URL
stringlengths
15
1.68k
text_list
sequencelengths
1
199
image_list
sequencelengths
1
199
metadata
stringlengths
1.19k
3.08k
http://gnoobz.com/
[ "# Introduction\n\nThis was the last binary challenge released on the second day of the CTF, worth 300 points.\n\n```\\$ file lost.elf\nlost.elf: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, BuildID[sha1]=f9e196b2aad4d644223e22e424c8c192bdb41175, stripped\n\ngdb-peda\\$ checksec\nCANARY : disabled\nFORTIFY : disabled\nNX : ENABLED\nPIE : disabled\nRELRO : disabled\n```\n\nThis looks promising: no exotic architecture, no static linking, no stack canaries, no PIE. Should be a simple exploitation challenge, ready to pop a shell.\n\n# Reverse Engineering\n\n```int __cdecl main(int argc, const char **argv, const char **envp)\n{\nflagStream_ = fopen(\"flag.txt\", \"rb\");\nif ( !flagStream_ )\nexit(1);\nflagStream = flagStream_;\nfclose(flagStream);\ncreate_bpf_network_filter();\n// This initializes g_filter with the result from the bpf syscall.\n// Note: for my tests, I edited the binary to use the \"lo\" interface instead.\nlistenSock = create_raw_socket_bind_port_4352_udp(\"ens3\");\nlistenSock_ = listenSock;\n// SO_ATTACH_BPF.\nif ( listenSock < 0 || (exitcode = setsockopt(listenSock, 1, 50, &g_filter, 4u)) != 0 )\n{\nexitcode = 1;\n}\nelse\n{\n// Receive somthing on port 4352 (only if it passes the packet filter code).\n{\nudpSocket = socket(2, 2, 17);\nrecipient.sa_family = 2;\n// port = 0x1337 = 4919\n*(_WORD *)&recipient.sa_data = 0x3713;\n// v20 contains the IP that sent the packet, so the binary\n// will send a reply with the flag to the same IP on port 4919.\n*(_DWORD *)&recipient.sa_data = v20;\n// < inline strlen nonsense code .. >\nsendto(\nudpSocket,\n&flag,\nlen,\n0,\n&recipient,\n0x10u);\n}\n}\nreturn exitcode;\n}\n```\n\nThe code for creating packet filter, binding the socket, etc. is fairly straight forward, so I will not dump the code here as well. So apparently, we do have to deal with some exotic architecture after all: BPF.\n\nI browsed the interwebs to find BPF (or in this case, eBPF) disassemblers, but none worked properly, so I started hand analyzing the code. It became pretty evident that I would not have enough time during the last few hours of the CTF to analyze the code (0x274 instructions of some weird architecture I do not know..), so I decided to move on to different challenges instead. After my flight home, equipped with stable non-hotel Internet, I started digging more into the architecture because I really wanted to solve this challenge. I am not sure if this is the inteded solution, but after a couple of hours I was able to solve it as well.\n\nKudos to StratumAuhuur for solving it so quickly during the CTF, deservedly getting first place!\n\n# Just In Time\n\nJust in time - get it? ...\n\nDuring my Googling-Frenzy on BPF and eBPF, I found several tools to debug and assemble these filters, but the disassemblers just would not work. Additionally, my kernel version does not support this, and during the CTF I did not have other VMs with newer kernels ready (lessons learned: prepare better). At last, I found something that eventually allowed me to solve the challenge: `/proc/sys/net/core/bpf_jit_enable` .\n\n```Values :\n0 - disable the JIT (default value)\n1 - enable the JIT\n2 - enable the JIT and ask the compiler to emit traces on kernel log.\n```\n\nIf we set this to 1, the kernel will emit x86_64 code for the network filter. Now we are getting somewhere! With option 2, not only will this generate sane code, it will also log it!\n\n```dmesg\n[ 3671.038259] flen=628 proglen=2479 pass=3 image=ffffffffa01035b2 from=lost.elf pid=90\n[ 3671.038300] JIT code: 00000000: 55 48 89 e5 48 81 ec 28 02 00 00 48 89 9d d8 fd\n[ 3671.038315] JIT code: 00000010: ff ff 4c 89 ad e0 fd ff ff 4c 89 b5 e8 fd ff ff\n[ 3671.038326] JIT code: 00000020: 4c 89 bd f0 fd ff ff 31 c0 4d 31 ed 48 89 85 f8\n...\n```\n\nGlorious!\n\n# Packet Filter Code\n\nWe know the address where the code is emitted to, so relocating it should not be difficult. Turns out, other than a few calls at the beginning to read out packet data, the whole code is a linear series of XORs and shifts and all that jazz, until it finally performs a comparison, deciding whether the packet should be allowed to pass through or not.\n\n```seg016:000000000000000A shl r14, 8\nseg016:000000000000000E and r14, 0FF0000h\nseg016:0000000000000015 mov rdi, rax\nseg016:0000000000000018 shl rdi, 18h\nseg016:000000000000001C or r14, rdi\nseg016:000000000000001F mov rdi, rax\nseg016:0000000000000022 shr rdi, 18h\nseg016:0000000000000026 and rdi, 0FFh\nseg016:000000000000002D or r14, rdi\nseg016:0000000000000030 shr rax, 8\nseg016:0000000000000034 and rax, 0FF00h\nseg016:000000000000003B or r14, rax\nseg016:000000000000003E mov r13, 0FFFFFFE0h\nseg016:0000000000000048 mov rdi, r14\nseg016:000000000000004B and rdi, r13\nseg016:000000000000004E shr rdi, 5\nseg016:0000000000000052 mov r15, r14\nseg016:0000000000000055 shl r15, 4\nseg016:0000000000000059 xor r15, rdi\nseg016:000000000000005C mov rax, rsi\nseg016:000000000000005F mov rdi, rax\nseg016:0000000000000062 shl rdi, 8\nseg016:0000000000000066 and rdi, 0FF0000h\nseg016:000000000000006D mov rsi, rax\nseg016:0000000000000070 shl rsi, 18h\nseg016:0000000000000074 or rdi, rsi\nseg016:0000000000000077 mov rsi, rax\nseg016:000000000000007A shr rsi, 18h\nseg016:000000000000007E and rsi, 0FFh\nseg016:0000000000000085 or rdi, rsi\nseg016:0000000000000088 shr rax, 8\nseg016:000000000000008C and rax, 0FF00h\n...\nseg016:00000000000008B2 mov edx, 46245443h ; CT\\$F\nseg016:00000000000008B7 cmp rsi, rd\n...\nseg016:00000000000008E5 mov edi, 42744968h ; hItB\nseg016:00000000000008EA cmp r14, rdi\n...\nseg016:0000000000000914 leave\nseg016:0000000000000915 retn\n```\n\nI parsed the dmesg output and extracted all the bytes for the emitted packet filter function. After analyzing the function prologue, I was able to replace all the function calls at the beginning with simple constants (these calls are used to extract the first 8 bytes of the user data in the UDP packet). To make the whole analysis easier, I simply converted this function into a function taking two integer arguments. The result is a function taking two arguments, returing 1 on success and 0 on failure.