image. - If your repository is in Docker Hub, use the docker_user_name/repository_name format. - If you are using any other repository, use the repository_url/repository_user_name/repository_name forrmat. Target Image Tag Required. Give a tag name for the Docker image. Environment Variables You can enter multiple environment variables as key-value pairs. - Optionally, click Next and configure Maven details for the Docker project. - Click Finish. The Docker project is created in the project explorer. - This step is only required if you already have a Docker image (in your local Docker repository) with the same name as the base image specified above. Info In this scenario, WSO2 Integration Studio will first check if there is a difference in the two images before pulling the image specified in the Base Image Repository field. If the given base image is more updated, the existing image will be overwritten by this new image. Therefore, if you are currently using an older version, or if you have custom changes in your existing image, they will be replaced. To avoid your existing custom/older images from being replaced, add the following property under dockerfile-maven-plugin -> executions -> execution -> configurations in the pom.xml file of your Docker Exporter project. This configuration will ensure that the base image will not be pulled when a Docker image already exists with the same name.<pullNewerImage>false</pullNewerImage> The Docker project directory¶ Expand the Docker Exporter Project in the project explorer. See that the following folders and files are created: Directory | Description | ---|---| Libs | This folder stores libraries that should be copied to the Docker image. During the build time, the libraries inside this directory will be copied to the image. | Resources | This folder stores additional files and resources that should be copied to the Docker image. During the build time, the resources inside this directory will be copied to the image. | deployment.toml | The product configuration file. | Dockerfile | The Dockerfile containing the build details. | pom.xml | The file for selecting the relevant composite applications that should be included in the Docker image. This information is also used when you later build and push Docker images to the Docker registries. | Build Docker images¶ Info Before you begin: - If you are using a Micro Integrator Docker image from a private registry as your base image: - Open a terminal and use the following command to log in to Docker: docker login -u username -p password - In the next step, specify the name of the private Docker registry. - Open a terminal and use the following command to log in to Docker: Follow the steps given below. - Open the pom.xml file inside the Docker project and click Refresh on the top-right. Your composite application project with integration artifacts will be listed under Dependencies as follows: - Select the composite applications that you want to package inside the Docker image. - If required, you can update the Target Repository to which the image should be pushed and the Target Tag. - Save the POM file and click Build to start the Docker image build. - It will build the Docker image based on the Dockerfile and the Target details. When the image is created, the following message will display.
<urn:uuid:768e091f-0ddd-427f-8aa9-231dd8719719>
CC-MAIN-2024-51
https://ei.docs.wso2.com/en/7.0.0/micro-integrator/develop/create-docker-project/
2024-12-11T13:47:15Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00665.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.996896
Electronic Literature Knowledge Base Contribute to the Knowledge Base The ELMCIP Knowledge Base is a research resource for electronic literature and it is open for new contributions and submissions. It provides cross-referenced, contextualized information about authors, creative works, critical writing, platforms, and practices. Current contributors should log in to the knowledge base to enter new records. The ELMCIP Knowledge Base depends on the active participation of a community of international researchers and writers working on electronic literature. To join us in building the Knowledge Base, sign up for an account we can set you up with a contributor account to add and edit records. The Knowledge Base is developed in Drupal 7 by the University of Bergen Electronic Literature Research Group as an outcome of the ELMCIP project. Browse Creative Works Title | Author | Year | Updated | Tags | ---|---|---|---|---| Night Walk for Edinburgh | Janet Cardiff, George Bures Miller | 2019 | 11.01.2024 | audiovisual walk, locative listening, gender identity, night, darkness | Re:Cycle III | Jim Bizzocchi | 2014 | 03.06.2016 | ambient, image, sequential art, motion, computational, generative video, meaning, video clips, video transitions, computational engine, nature, mountains, rivers, ice, snow, waterfalls, trees, attention, visual pleasure, semantic coherence, tags | Remixing Shakespeare : Witch Hunts! Power Plays! & Uses of Adversity. A Netprov in Three Acts | Joellyn Rock | 2016 | 03.04.2024 | Video vignettes, William Shakespeare, power-play, netprov | Riveted, Structures, Lands | Lands Brenda Gel | 2019 | 21.02.2024 | animations, stop motion, blueprints, rivered, structures, lands | Rolled Hem or Nadine | Christy Sheffield Sanford | 01.02.2024 | horror, multimedia | Critical Writing Title | Author | Publication Type | Appears in | Updated | Year | ---|---|---|---|---|---| Reveal Codes: Hypertext and Performance | Rita Raley | Article in an online journal | 27.09.2016 | 2001 | | Revealing Noise: The Conspiracy of Presence in Alternate Reality Aesthetics | Adam Pilkey | Article or chapter in a book | Post-Digital: Dialogues and Debates from electronic book review. Volume 2 | 24.09.2019 | | Reversed Remediation. A Critical Display of the Workings of Media in Art | Saskia Korsten | Conference paper or presentation | 27.09.2016 | 2011 | | Reversed Remediation. How Art Can Make One critically Aware of the Workings of Media | Saskia Korsten | Conference paper or presentation | 27.09.2016 | 2011 | | Review of A Companion to Digital Literary Studies | Scott Hermanson | Review | 27.09.2016 | 2009 | Teaching Resources Title | Author | Type of Resource | Updated | ---|---|---|---| Artist-Screencast with Stephanie Strickland on "Errand Upon Which We Came" | Stephanie Strickland, Patricia Tomaszek | Video tutorial or lesson | 20.02.2014 | Authoring 2.0: Writing Digital Culture (ENGL 5380-001) | Carolyn Guertin | Syllabus | 28.03.2012 | Authoring Software | Judy Malloy | Other Teaching Resource | 23.04.2015 | Chapter 3: Hypertext Fiction | Paul Amore | Other Teaching Resource | 28.06.2013 | Choose Your Own Adventure Assignment | Matthew G. Kirschenbaum | Exercise | 16.09.2012 |
<urn:uuid:b2c02326-c4c1-44f8-abb6-d37740ad9a7f>
CC-MAIN-2024-51
https://elmcip.net/Knowledgebase?order=title&sort=asc&page=1%2C0%2C719
2024-12-11T13:44:43Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00665.warc.gz
by-sa
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.665948
Do you know the meaning of zurich? , on Lake Zurich. Word in 6 letters. This definition of the word Zurich is from the Wiktionary, where you can also find the etimology, other senses, synonyms, antonyms and examples. The word Zurich has 1 anagram. The word Zurich spelled backward is hciruz which is not a word. All fields are optional and can be combined. You can search for words that have known letters at known positions, for instance to solve crosswords and arrowords. Lots of Words is a word search engine to search words that match constraints (containing or not containing certain letters, starting or ending letters, and letter patterns). You can use it for many word games: to create or to solve crosswords, arrowords (crosswords with arrows), word puzzles, to play Scrabble, Words With Friends, hangman, the longest word, and for creative writing: rhymes search for poetry, and words that satisfy constraints from the Ouvroir de Littérature Potentielle (OuLiPo: workshop of potential litterature) such as lipograms, pangrams, anagrams, univocalics, uniconsonantics etc. Please note: the Wiktionary contains many more words - in particular proper nouns and inflected forms: plurals of nouns and past tense of verbs - than other English language dictionaries such as the Official Scrabble Players Dictionary (OSPD) from Merriam-Webster, the Official Tournament and Club Word List (OTCWL / OWL / TWL) from the National Scrabble Association, and the Collins Scrabble Words used in the UK (about 180,000 words each). LotsOfWords knows 480,000 words.