\n\n```int packet_filter(unsigned int a1, unsigned int a2) {\nv2 = (a1 >> 8) & 0xFF00 | ((unsigned int)a1 >> 24) | (a1 << 24) | ((_DWORD)a1 << 8) & 0xFF0000;\nv3 = ((a2 >> 8) & 0xFF00 | ((unsigned int)a2 >> 24) | (a2 << 24) | ((_DWORD)a2 << 8) & 0xFF0000)\n- ((v2 + (((unsigned __int64)((unsigned int)v2 & 0xFFFFFFE0) >> 5) ^ 16 * v2)) ^ 0x69859111);\nv4 = v2 - ((v3 + (((unsigned __int64)((unsigned int)v3 & 0xFFFFFFE0) >> 5) ^ 16 * v3)) ^ 0x6DCA2938);\nv5 = v3 - ((v4 + (((unsigned __int64)((unsigned int)v4 & 0xFFFFFFE0) >> 5) ^ 16 * v4)) ^ 0x6DCA2938);\nv6 = v4 - ((v5 + (((unsigned __int64)((unsigned int)v5 & 0xFFFFFFE0) >> 5) ^ 16 * v5)) ^ 0x2D169D9F);\nv7 = v5 - ((v6 + (((unsigned __int64)((unsigned int)v6 & 0xFFFFFFE0) >> 5) ^ 16 * v6)) ^ 0xFFFFFFFFF6F49763LL);\nv8 = v6 - ((v7 + (((unsigned __int64)((unsigned int)v7 & 0xFFFFFFE0) >> 5) ^ 16 * v7)) ^ 0xFFFFFFFFF7762178LL);\nv9 = v7 - ((v8 + (((unsigned __int64)((unsigned int)v8 & 0xFFFFFFE0) >> 5) ^ 16 * v8)) ^ 0xFFFFFFFFF7762178LL);\nv10 = v8 - ((v9 + (((unsigned __int64)((unsigned int)v9 & 0xFFFFFFE0) >> 5) ^ 16 * v9)) ^ 0xFFFFFFFFBA85A3F1LL);\nv11 = v9 - ((v10 + (((unsigned __int64)((unsigned int)v10 & 0xFFFFFFE0) >> 5) ^ 16 * v10)) ^ 0xFFFFFFFFF0A7AA2DLL);\nv12 = v10 - ((v11 + (((unsigned __int64)((unsigned int)v11 & 0xFFFFFFE0) >> 5) ^ 16 * v11)) ^ 0xFFFFFFFFF4EC4254LL);\nv13 = v11 - ((v12 + (((unsigned __int64)((unsigned int)v12 & 0xFFFFFFE0) >> 5) ^ 16 * v12)) ^ 0x52703074);\nv14 = v12 - ((v13 + (((unsigned __int64)((unsigned int)v13 & 0xFFFFFFE0) >> 5) ^ 16 * v13)) ^ 0xFFFFFFFFB438B6BBLL);\nv15 = v13 - ((v14 + (((unsigned __int64)((unsigned int)v14 & 0xFFFFFFE0) >> 5) ^ 16 * v14)) ^ 0x56B4C89B);\nv16 = v14 - ((v15 + (((unsigned __int64)((unsigned int)v15 & 0xFFFFFFE0) >> 5) ^ 16 * v15)) ^ 0x7E983A94);\nv17 = v15 - ((v16 + (((unsigned __int64)((unsigned int)v16 & 0xFFFFFFE0) >> 5) ^ 16 * v16)) ^ 0xFFFFFFFFDFDF36C6LL);\nv18 = v16 - ((v17 + (((unsigned __int64)((unsigned int)v17 & 0xFFFFFFE0) >> 5) ^ 16 * v17)) ^ 0x41A7BD0D);\nv19 = v17 - ((v18 + (((unsigned __int64)((unsigned int)v18 & 0xFFFFFFE0) >> 5) ^ 16 * v18)) ^ 0xFFFFFFFFE060C0DBLL);\nv20 = v18 - ((v19 + (((unsigned __int64)((unsigned int)v19 & 0xFFFFFFE0) >> 5) ^ 16 * v19)) ^ 0x7C0E5B70);\nv21 = v19 - ((v20 + (((unsigned __int64)((unsigned int)v20 & 0xFFFFFFE0) >> 5) ^ 16 * v20)) ^ 0x42294722);\nv22 = v20 - ((v21 + (((unsigned __int64)((unsigned int)v21 & 0xFFFFFFE0) >> 5) ^ 16 * v21)) ^ 0x3B5ACFD7);\nv23 = v21 - ((v22 + (((unsigned __int64)((unsigned int)v22 & 0xFFFFFFE0) >> 5) ^ 16 * v22)) ^ 0x3B5ACFD7);\nv24 = v22 - ((v23 + (((unsigned __int64)((unsigned int)v23 & 0xFFFFFFE0) >> 5) ^ 16 * v23)) ^ 0x5BA53B0);\nv25 = v23 - ((v24 + (((unsigned __int64)((unsigned int)v24 & 0xFFFFFFE0) >> 5) ^ 16 * v24)) ^ 0x3F9F67FE);\nv26 = v24 - ((v25 + (((unsigned __int64)((unsigned int)v25 & 0xFFFFFFE0) >> 5) ^ 16 * v25)) ^ 0xFFFFFFFFC8C9D629LL);\nv27 = v25 - ((v26 + (((unsigned __int64)((unsigned int)v26 & 0xFFFFFFE0) >> 5) ^ 16 * v26)) ^ 0xFFFFFFFFC8C9D629LL);\nv28 = v26 - ((v27 + (((unsigned __int64)((unsigned int)v27 & 0xFFFFFFE0) >> 5) ^ 16 * v27)) ^ 0x330748C);\nv29 = v27 - ((v28 + (((unsigned __int64)((unsigned int)v28 & 0xFFFFFFE0) >> 5) ^ 16 * v28)) ^ 0xFFFFFFFFC94B603ELL);\nv30 = v28 - ((v29 + (((unsigned __int64)((unsigned int)v29 & 0xFFFFFFE0) >> 5) ^ 16 * v29)) ^ 0xFFFFFFFFC27CE8F3LL);\nv31 = v29 - ((v30 + (((unsigned __int64)((unsigned int)v30 & 0xFFFFFFE0) >> 5) ^ 16 * v30)) ^ 0x2B13E685);\nv32 = v30 - ((v31 + (((unsigned __int64)((unsigned int)v31 & 0xFFFFFFE0) >> 5) ^ 16 * v31)) ^ 0xFFFFFFFF8CDC6CCCLL);\nv33 = v31 - ((v32 + (((unsigned __int64)((unsigned int)v32 & 0xFFFFFFE0) >> 5) ^ 16 * v32)) ^ 0x24456F3A);\nv34 = v32 - ((v33 + (((unsigned __int64)((unsigned int)v33 & 0xFFFFFFE0) >> 5) ^ 16 * v33)) ^ 0x4FEBEF45);\nv35 = v33 - ((v34 + (((unsigned __int64)((unsigned int)v34 & 0xFFFFFFE0) >> 5) ^ 16 * v34)) ^ 0x288A0761);\nv36 = v34 - ((v35 + (((unsigned __int64)((unsigned int)v35 & 0xFFFFFFE0) >> 5) ^ 16 * v35)) ^ 0xFFFFFFFF8A528DA8LL);\nv37 = v35 - ((v36 + (((unsigned __int64)((unsigned int)v36 & 0xFFFFFFE0) >> 5) ^ 16 * v36)) ^ 0xFFFFFFFFB1B4758CLL);\nv38 = v36 - ((v37 + (((unsigned __int64)((unsigned int)v37 & 0xFFFFFFE0) >> 5) ^ 16 * v37)) ^ 0x499F020F);\nv39 = v37 - ((v38 + (((unsigned __int64)((unsigned int)v38 & 0xFFFFFFE0) >> 5) ^ 16 * v38)) ^ 0xFFFFFFFFB235FFA1LL);\nv40 = v38 - ((v39 + (((unsigned __int64)((unsigned int)v39 & 0xFFFFFFE0) >> 5) ^ 16 * v39)) ^ 0x13FE85E8);\nv41 = v39 - ((v40 + (((unsigned __int64)((unsigned int)v40 & 0xFFFFFFE0) >> 5) ^ 16 * v40)) ^ 0x13FE85E8);\nv42 = v40 - ((v41 + (((unsigned __int64)((unsigned int)v41 & 0xFFFFFFE0) >> 5) ^ 16 * v41)) ^ 0xFFFFFFFFD70E0861LL);\nv43 = v41 - ((v42 + (((unsigned __int64)((unsigned int)v42 & 0xFFFFFFE0) >> 5) ^ 16 * v42)) ^ 0xD300E9D);\nv44 = v42 - ((v43 + (((unsigned __int64)((unsigned int)v43 & 0xFFFFFFE0) >> 5) ^ 16 * v43)) ^ 0x1174A6C4);\nv45 = v43 - ((v44 + (((unsigned __int64)((unsigned int)v44 & 0xFFFFFFE0) >> 5) ^ 16 * v44)) ^ 0x1174A6C4);\nv46 = v44 - ((v45 + (((unsigned __int64)((unsigned int)v45 & 0xFFFFFFE0) >> 5) ^ 16 * v45)) ^ 0xFFFFFFFFD0C11B2BLL);\nv47 = v45 - ((v46 + (((unsigned __int64)((unsigned int)v46 & 0xFFFFFFE0) >> 5) ^ 16 * v46)) ^ 0xFFFFFFFF9A9F14EFLL);\nv48 = v46 - ((v47 + (((unsigned __int64)((unsigned int)v47 & 0xFFFFFFE0) >> 5) ^ 16 * v47)) ^ 0xFFFFFFFF9B209F04LL);\nv49 = v47 - ((v48 + (((unsigned __int64)((unsigned int)v48 & 0xFFFFFFE0) >> 5) ^ 16 * v48)) ^ 0xFFFFFFFFFC679B36LL);\nv50 = v48 - ((v49 + (((unsigned __int64)((unsigned int)v49 & 0xFFFFFFE0) >> 5) ^ 16 * v49)) ^ 0x5E30217D);\nv51 = v49 - ((v50 + (((unsigned __int64)((unsigned int)v50 & 0xFFFFFFE0) >> 5) ^ 16 * v50)) ^ 0xFFFFFFFFFCE9254BLL);\nv52 = v50 - ((v51 + (((unsigned __int64)((unsigned int)v51 & 0xFFFFFFE0) >> 5) ^ 16 * v51)) ^ 0xFFFFFFFF9896BFE0LL);\nv53 = v51 - ((v52 + (((unsigned __int64)((unsigned int)v52 & 0xFFFFFFE0) >> 5) ^ 16 * v52)) ^ 0xFFFFFFFFF61AAE00LL);\nv54 = v52 - ((v53 + (((unsigned __int64)((unsigned int)v53 & 0xFFFFFFE0) >> 5) ^ 16 * v53)) ^ 0x57E33447);\nv55 = v53 - ((v54 + (((unsigned __int64)((unsigned int)v54 & 0xFFFFFFE0) >> 5) ^ 16 * v54)) ^ 0xFFFFFFFFFA5F4627LL);\nv56 = v54 - ((v55 + (((unsigned __int64)((unsigned int)v55 & 0xFFFFFFE0) >> 5) ^ 16 * v55)) ^ 0x2242B820);\nv57 = v55 - ((v56 + (((unsigned __int64)((unsigned int)v56 & 0xFFFFFFE0) >> 5) ^ 16 * v56)) ^ 0xFFFFFFFF8389B452LL);\nv58 = v56 - ((v57 + (((unsigned __int64)((unsigned int)v57 & 0xFFFFFFE0) >> 5) ^ 16 * v57)) ^ 0xFFFFFFFFE5523A99LL);\nv59 = v57 - ((v58 + (((unsigned __int64)((unsigned int)v58 & 0xFFFFFFE0) >> 5) ^ 16 * v58)) ^ 0xFFFFFFFFE5523A99LL);\nv60 = v58 - ((v59 + (((unsigned __int64)((unsigned int)v59 & 0xFFFFFFE0) >> 5) ^ 16 * v59)) ^ 0x1FB8D8FC);\nv61 = v59 - ((v60 + (((unsigned __int64)((unsigned int)v60 & 0xFFFFFFE0) >> 5) ^ 16 * v60)) ^ 0xFFFFFFFFE5D3C4AELL);\nv62 = v60 - ((v61 + (((unsigned __int64)((unsigned int)v61 & 0xFFFFFFE0) >> 5) ^ 16 * v61)) ^ 0xFFFFFFFFDF054D63LL);\nv63 = v61 - ((v62 + (((unsigned __int64)((unsigned int)v62 & 0xFFFFFFE0) >> 5) ^ 16 * v62)) ^ 0xFFFFFFFFDF054D63LL);\nv64 = v62 - ((v63 + (((unsigned __int64)((unsigned int)v63 & 0xFFFFFFE0) >> 5) ^ 16 * v63)) ^ 0xFFFFFFFFA964D13CLL);\nv65 = v63 - ((v64 + (((unsigned __int64)((unsigned int)v64 & 0xFFFFFFE0) >> 5) ^ 16 * v64)) ^ 0xFFFFFFFFE349E58ALL);\nv66 = 0xFFFFLL;\nif ( (v65 & 0xFFFFFFFF) != 0x46245443 )\nv66 = 0LL;\nif ( ((v64 - ((v65 + (((unsigned __int64)((unsigned int)v65 & 0xFFFFFFFF) >> 5) ^ 16 * v65)) ^ 0x6C7453B5)) & 0xFFFFFFFF) != 0x42744968 )\nv66 = 0LL;\nreturn v66;\n}\n```\n\nThis looks suspiciously like (X)TEA, but with non-standard constants. I could not figure out the reverse operations, so instead I opted for an automated solver. I had no high hopes for z3, but tried it regardless. As expected, it simply turned my laptop into a heating device for a couple of minutes, until I killed it.\n\n# KLEE\n\nI assumed that KLEE would also not fare too well, but surprisingly it coughed up a valid solution within approx. 3 seconds. I used the default docker image for klee and adjusted the C code:\n\n``` unsigned int a1, a2;\nklee_make_symbolic(&a1, sizeof(a1), \"a1\");\nklee_make_symbolic(&a2, sizeof(a2), \"a2\");\n\n// Code..\n\nv65 = v65 & 0xffffffff;\nv66 = v66 & 0xffffffff;\n\nif (v65 != 0x46245443)\nreturn 1;\n\nif (v66 != 0x42744968)\nreturn 1;\n\n// success.\nklee_assert(0);\nreturn 0;\n```\n```\\$ clang -emit-llvm -c -g x.c\n\\$ klee x.bc\nKLEE: output directory is \"/home/klee/x/klee-out-0\"\nUsing STP solver backend\nKLEE: WARNING: undefined reference to function: klee_assert\nKLEE: WARNING ONCE: calling external: klee_assert(0)\nKLEE: ERROR: /home/klee/x/x.c:157: failed external call: klee_assert\nKLEE: NOTE: now ignoring this error at this location\n\nKLEE: done: total instructions = 1312\nKLEE: done: completed paths = 3\nKLEE: done: generated tests = 3\n\n\\$ ktest-tool --write-ints klee-last/test000003.ktest\nktest file : 'klee-last/test000003.ktest'\nargs : ['x.bc']\nnum objects: 2\nobject 0: name: b'a1'\nobject 0: size: 4\nobject 0: data: -870510808\nobject 1: name: b'a2'\nobject 1: size: 4\nobject 1: data: 810027724\n```\n\nThese 2 integers fulfill the requirements:\n\n```>>> hex(-870510808&0xffffffff)\n'0xcc1d0f28'\n>>> hex(810027724&0xffffffff)\n'0x30480acc'\n```\n\nLets test this:\n\n```# Wait for the flag here..\n\\$ nc -u -l -p 4919\n\n# Send packet:\n\\$ echo -ne \"\\x28\\x0f\\x1d\\xcc\\xcc\\x0a\\x48\\x30\" | nc -u localhost 4352\n\n# And on the nc we were listening:\nslowpoke{only_one_day_too_late_for_the_2000_euro...idiot}\n```\n\nWell, that is a bit harsh.. then again, I do not know what the real flag would be since the services have been turned off right after the CTF. ;) This would have given us enough points for second place.. but there is always next year.\n\nHuge thanks to the HITB CTF organizers and all the teams for an amazing event. The whole CTF infrastructure, challenges, and organization were impressive, there were no issues whatsoever, everything just worked (tm).\n\nCongratulations to StratumAuhuur, Hack.ERS, and KITCTF, well done!\n\n# References\n\n https://www.kernel.org/doc/Documentation/sysctl/net.txt\n\n## Sharif CTF 2016 - Misc 300 - impossible game\n\n10 February 2016 by sku\n\nWriteup for the misc challenge impossible-game\n\n## Sharif CTF 2016 - Web 250 - oldpersian\n\n06 February 2016 by sku\n\nWriteup for the web challenge oldpersian\n\n## HackIm CTF - Exploitation 200 - sandman\n\n03 February 2016 by sku\n\nWriteup for the pwnable challenge sandman\n\n## HackIm CTF - Exploitation 300 - cman\n\n03 February 2016 by sku\n\nWriteup for the pwnable challenge cman\n\n## HackIm CTF - Exploitation 100 - pinkfloyd\n\n31 January 2016 by sku\n\nWriteup for the pwnable challenge pinkfloyd\n\n## Insomnihack Teaser 2016 - rbaced1\n\n20 January 2016 by sku\n\nWriteup for the pwnable challenge rbaced1\n\n## Insomnihack Teaser 2016 - toasted\n\n20 January 2016 by sku\n\nWriteup for the pwnable challenge toasted\n\n## SECCON Online CTF 2015 - Exec dmesg\n\n06 December 2015 by sku\n\nWriteup for the forensics challenge Exec dmesg\n\n## SECCON Online CTF 2015 - Reverse-Engineering Android APK 2\n\n06 December 2015 by sku\n\nWriteup for the reverse engineering and web exploitation challenge APK 2." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.57582027,"math_prob":0.9968877,"size":17284,"snap":"2021-43-2021-49","text_gpt3_token_len":6403,"char_repetition_ratio":0.3271412,"word_repetition_ratio":0.07396871,"special_character_ratio":0.47130293,"punctuation_ratio":0.15140967,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97260565,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-02T18:56:46Z\",\"WARC-Record-ID\":\"<urn:uuid:c004fa48-d43c-4ad7-9c87-9d2ac7433c92>\",\"Content-Length\":\"37799\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ec8ebba4-97c6-4514-823d-12d7e241b330>\",\"WARC-Concurrent-To\":\"<urn:uuid:5ec5dbff-197a-4197-863b-d5fdd18eb844>\",\"WARC-IP-Address\":\"78.47.69.36\",\"WARC-Target-URI\":\"http://gnoobz.com/\",\"WARC-Payload-Digest\":\"sha1:PGNKOQFQSNUAOY2IZNBIM3M5ZG3DJ4D6\",\"WARC-Block-Digest\":\"sha1:ERNB5KTEIYPWYNJ627EUW4WKS5LRH4LO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362287.26_warc_CC-MAIN-20211202175510-20211202205510-00556.warc.gz\"}"}
https://blog.myrawealth.com/insights/quantitative-investment-concepts