<urn:uuid:df375116-2abb-4b20-8896-19c1fcc1c0e3>
CC-MAIN-2024-51
https://endehors.net/definition/Zurich
2024-12-11T13:11:45Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00665.warc.gz
by-sa
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.996738
Petition is successful with 2,931 signatures To: The General Practitioners Committee and the British Medical Association NHS Healthcare: No charge at the point of use 01/06/14 - Well done all! the GPC rejected the motion for GP fees and it has not been carried over to the BMC ARM in June, you can see the full agenda here: http://bma.org.uk/working-for-change/arm-2014-info/agenda At the Conference of Representatives of Local Medical Committees in York on May 22nd 2014, Wiltshire LMC will ask you to vote on the motion that claims ‘it is no longer viable for general practice to provide all patients with all NHS services free at the point of delivery’. We, your patients, ask that you reject any motions to introduce appointment charges of £10, £25 or any other figure. If this motion is upheld, the BMA will then vote on whether to make it policy or not at its Annual Representative Meeting in June. If that vote succeeds it may increase the rapid degeneration of the NHS, currently free at the point of use, built and paid for by the people for the people. We understand that the NHS is currently being asset stripped and actively run down to serve political/business goals and we are concerned that any vote in favour of this will turn GPs into political scapegoats yet again. Despite this pressure the service you provide is exemplary. By working together this political wilderness can be navigated and the updated oaths of Hipprocates to defend your patients’ access to healthcare independent of political pressures will be maintained. Thank you, The undersigned. Why is this important? The NHS is currently being dismantled under the guise of an ineffective system and more consumer choice. Increased GP workload and patient demand driving this issue is largely as a result of government policy, hospital closures and privatisation. GP income has fallen by design and patient charges are not the answer. "How many times are we going to fall into the traps set by our political masters?" asks Gurdave Gill, GP Partner writing on the Pulse Today website. "Patient charges are NOT the answer. User charges deter the sick and poor as much as the 'worried well'. Expensive and bureaucratic to collect, evidence shows patients delay seeking medical advice when user charges are introduced. Delay in diagnosis can cause significant harm. If we know this to be fact, to introduce charges appears to suggest that our incomes are more important than any potential harm to the patients. Is this ethical? "The current crisis in Primary care has been manufactured to create a pressure from GPs for charges. [...] We should be demanding increased resources from Government and not our patients. The NHS returned £5bn underspend to the treasury in the last 3 years. The cost of the purchaser-provider split exceeds £10bn pa yet delivers absolutely no patient gain at roughly the entire cost of primary care! {...] We need to identify the correct target and demand our representative bodies are more effective rather than the incompetence/collusion with Government we have seen in recent past. The minority of pro-privatisation GPs leading the call for charges need to be recognised for what they are. We must not be persuaded by the 'greedy and dims' amongst us.” And how about that consumer choice? Right now we have the best of both, individual private healthcare and tax-payer funded. Both are a form of 'paid for' healthcare, one is paid for by the individual, the other paid for and negotiated collectively. If the asset strip continues we will only have the most expensive poorly-negotiated option open to any of us. That is no choice at all. UPDATE The BMA's current position on this motion as outlined to one of our members, obviously, it would be naive to rest on these laurels: "The BMA's current position is not in favour of charging patients for GP appointments. Introducing charging would undermine the basis of the NHS; that healthcare is free at the point of use, and patients receive care based on their clinical need. A fee charging system could require an expensive bureaucracy to collect money from patients. It is also possible that the charges may deter vulnerable patients from seeing their GP which could lead to delays in treatment. However, there will be a motion debated at the Local Medical Committee (LMC) conference in York later this month. If the motion is carried, this does not mean it will become BMA policy. BMA Policy is decided at our Annual Representative Meeting (ARM) in July [ed- It's actually Sunday 22 - Thursday 26 June 2014] and motions are proposed by individual branch of practice conferences (e.g. GPs, consultants, junior doctors etc) and submitted for debate by geographical divisions. It would require further consideration by the BMA's leadership and the BMA's Annual Representative Meeting in July. It is understandable that GPs are looking at raising these kind of ideas, given the enormous pressure on GP services. Many GP practices are struggling from a combination of rising patient demand and falling funding that ministers have failed to recognise. However, the BMA feels that we don't need a complicated and unfair charging system to be introduced for GP appointments. We need the government to provide the resources to enable GPs to deliver the care that their patients need. I hope this is helpful and that it clarifies the BMA position for you." Links: Facebook page that inspired this petition: https://www.facebook.com/healthcharge Pulse Today - GP leaders to vote on whether to support patient charges for appointments: http://bit.ly/1lrI1gg LMC Conference - Full Agenda: http://bit.ly/fullagenda BMC/GPC: http://bit.ly/bmcandgpc BMC Annual Meeting: http://bma.org.uk/working-for-change/arm-2014-info Wessex LMC: http://bit.ly/aboutWessex How it will be delivered To the representatives of the LMC conference on May 22nd via email. If the motion is carried then the campaign will aim for maximum impact and increase in size, scope and publicity for the policy meeting in July. Image courtesy of Tom & Katrien under Creative Commons License 2.0: https://creativecommons.org/licenses/by-sa/2.0/legalcode
<urn:uuid:0adde8a5-6d68-47df-9a32-8cd850df7029>
CC-MAIN-2024-51
https://you.38degrees.org.uk/petitions/nhs-healthcare-no-charge-at-the-point-of-use
2024-12-11T11:53:19Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00665.warc.gz
by-sa
2.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "2.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.999624
Aye jammers! Today, we have me(cutegirl2001) posting, as well as the Rare Cone Collar in the Medical Center! Ooo spooky colors! Well it looks like if any animal gets a wild itch during the Night of the Phantoms, this would come in handy! Though it's costing 650 more than a regular cone, get into the spirit of Halloween/Night of the Phantoms! Hmm speaking of getting in the spirit, Jaffacake did this pawsome little spirit art, honouring panda's return! Hehe the panda is so adorable! Well it looks like you jammers won't be getting adorable little bunny plushies anymore, because in 3 days, these bunnies are saying farewell! You'd better get one fast if you like one! Ditto that to these two items! If you're born in September, better be sure to pick this one up! Last day of dandy dandelion patches! Hmm even when we have some things leaving.. Some things (like glitches) always stay the same! Now, we have an arctic wolf persona, and an invisible arctic wolf underwater! Tricky situation you got there Jaffacake! Hope you get it fixed soon! ^_^ Monday mystery time! Crystal Sands Presently | Crystal Sands before | What do you think happened to make crystal sands change so drastically? (And if you notice in the second picture, the cave on top is in the shape of a tiger ^.^ Think it's related to Sir Gilbert?) Also, notice the volcano in the distance? Hmmm seems fishy to me, there wasn't a volcano visible before the Adventures came! Haha well think up stories, type them in the comment box and press post jammers! ~ P.S. If you have a collection of plushies don't forget to sent a screenshot of it to [email protected] P.P.S. Have you got a cool glitch, or a pawsome Monday Mystery idea? Sharing is, after all caring, so share your ideas with me, at [email protected], and who knows, if your idea is phantasmic I'll feature it on the blog, with credit given to you!