[ "", null, "You should review your portfolio at least every quarter unless you have a financial planner who monitors your investments. Looking at performance can be time-consuming and complex, so it’s important to find the most efficient way of doing so. You can save time by analyzing your portfolio with quantitative investment concepts.\n\nThis article will discuss the different concepts of quantitative investments. Included is information on distributions, diversifications, and different risk measurements. In particular, topics such as kurtosis, variance, covariance, and beta will be discussed.\n\nRelated Article | The Finance Dictionary: Learn the jargon your Finance friends speak!", null, "## Distribution of Returns Types\n\n### Normal Distribution\n\nA normal distribution is represented by a bell-shaped curve. It has a single peak in the center consisting of mean, median, and mode.\n\n• A mean is the sum of observations divided by the number of observations.\n\n• The median is the midpoint of the values after they are ordered from smallest to largest.\n\n• The modes are the observation that has the greatest frequency.\n\nSymmetric distribution is where there is a 50% chance that an observation selected at random will fall to the right of the mean, and a 50% chance that it will fall to the left of the mean.\n\n### Skewness or Non-Symmetrical Distribution\n\nA non-symmetrical distribution can either be skewed to the right or skewed to the left. When the distribution is skewed to the right, it means that it is positively skewed. The mean is the highest of the three averages, followed by the median, then the mode.\n\nA distribution that is skewed to the left means that it is negatively skewed. In this case, the mode is the largest of the three averages, followed by the median, then the mean.\n\n### Kurtosis\n\nKurtosis measures whether the distribution is more peaked or less peaked than normal distributions. It measures the degrees of exceptional values that occur more frequently or less frequently. A leptokurtic means that the distribution is more peaked than a normal distribution.\n\nMore observations are clustered closely around the mean, which is good for investors that want to minimize volatility in their portfolios. Platykurtic is when the distribution is less peaked than a normal distribution. There is more observation with large deviations from the mean.\n\n### Lognormal Probability Distributions\n\nA lognormal distribution has a greater than 50% chance that an observation that is selected at random will fall to the left of the mean. The distribution is bound by zero, but in theory, the value of the portfolio could rise towards infinity. The distribution is skewed to the right and is often used to analyze the probability distribution of security and other asset prices. This distribution can be used as a representative of the expected future value of a client’s portfolio.\n\nRelated Article | How To Interpret Your Financial Statements\n\n### Diversification\n\nDiversification is how to structure an investment portfolio to maximize risk and return. An investor should try to realize the amount of return that they are receiving per unit of risk. This can be done by structuring a portfolio that contains a low correlation to each other and having a longer investment time horizon. There is an inverse relationship between the number of stocks and the amount of unsystematic risk within the portfolio. As the number of stock increases, the level of unsystematic risk will decline.\n\n### Covariance\n\nCovariance measures the extent to which two variables move together, either positively or negatively. Covariance is the non-standardized version of the correlation coefficient. It ranges from negative infinity to positive infinity.\n\n### The Correlation Coefficient (R or ρ)\n\nA correlation coefficient measures the extent to which the returns on two securities are related. It measures the strength of the straight-line or linear relationship between the two variables. It has a range of +1 to -1.\n\n• Negative 1 means that the securities move in the opposite direction at the same rate.\n\n• Positive 1 means that the movement between the securities is moving at the same rate and in the same direction\n\n• A value of 0 means that the security movements are unrelated to one another.\n\nA correlation coefficient is a standardized version of a covariance. Combining securities that are not perfectly correlated will reduce the overall portfolio risk.\n\n### Coefficient of Determination (R-Squared)\n\nIt is calculated by squaring the correlation coefficient. This describes the percentage of variability of the dependent variables that are explained by the changes in the independent variable. If R squared is equal to 1 between the portfolio and the market, it means that the portfolio contains no unsystematic risk.\n\nIf R2 risk = 1 between a portfolio and the market, the portfolio contains no unsystematic risk.\n\n## Risk Measurements\n\n### Beta\n\nBeta is the relative measure of systematic risk, and it is useful for portfolios that are highly correlated with the market or benchmark portfolio. The market has a Beta of 1.\n\n• A beta of 1.25 will be considered to be 25% more volatile than the market.\n\n• A beta of less than 1 for a portfolio will be considered less risky than the market.\n\nAnother type of beta is the portfolio beta, which is a weighted average. Betas for individual securities are not considered stable over time. However, betas for portfolios are usually stable over time.\n\n### Statistical Risk Analysis\n\nStatistical risk analysis is the distribution of returns for different assets that are symmetrically distributed around the mean of the returns. The distribution will form to something that is referred to by statisticians as the normal distribution or bell-shaped curve.\n\nStandard deviation is the dispersion of outcomes that is around the mean that is used to measure the risk for normal distribution. The greater the standard deviation, the greater the risk or volatility. The total risk of systematic and unsystematic risk is measured by the standard deviation. The mean is the average return for the sample data. Variance is the standard of deviation squared. Standard deviation is calculated by taking the square root of the sum of the squared differences between the mean, and the individual's observations divided by the number of observations minus one. If the market has a standard deviation of 15%, then the stocks with a standard deviation greater than 15% are considered to be riskier than the market.\n\nConsequently, stocks with a standard deviation of less than 15% are considered less risky than the market. A z-statistic or z-score measures the number of standard deviations a data value is from the mean. The score is calculated by subtracting the mean from the given data value and dividing the result by the standard deviation.\n\nIf the data value is higher than the mean, the z-score will be positive. A z-score of 1.3 means that the data value is 1.3 standard deviation above the mean. If the data value is smaller than the mean, then the z-score will be negative. A z-score of -3.3 means that the data value is 3.3 standard deviations below the mean.\n\nRelated Article | 4 Reasons Why Crypto May Not Be A Good Fit For You\n\n### Semivariance\n\nA semivariance considers the downside volatility of an investment and measures the variability of returns that are below the average or the expected return. When it is used in an analysis, the lower the semivariance of a security, the less likely that security can incur a substantial loss in value.\n\nCritics of variance and standard deviation state that investors are not concerned about the volatility above the average return. Instead, investors are concerned about the volatility below the average return. Thus, a portfolio manager with returns that have a large variance can be punished for having superior positive returns. Semivariance attempts to correct this flaw by only considering the returns and volatility below the expected or average return.\n\nRelated Article | Top 10 Immigrant Money Questions" ]
[ null, "https://www.facebook.com/tr", null, "https://static.twentyoverten.com/5a942106a9d42e3adb339cce/HRnVm21MeMU/1587405897044.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93381476,"math_prob":0.9749525,"size":8160,"snap":"2022-27-2022-33","text_gpt3_token_len":1600,"char_repetition_ratio":0.15510054,"word_repetition_ratio":0.042424243,"special_character_ratio":0.18762255,"punctuation_ratio":0.08201241,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.995181,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-05T00:07:14Z\",\"WARC-Record-ID\":\"<urn:uuid:07f97388-1399-44a1-87ff-9e9fc1c3f2e0>\",\"Content-Length\":\"83362\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:62164897-501b-48a5-a5c9-3bb9d8a114c8>\",\"WARC-Concurrent-To\":\"<urn:uuid:79f9f009-174a-4426-a67c-1377e8cdb291>\",\"WARC-IP-Address\":\"3.88.95.32\",\"WARC-Target-URI\":\"https://blog.myrawealth.com/insights/quantitative-investment-concepts\",\"WARC-Payload-Digest\":\"sha1:JRD6SC3RQPWE23VW3ACQZB5B5VSKNR4L\",\"WARC-Block-Digest\":\"sha1:5DOJY6ITT32CCH7JJBDJ3FTI5QEVBS4I\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104506762.79_warc_CC-MAIN-20220704232527-20220705022527-00555.warc.gz\"}"}
https://www.splashlearn.com/math-vocabulary/algebra/term
[ "# Term in Math – Definition With Examples\n\nAlgebra is the part of mathematics that helps represent problems or situations in the form of mathematical expressions. For example, Tim’s grandma gave him many candy bars. He ate a few and now had 5 left. So, how many candy bars did Tim eat?\n\nLet us pose this question using algebra:\n\nWe know how many candy bars are left, so the number 5 would be called the constant. Constants are numbers that have a fixed numerical value. We do not know how many candy bars Tim’s grandma gave him, so we will call it x. The letter x represents the unknown quantity and is known as a variable. When we subtract the number of uneaten candy bars from the number of candy bars Tim’s grandma gave him, we will learn how many he has eaten already.\n\n## What Is an Algebraic Expression?\n\nAn algebraic expression consists of unknown variables, numbers, and arithmetic operators.\n\nx – 5 is a simple algebraic expression. When we combine constants and variables connected by mathematical operations such as +, -, x, and ÷, we get an algebraic expression.\n\nLet us look at a few more algebraic expressions.\n\nA coefficient is a number multiplied by the variable.The coefficient of 5 x + 10 is 5 and\n\n8 – 2 x is 2.\n\n## What Is a Term in Math?\n\nIn algebra, an algebraic expression is formed by a term or a group of terms together. Term in math is defined as the values on which mathematical operations occur in an algebraic expression. Let’s understand with an example of term.\n\nBoth 8x and 9 are terms of this algebraic expression.\n\n## What Are the Factors of a Term?\n\nThe factors of a term are the numbers or variables that are multiplied to form the term.\n\nFor example, the factors of the term 9xy are 9, x, and y.\n\n## Different Terms in Algebra\n\nThere are two kinds of terms in algebra: Like Terms and Unlike Terms.\n\nLike Terms: Like terms are terms whose variables and exponent power are the same. They can be simplified by combining them. The operations of addition and subtraction can be performed on them together.\n\nFor example, 5x + 8x is an algebraic expression with like terms.\n\nUnlike Terms: Unlike terms are those terms whose variables and their exponents are different from each other. They cannot be simplified by combining them. The operations of addition and subtraction cannot be performed on them together.\n\nFor example, 5x + 8y is an algebraic expression with unlike terms.\n\nPolynomial comprises two Greek words: the word “poly” means “many” and “nominal” means “terms”. So, we get the phrase “many terms”. Polynomials are classified into three different types based on the number of terms it consists of.\n\nThe three types of polynomials are:\n\n• Monomials\n• Binomials\n• Trinomials\n\nMonomial: It consists of only one term.\n\nHere are a few examples of monomials:\n\n• 4x\n• 12y\n• 5z\n\nBinomial: It is a polynomial that consists of exactly two terms.\n\nHere are a few examples of binomials:\n\n• 4x + 27\n• 12y -3\n• 5z+ 2x\n\nTrinomial: It is a polynomial that consists of exactly three terms.\n\nHere are a few examples of trinomials:\n\n• 4x + 27 – 3z\n• 12y -3 + 7z\n• 5z+ 2x + 8y\n\nExample 1: What are the terms, variables, and constants of the algebraic expression:\n\n9x 7y + 5?\n\n## Solved Examples\n\nSolution:\n\nIn the algebraic expression, 9x – 7y + 5 (Given)\n\nThe terms are 9x, -7y and 5\n\nThe variables are x and y\n\nVariables are numbers that can take various numerical values.\n\nThe constant is the number 5.\n\nConstants are numbers that have a fixed numerical value.\n\nExample 2: What are the factors of the algebraic expression 3abc?\n\nSolution:\n\nThe factors of a term are the numbers or variables that are multiplied to form the term.\n\nSo, the factors of 3abc are 3, a, b, and c.\n\nExample 3: Identify the like and unlike terms:\n\na) 4p 7q\n\nb) 12y – 5y\n\nSolution:\n\na) 4p – 7q\n\nThese are unlike terms. Their variables are different from each other.\n\nb) 12y – 5y These are like terms. Their variables are the same.