<urn:uuid:d8deaac9-db28-4935-9d55-b6bdc68b3088>
CC-MAIN-2024-51
http://animaljamspirit.blogspot.com/2014/09/rare-cone-collar-spirit-art.html
2024-12-12T16:56:17Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00565.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.997346
In this episode I cover a very highly regarded arcade port for the Lynx, Robotron: 2084, released for the Lynx in 1991. Included are statistics for the game, a run-down on how to play it, reviews and ratings, some fun facts and trivia, and (of course) listener feedback about the game. Plus, during the course of this episode, I begin to foster grave concerns about Monty’s true motivations regarding the future of our planet. Crikey. Before viewing the following show notes, you must click on the link below: ROBOTRON: 2084 VITAL STATISTICS Release Date: August of 1991. Initial Retail Price: $38.99 in the US; £29.00-£34.99 in the UK. Cartridge Information: 128kB stereo curved lip-style cartridge. Game Genre: Top-down-view 2-dimensional multidirectional action shooter for 1 player only. Screen Playfield Orientation: Landscape (horizontal). Based On: The arcade cabinet of the same name created by Eugene Jarvis and Larry DeMar of Vid Kidz and released by Williams Electronics in 1982. This arcade game was in turn inspired by Jarvis’ and DeMar’s previous game, Defender, as well as by the arcade game Berzerk, the Commodore PET game Chase, and the 1949 George Orwell novel “Nineteen Eight-Four” (also known as “1984”). Ports to Other Systems: Acorn Electron, Apple ][, Apple MacIntosh, Atari 5200, Atari 7800, Atari 8-bit line of computers, Atari ST, BBC Micro, Commodore 64, Commodore VIC-20, IBM PC (PC booter), and Xbox 360. There is also a brand new home brew port of Robotron: 2084 for the original Atari VCS (2600) from Champ Games . It is called RobotWar 2684, and it will be released sometime this fall at AtariAge; you can find more info about it here. Game Levels: At least 50. The arcade cabinet Robotron: 2084 includes 40 unique levels, or waves. After wave 40, the game repeats waves 21-40 over and over again until wave 255 is reached. Packaging: A full-color standard flap-tab regular-size box (5 3/8″ by 4 3/8″ by 7/8″). The French variant included a sticker on the front (Pin’s Gratuit) indicating the inclusion of a lapel pin. Instruction Manual: A 16-page (including front and back covers) stapled regular-sized booklet manual in full monochrome, measuring the usual 4 7/8” high by 3 ¾” wide. The manual was released in English in North America and in Europe, and in French in France. Resources for Atari Lynx Console/Game-Related Collecting Materials/Tools: Resource:Game Boy Color cases for Atari Lynx cartridges from Amazon Resource:2 1/2″ coin storage sheets from Amazon. Resource: Atari Lynx regular-size game box sleeves from BuzzandBingosMoonCircus (eBay). Resource: Atari Lynx custom game box sleeves from RetroProtection. Resource:Building a custom Atari Lynx game box shelving unit from AtariGamer. Resource: Atari Lynx II display stand in a choice of 2 colors from RoseColoredGaming on Etsy. Resource: Atari Lynx I and II display stands (along with cartridge stands) from TelltaleShop on Etsy. Resource: BennVenn’s drop-in LCD replacement kit (requires soldering; includes screen plus AtariGamer.com’s 3D-printed screen bracket frame for the Atari Lynx I). Resource: BennVenn’s drop-in LCD replacement kit (solderless-type; includes screen plus AtariGamer.com’s 3D-printed screen bracket frame for the Atari Lynx II). Resource: BennVenn’s ElCheapoSD storage cartridge for the Atari Lynx. Resource: RetroHQ’s GameDrive SD storage cartridge for the Atari Lynx. Resource: AtariGamer Online Shop (upgrades, mods, and kits for the Atari Lynx) “Thank You’s” and Other Lynks: Antic: The Atari 8-Bit Podcast(Thanks to Brad Arnold, Randy Kindig, and Kevin Zavitz for the shoutout about The HandyCast in Episode 50!) AtariGamer.com(Thanks to Igor for incorporating The HandyCast into his excellent website!) The Atari 2600 Game By Game Podcast(Thanks to The Podfather himself, Ferg, for encouraging his listeners to check out The HandyCast in both Episode 151 and Episode 154!) The Atari Jaguar Game By Game Podcast(Thanks