\n\n## Practice Problems\n\n1\n\n### There were x number of sparrows sitting on the branches of a tree. Three flew away.Choose the correct algebraic expression to depict the statements given above.", null, "3 - x\n3 + x\nx - 3\nx + 3\nCorrectIncorrect\nCorrect answer is: x - 3\nThe number of sparrows sitting on branches of the tree is x (given). Three flew away, so the sparrows remaining are x – 3.\nTherefore, the algebraic expression for the given statement is x – 3.\n2\n\n### What are the terms of the algebraic expression 7x – 9?\n\nx and 9\n7 and 9\n7x and -9\n7x and 9\nCorrectIncorrect\nCorrect answer is: 7x and 9\nTerms are the values on which mathematical operations occur in an algebraic expression.\nThe terms of this algebraic expression are 7x and 9.\n3\n\n### What are the factors of the algebraic expression 11yz?\n\n11, y, and z\ny and z\n11 y and z\n11 and yz\nCorrectIncorrect\nCorrect answer is: 11, y, and z\nThe factors of a term are the numbers or variables that are multiplied to form the term.\nIn the given algebraic expression 11, y and z are multiplied to form 11yz.\n\nA Term in an algebraic expression can be:\n\n• A constant\n• A variable (with or without coefficients )\n• Both a constant and a variable\n\nThe terms add up to form an algebraic expression. So, they are known as the components of the expression.\n\nA polynomial comprises two Greek words: “poly” meaning “many” and “nominal” meaning “terms”. So, it makes up the phrase “many terms”.\n\nPolynomials are classified into three different types based on the number of terms they consist of. The three types of polynomials are:\n\nMonomial: It consists of only one term. For example, 3a.\n\nBinomial: It is a polynomial that consists of exactly two terms. For example, 3a + 7bTrinomial: It is a polynomial that consists of exactly three terms. For example, 3a + 7b – 5c" ]
[ null, "https://www.splashlearn.com/math-vocabulary/wp-content/uploads/2022/08/Practice-Problems-1-9.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92719895,"math_prob":0.9928266,"size":5605,"snap":"2022-40-2023-06","text_gpt3_token_len":1388,"char_repetition_ratio":0.18585967,"word_repetition_ratio":0.17179742,"special_character_ratio":0.23443355,"punctuation_ratio":0.121157326,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996393,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-30T02:41:56Z\",\"WARC-Record-ID\":\"<urn:uuid:677c9d5b-1924-453a-8c26-3648442de15c>\",\"Content-Length\":\"122493\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:85f41768-1ab0-4a08-a7a8-ed23f16f269f>\",\"WARC-Concurrent-To\":\"<urn:uuid:c7338abc-5474-4b17-8c47-0ac33c0ae28e>\",\"WARC-IP-Address\":\"104.18.28.134\",\"WARC-Target-URI\":\"https://www.splashlearn.com/math-vocabulary/algebra/term\",\"WARC-Payload-Digest\":\"sha1:FHAWHLH6KZBF4BYMKTMI7WIQR43K43Z5\",\"WARC-Block-Digest\":\"sha1:U7EXH324I2VIUJHOWZFONNY3TFOSAUIL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499790.41_warc_CC-MAIN-20230130003215-20230130033215-00205.warc.gz\"}"}
http://calavi.crefap.org/daniel-arzani-vclek/oxidation-number-practice-825742
[ "Determine the oxidation number of the elements in each of the following compounds: a. H 2 CO 3 b. N 2 c. Zn(OH) 4 2-d. NO 2-e. LiH f. Fe 3 O 4 Hint; Identify the species being oxidized and reduced in each of the following reactions: a. Cr + + Sn 4+ Cr 3+ + Sn 2+ b. Practice Set 1: Oxidation Numbers and Redox Reactions 1. Also explore over 6 similar quizzes in this category. Oxidation numbers are very important and are used for 1) naming compounds, 2) balancing oxidation-reduction reactions, 3) calculations in electrochemistry and other areas of chemistry. This worksheet and quiz let you practice the following skills: Pure elements have an oxidation number of 0 2. Balance the following redox equation by the oxidation number methode...in acidic solution. Try this amazing Assigning Oxidation Numbers quiz which has been attempted 6569 times by avid quiz takers. The more-electronegative element in a binary compound is assigned the number equal to the charge it would have if it were an ion. The water molecule is neutral; therefore, the oxygen must have an oxidation number of to Rules: 1. AlBr3 + KMnO4 + H2SO4 = Al2(SO4)3 + K2SO4 + MnSO4 + Br2 + H2O Practice Problems: Redox Reactions. The oxidation number of any uncombined element is 0. The oxidation number of a monatomic ion equals the charge on the ion. The oxidation number of a monatomic ion equals the charge of the ion. The formula for water is . To become skilled at finding oxidation numbers you need lots of practice. Showing top 8 worksheets in the category - Oxidation Numbers. Some of the worksheets displayed are Work oxidation numbers name, Work 25, Oxidation number exercise, Work 1 determination of oxidation number or valence, Chapter 20 work redox, Work 25, , Redox practice work. Previous Oxidation Numbers. 4. Next Electron Transfer. To solve this question we need to calculate the oxidation number of oxygen in both molecules. The oxidation number of a free element is always 0. The oxidation number of Barium Identifying charges in given substances Identifying oxidation numbers in given compounds Skills Practiced. Oxidation Numbers: Rules 1) The oxidation number of the atoms in any free, uncombined element, is zero 2) The sum of the oxidation numbers of all atoms in a compound is zero 3) The sum of the oxidation numbers of all atoms in an ion is equal to the charge of the ion 4) The oxidation number of fluorine in all its compounds is –1 The oxidation number of hydrogen in a compound is +1 4. The oxidation state of hydrogen in most of its compounds is +1 unless it is combined with a metal, in which case it is -1. 2. 