to Shinto for encouraging his listeners to check out The HandyCast in Episodes 22 and 26!) Curtis Herod (Cujo)‘s The Bl^ck Book v2 (Check HERE to see the now-expired Indiegogo campaign, where you can find out more about the book. And please consider purchasing Curtis Herod’s The Black Book v2 by emailing him at [email protected].) Gaming on Ten(Thanks to Nick and Don for encouraging his listeners to check out The HandyCast in Episode 09!) Into the Vertical Blank Podcast(Thanks to hosts Jeff and Steve Fulton for “singing” about The HandyCast in Season 1, Episode 10!) Please Stand By(Thanks to Zerbe and Ferg for helping to promote The HandyCast on several episodes of this fun-to-listen-to show, starting with Episode 60!) The RCR Podcast(Thanks to the Retro Computing Roundtable: Paul Hagstrom, Quinn Dunki, Jack Nutting, and Carrington Vance, for highlighting The HandyCast in Episode 167!) The Retro MacCast Podcast(Thanks to Retro MacCast hosts James Savage and John Leake for highlighting The HandyCast in Episode 475!) Retro Video Gamer Forums(Thanks to Eugenio/TrekMD for helping to promote The HandyCast on his wonderful forums!) ACKNOWLEDGMENTS Thanks go to everyone who contributed feedback about Robotron: 2084 (and other games) for this episode: Eugenio (TrekMD), Todd Ford, Kieren Hawken (The Laird’s Lair YouTube Channel), Curtis Herrod (Cujo86), Bill Kendrick (The Atari XEGS Game by Game Podcast), lynxtosg03, rayrayrayraydog, H.R. Segovia, Shinto (The Atari Jaguar Game by Game Podcast), sramirez2008, and Bobby Tribble. I really appreciate your feedback! Thanks also to Elvira, Mistress of the Dark (Cassandra Peterson) for the “Oooh, let’s party!” and “Leaving so soon?” digitized speech clips captured from the Atari Lynx game Pinball Jam that are used at the beginning and end of each episode of The HandyCast. I would especially like to thank Shinto for submitting his memories of various Atari Lynx games he’s owned in the past to The Atari Lynx HandyCast…they are greatly appreciated. And you should all check out Shinto’s wonderful Atari Jaguar Game by Game Podcast; it’s definitely worth listening to, even if you’ve never owned a Jaguar. You can find it here. Many, many thanks also go to Zerbinator for his continued support. His encouragement and expertise are very much appreciated by me. You can find all of his fun-to-listen-to podcasts here, including my favorite, Please Stand By. Finally, my thanks to the Podfather himself, Ferg of The Atari 2600 Game by Game Podcast. His inspiration and dedication to covering every game cartridge ever made for the Atari 2600 (I think over 1000 of them!) is what gave me the courage to begin this podcast. Please, check out his don’t-miss podcast, even if you’re not an Atari 2600 collector; you should also visit his website here. I hope you enjoy this episode of The Atari Lynx HandyCast. And please don’t forget to visit the official Atari Lynx HandyCast website by clicking here!
<urn:uuid:16d6b150-04da-4698-87e4-9295d0d66c80>
CC-MAIN-2024-51
http://atarilynxhandycast.blogspot.com/2021/09/episode-21-robotron-2084.html
2024-12-12T17:51:52Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00565.warc.gz
by
4.0
a_tag
false
false
null
null
null
{ "abbr": [ "by" ], "in_footer": [ false ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.993463
The meeting participants discussed current issues on the domestic socioeconomic agenda. They pointed out the need for a particularly close monitoring of all housing and utilities systems in the regions hit by abnormally low temperatures in recent days. The participants exchanged detailed views on the situation in the Balkans. The meeting was attended by Prime Minister Dmitry Medvedev, Federation Council Speaker Valentina Matviyenko, State Duma Speaker Vyacheslav Volodin, Chief of Staff of the Presidential Executive Office Anton Vaino, Foreign Minister Sergei Lavrov, Director of the Federal Security Service Alexander Bortnikov, Secretary of the Security Council Nikolai Patrushev, Director of the Foreign Intelligence Service Sergei Naryshkin, Interior Minister Vladimir Kolokoltsev, and Special Presidential Representative for Environmental Protection, Ecology and Transport Sergei Ivanov.
<urn:uuid:94592bd2-3f8e-48c6-b510-fe4446844907>
CC-MAIN-2024-51
http://en.kremlin.ru/events/president/news/59424/print
2024-12-12T18:31:51Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00565.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.971743
skip to main content OSU Libraries Log In Contact Us View Shelf ( 0 ) Special Collections and Archives Research Center Collections Collections by Title Collections by Type People, Places, and Topics Creators Digital Resources University History History of Science Linus Pauling Online Oregon Multicultural Archives Natural Resources Online Audio/Video Social Media About Us Mission Statement Department History Staff Using Our Collections Facilities Frequently Asked Questions Services Frequently Asked Questions Donating Materials Facilities Instruction and Outreach Records Management Reference Reproduction & Use Ask An Archivist Search Term Search Scope Collections Only Entire Site Search My Research Shelf Your research shelf is currently empty. To learn more about our by-appointment hours, and the logistics of in-person research, please visit the Conducting In-person Research page of our Guide to SCARC .
<urn:uuid:50cccca5-721a-4b7f-8abc-a73df4bfb21a>
CC-MAIN-2024-51
http://scarc.library.oregonstate.edu/findingaids/?p=collections/research&f=cart&referer=scarc.library.oregonstate.edu%2Ffindingaids%2Findex.php%3Fp%3Dcore%2Fsearch%26subjectid%3D14173
2024-12-12T18:31:32Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00565.warc.gz
by
4.0
a_tag
false
true
null
null
null
{ "abbr": [ "by", "by" ], "in_footer": [ true, true ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "4.0", "4.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.769503
- 評價 2 分,滿分 5 分來自 Sakhawat Hossain,9 個月前 - 評價 5 分,滿分 5 分來自 Firefox 使用者 15173615,9 個月前 - 評價 5 分,滿分 5 分來自 LeoBeluga,9 個月前 - 評價 5 分,滿分 5 分來自 Firefox 使用者 17714974,9 個月前 - 評價 1 分,滿分 5 分來自 Samuel,9 個月前 - 評價 4 分,滿分 5 分來自 SexySabrinaDeeCD,10 個月前 - 評價 1 分,滿分 5 分來自 harl windwolf,10 個月前OneTab Team, have you never heard of user-level queries or safeguards? This add-on desperately needs them, and hopefully you're clever enough to figure out the rest by yourself. OneTab has been around for so long now and it still feels like just a proof-of-concept type of add-on. It's missing options and features, and it seriously needs some kind of overhaul with a focus on performance when handling more tabs & groups. - 評價 4 分,滿分 5 分來自 M. Baugh,10 個月前 - 評價 5 分,滿分 5 分來自 Firefox 使用者 14102925,10 個月前 - 評價 5 分,滿分 5 分來自 AchtSechs,10 個月前 - 評價 5 分,滿分 5 分來自 DC,10 個月前 - 評價 5 分,滿分 5 分來自 Brother VooGoo,10 個月前 - 評價 5 分,滿分 5 分來自 Murdo,10 個月前 - 評價 5 分,滿分 5 分來自 TrevMeister,10 個月前 - 評價 5 分,滿分 5 分來自 nope not today,10 個月前 - 評價 5 分,滿分 5 分來自 Firefox 使用者 17611376,10 個月前
<urn:uuid:422c24f3-986e-458b-bd3a-a4c506e264f5>
CC-MAIN-2024-51
https://addons.mozilla.org/zh-TW/firefox/addon/onetab/reviews/?utm_content=search&utm_medium=referral&utm_source=addons.mozilla.org&page=7
2024-12-12T16:34:54Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00565.warc.gz
by-sa
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by-sa" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.699478
Cloudbase Solutions Wiki Ask Cloudbase Openstack Hyper-V Driver Cloudbase-Init Cloudbase@GitHub Hi there! Please sign in help tags users badges ALL UNANSWERED New Question RSS Sort by » date ▼ activity answers votes 11 questions Tagged metadata × 233 views 1 answer no votes 2021-11-15 23:07:20 +0200 avladu set vlanID in meta-data metadata 1k views 1 answer no votes 2020-12-07 15:56:32 +0200 avladu How do I use Cloudbase-Init instance data? instance-data metadata runcmd 777 views 1 answer no votes 2020-07-22 09:26:40 +0200 avladu Hostname changes using metadata metadata openstack hostname cloudbase-init. windows 