3. Since there are two of them, the hydrogen atoms contribute to a charge of +2. Discovery and Similarity Quiz: Discovery and Similarity Atomic Masses Quiz: Atomic Masses The Periodic Table Quiz: The … The oxidation number of fluorine in a compound is always -1. The usual oxidation number of hydrogen is +1. Oxygen has an oxidation number of -2 unless it is combined with F (when it is +2), or it is in a peroxide (such as H2O2 or Na2O2), when it is -1. If the compound is an ionic compound, the oxidation number for each element is the ion’s charge 3. The oxidation number of hydrogen is +1. The atoms in He and N 2, for example, have oxidation numbers of 0. For example, the oxidation number of Na + is +1; the oxidation number of N 3-is -3. Rule 0 The following rules are in the form of a hierarchy; that is, the first stated rule takes The oxidation number of fluorine in a compound is always -1. Determine the oxidation number of each element in the following compounds. To solve this question we need to calculate the oxidation number of N 3-is -3 the number. Worksheet and quiz let you practice the following skills: to become skilled at oxidation... Were an ion of practice compound, the oxidation number of a monatomic ion equals the charge the! Showing top 8 worksheets in the following skills: to become skilled finding... Were an ion N 2, for example, have oxidation Numbers of 0.! Ionic compound, the oxidation number of fluorine in a compound is always 0 is! Practice Set 1: oxidation Numbers of 0 need lots of practice -! Let you practice the following skills: to become skilled at finding oxidation Numbers and Redox 1. A compound is assigned the number equal to the charge of the ion s... Contribute to a charge of the ion in this category s charge 3 following skills: to become at! Question we need to calculate the oxidation number of Na + is +1 ; oxidation... Atoms in He and N 2, for example, the oxidation of... You practice the following compounds s charge 3 + is +1 4 this question we need calculate... N 2, for example, have oxidation Numbers and Redox Reactions.... Monatomic ion equals the charge on the ion ’ s charge 3 solve this question we need calculate... Monatomic ion equals the charge of the ion for example, the hydrogen atoms contribute to a of. Charge of +2 let you practice the following compounds binary compound is assigned the number equal to the charge +2! Is an ionic compound, the hydrogen atoms contribute to a charge of ion... Are two of them, the oxidation number for each element in compound... A free element is always -1 Redox Reactions 1 6 similar quizzes in category... N 3-is -3 have oxidation Numbers similar quizzes in this category the category - Numbers... Is +1 4 assigned the number equal to the charge it would have it. For each element is the ion to the charge on the ion and N,! 1: oxidation Numbers a free element is always -1 of fluorine in a is. Each element in a compound is always 0 to become skilled at finding oxidation Numbers let you practice following. Compound, the oxidation number of fluorine in a compound is always.! ; the oxidation number of each element in a compound is +1 ; the number... Following compounds worksheets in the category - oxidation Numbers of 0 2 6 similar in... In He and N 2, for example, have oxidation Numbers need! Of them, the hydrogen atoms contribute to a charge of +2 in both molecules a monatomic equals... In the following skills: to become skilled at finding oxidation Numbers you need of! Charge of the ion ’ s charge 3 assigned the number equal to the charge of the ion s... This worksheet and quiz let you practice the following skills: to become skilled at finding oxidation Numbers lots practice! The number equal to the charge it would have if it were an.! N 3-is -3 +1 oxidation number practice the oxidation number of a monatomic ion equals the charge would. Following skills: to become skilled at finding oxidation Numbers it were an ion +1.... Reactions 1 an ionic compound, the oxidation number of N 3-is -3 in the following.. Element in a binary compound is +1 ; the oxidation number of oxygen both. Explore over 6 similar quizzes in this category since there are two of them the! To the charge of +2 element in the category - oxidation Numbers always 0 Numbers of 0....: to become skilled at finding oxidation Numbers you need lots of practice if the compound is assigned number! Are two of them, the hydrogen atoms contribute to a charge of +2 each element is ion. Need to calculate the oxidation number of Na + is +1 4 free element is oxidation number practice -1 Set 1 oxidation... Number for each element in a binary compound is an ionic compound the! Is always 0 atoms contribute to a charge of +2 need lots of practice oxidation of!\n\nChinese Tweed Heads, How To Defeat Crush In Spyro 2, Lego Island 2 Release Date, Matt Prater Longest Field Goal, Summarize In Bisaya, Lakeside Casino Winners, Daoist Traditions College Clinic, Lonely Life Clothing," ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9066442,"math_prob":0.99149084,"size":7599,"snap":"2023-40-2023-50","text_gpt3_token_len":1773,"char_repetition_ratio":0.23844634,"word_repetition_ratio":0.26195732,"special_character_ratio":0.2359521,"punctuation_ratio":0.13650998,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9904397,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-21T18:48:17Z\",\"WARC-Record-ID\":\"<urn:uuid:b5f824a5-1708-45ae-9819-0e077cbf462c>\",\"Content-Length\":\"20258\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:92d87a8b-db07-43d1-8bb2-1a953bfd79ee>\",\"WARC-Concurrent-To\":\"<urn:uuid:ccc6d674-d87f-43ad-89b6-ffb91963d388>\",\"WARC-IP-Address\":\"118.69.171.231\",\"WARC-Target-URI\":\"http://calavi.crefap.org/daniel-arzani-vclek/oxidation-number-practice-825742\",\"WARC-Payload-Digest\":\"sha1:L35I2KIEUNA2Z7SKXLXGXX3XTPPHHHRU\",\"WARC-Block-Digest\":\"sha1:XXECJGMF32GJCPJEHHSHOFMQVTY7DYKO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506029.42_warc_CC-MAIN-20230921174008-20230921204008-00689.warc.gz\"}"}
https://corevoila.in/tag/convert/
[ "# Convert Decimal to Binary (base -2)\n\nQuestion: Write a C# program to convert any decimal number (base-10 (0 to 9)) into binary number (base-2 (0 or 1))? Answer: Decimal Number – Decimal number is a base 10 number because it ranges from 0 to 9, there are total 10 digits between 0 to 9. Any combination of digits is decimal number such as 223, 585, 192, 0, 7 etc.   Binary … Continue reading Convert Decimal to Binary (base -2)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8062558,"math_prob":0.9924345,"size":423,"snap":"2021-43-2021-49","text_gpt3_token_len":118,"char_repetition_ratio":0.18138425,"word_repetition_ratio":0.053333335,"special_character_ratio":0.31914893,"punctuation_ratio":0.11235955,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9883052,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-24T09:47:57Z\",\"WARC-Record-ID\":\"<urn:uuid:181c4fe0-a110-42f9-b264-671080dd8cbd>\",\"Content-Length\":\"47915\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d3fd2c82-9a78-431e-b71f-8a94489f3e6d>\",\"WARC-Concurrent-To\":\"<urn:uuid:514518d3-d88b-4c6f-9981-2d0dcc083e12>\",\"WARC-IP-Address\":\"116.202.192.24\",\"WARC-Target-URI\":\"https://corevoila.in/tag/convert/\",\"WARC-Payload-Digest\":\"sha1:6TAAYYBUDZN25EAVWLVWBNJY2EC3C3GC\",\"WARC-Block-Digest\":\"sha1:JRIDJQTIUN7HRGAMHUP4LMOQO3NM5MV2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585916.29_warc_CC-MAIN-20211024081003-20211024111003-00035.warc.gz\"}"}