1k views 1 answer no votes 2018-04-03 09:50:05 +0200 avladu Windows Server 2012 R2 not pulling metadata from vfat ConfigDrive windows vfat metadata 466 views 1 answer no votes 2017-01-02 04:32:31 +0200 alexpilotti Calling Metadata in a customization script metadata windows2012R2 Customization 847 views 1 answer no votes 2016-04-18 12:33:13 +0200 avladu how to build the metadata server. metadata hostname windows cloudinit 870 views 3 answers no votes 2015-11-24 07:45:42 +0200 scubabri set metadata password to false not working metadata password openstack liberty image 654 views 1 answer no votes 2015-10-24 16:28:23 +0200 avladu How can we specifiy Ec2 metadata_urls? metadata config datasource 676 views 1 answer no votes 2015-04-07 16:49:20 +0200 ader1990 Sporadic set password metadata failures metadata password 6k views 4 answers no votes 2017-04-10 15:38:36 +0200 jacolex openstack launch instance hangs on 'Getting metadata...' metadata hang openstack 3k views no answers no votes 2014-08-08 12:26:43 +0200 spiffly how to troubleshoot 'nova get-password' returning a blank password ssh key metadata password admin Contributors Tags metadata ×11 openstack ×3 password ×3 windows ×3 hostname ×2 admin ×1 cloudbase-init. ×1 cloudinit ×1 config ×1 Customization ×1 datasource ×1 hang ×1 image ×1 instance-data ×1 key ×1 liberty ×1 runcmd ×1 ssh ×1 vfat ×1 windows2012R2 ×1 © 2014-2023 Cloudbase Solutions Content on this site is licensed under a Creative Commons Attribution Share Alike 3.0 license. about faq help privacy policy terms of service Powered by Askbot version 0.10.2 Please note: ask.cloudbase.it requires javascript to work properly, please enable javascript in your browser, here is how dummy ×
<urn:uuid:d2beed41-9ed4-4464-a4c4-7879c5a7fd0b>
CC-MAIN-2024-51
https://ask.cloudbase.it/questions/scope:all/sort:age-desc/tags:metadata/page:1/
2024-12-12T16:20:42Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00565.warc.gz
by-sa
3.0
a_tag
false
false
null
null
null
{ "abbr": [ "by-sa", "by-sa" ], "in_footer": [ false, false ], "in_head": [ false, false ], "location": [ "a_tag", "a_tag" ], "version": [ "3.0", "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.881096
The Round Stable Horsie Forums :3 A Ponygoons Site Site menu Bronibooru Skip to content Quick links FAQ Login Register Board index Contact a Board Administrator Contact a Board Administrator Recipient: Administrator Your email address: Your name: Subject: Message body: This message will be sent as plain text, do not include any HTML or BBCode. The return address for this message will be set to your email address. Board index All times are UTC-05:00 Delete cookies Contact us Powered by phpBB ® Forum Software © phpBB Limited My Little Pony, Friendship Is Magic, and associated character names are trademarks of Hasbro, Inc. Hub is a trademark of Hub Television Networks, LLC. Use of these trademarks does not imply endorsement by their owners of the content or opinions expressed on these forums. Titling font is derived from Arvo by Anton Koovit , released under the SIL Open Font License v1.1 . Certain icons have been derived from Font Awesome and JustVector Social Icons , released under the Creative Commons Attribution 3.0 and Free Art License 1.3 respectively.
<urn:uuid:da8ee17d-abe7-47b2-82ed-75a1a4627166>
CC-MAIN-2024-51
https://www.roundstable.com/forums/memberlist.php?mode=contactadmin&sid=a0adb538e335e076be9abba0cab7d6e1
2024-12-12T17:36:31Z
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00565.warc.gz
by
3.0
a_tag
false
true
null
null
null
{ "abbr": [ "by" ], "in_footer": [ true ], "in_head": [ false ], "location": [ "a_tag" ], "version": [ "3.0" ], "element": null, "left_context": null, "right_context": null }
false
false
Latn
eng
0.985049