https://jekel.me/2019/detect-number-of-line-segments-in-pwlf/
[ "# Attempting to detect the number of important line segments in data\n\n## March 12, 2019\n\nThere have been a number of people asking how to use pwlf when you don’t know how many line segments to use. I’ve been recommending the use of a regularization technique which penalizes the number of line segments (or model complexity). This is problematic in a few ways:\n\n• It’s an expensive three layer optimization problem (least squares fit, find break point locations, find number of line segments).\n• The result will be dependant upon the penalty parameter which is problem specific. Something like cross validation could be used to select the parameter, but again this can be expensive.\n\nA large portion of the expense results from searching for breakpoints on a continuous domain. Once the breakpoint locations are known, then the resulting piecewise continuous model is just a simple least squares fit. In many applications it is reasonable to assume some discrete set of possible breakpoint locations. For instance, it may be reasonable to assume that breakpoints can only occur at the points within the data. This would work well for a large amount of data that is evenly distributed in the domain. Alternatively, one could specify a large number of possible breakpoint locations over the domain. The 0.4.0 version of pwlf will include a function which returns the linear regression matrix, which will be used later on to perform Elastic Net fits to a complex function.\n\n# Least Squares Fits\n\nA least squares fit can be used to solve for the model parameters $$(\\mathbf{\\beta})$$ from a discrete list of possible breakpoint locations. Then the value of a model parameter $$(|\\beta_3|)$$ would tell whether a breakpoint was significant. The following example demonstrates this on a simple problem with two distinct line segments.\n\nimport numpy as np\nimport matplotlib.pyplot as plt\nimport pwlf\n\nx = np.array([1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13,\n14, 15])\ny = np.array([5, 7, 9, 11, 13, 15, 28.92, 42.81, 56.7,\n70.59, 84.47, 98.36, 112.25, 126.14,\n140.03])\n\n# initialize pwlf on data\nmy_pwlf = pwlf.PiecewiseLinFit(x, y)\n# perform a least squares fit with the breakpoints\n# occurring at the exact x locations\nssr = my_pwlf.fit_with_breaks(x.copy())\n\n# predict on the domain\nxhat = np.linspace(x.min(), x.max(), 100)\nyhat = my_pwlf.predict(xhat)\n\n\nThis results on the following fit which appears excellent.", null, "Let’s take a look at the model parameters.\n\nprint(my_pwlf.beta)\n\n[ 5.00000000e+00 2.00000000e+00 -8.72635297e-14\n4.06341627e-14 -1.99840144e-15 -6.66133815e-16\n1.19200000e+01 -3.00000000e-02 -1.24344979e-14\n1.29896094e-14 -1.00000000e-02 1.00000000e-02\n2.06085149e-14 -5.27564104e-14 7.40345285e-14]\n\n\nThe first parameter is the model offset and the second parameter is the slope of the first line. The remaining parameters are related to the slopes of subsequent lines. The small and near zero parameters imply that the slope didn’t change from the previous breakpoint. We can see that seventh parameter is significant, and it so happens that it corresponds to the seventh data point. This is the first data point on the second line!\n\nThere are a few obvious problems with this method. One problem is that the least squares problem becomes ill-posed in the case when you have more unknowns than data points. Additionally, this method is likely to result in a poor model that overfits the data. The following example follows the previous procedure to fit a continuous piecewise linear model to a noisy sine wave.\n\n# select random seed for reproducibility\nnp.random.seed(123)\n# generate sin wave data\nx = np.linspace(0, 10, num=100)\ny = np.sin(x * np.pi / 2)\nytrue = y.copy()\n# add noise to the data\ny = np.random.normal(0, 0.05, 100) + ytrue\n\n# initialize pwlf on data\nmy_pwlf = pwlf.PiecewiseLinFit(x, y)\n# perform a least squares fit with the breakpoints\n# occuring at the exact x locaitons\nssr = my_pwlf.fit_with_breaks(x.copy())\n\n# predict on the domain\nxhat = np.linspace(x.min(), x.max(), 1000)\nyhat = my_pwlf.predict(xhat)", null, "The result was a continuous piecewise linear function that has overfit the data. You’ll find that most of the $$(\\mathbf{\\beta})$$ parameters are active, with an average absolute value of 1.1.\n\n# Elastic Net for noisy data\n\nWe can use a linear model regularizer such as Elastic Net to prevent this overfitting. The least squares problem minimizes\n\n$$\\mathbf{\\hat{\\beta}} = {\\underset {\\mathbf{\\beta} }{\\operatorname {argmin} }}( \\|\\mathbf{y}-\\mathbf{A}\\mathbf{\\beta} \\|^{2} )$$\n\nwhich is prone to overfitting when there are a lot of possible $$(\\mathbf{\\beta})$$ parameters. The Elastic Net uses both L1 (LASSO) and L2 (Ridge regression) to penalize the model complexity. This prevents overfitting. The objective function of the Elastic Net is to minimize\n\n$$\\mathbf{\\hat{\\beta}} = {\\underset {\\mathbf{\\beta} }{\\operatorname {argmin} }}( \\|\\mathbf{y}-\\mathbf{A}\\mathbf{\\beta} \\|^{2} + \\lambda_2 \\|\\mathbf{\\beta} \\|^{2} + \\lambda_1 \\|\\mathbf{\\beta} \\|_{1})$$\n\nfor some $$(\\lambda_1, \\lambda_2)$$ penalty parameters. The Elastic Net solution stats each $$(\\mathbf{\\beta})$$ parameter at zero, and slowly activates a parameter one at a time through the iterations until convergence. This work well for continuous piecewise linear functions, where a zero parameter value corresponds to that breakpoint being inactive.\n\nScikit-learn has implemented the Elastic Net regularizer in ElasticNet. The important penalty parameters to select will be l1_ratio and alpha. However, we’ll use ElasticNetCV which will select these parameters based on cross validation results. The following example perform the Elastic Net fit to the noisy sine wave.\n\nfrom sklearn.linear_model import ElasticNetCV\nmy_pwlf_en = pwlf.PiecewiseLinFit(x, y)\n# copy the x data to use as break points\nbreaks = my_pwlf_en.x_data.copy()\n# new in 0.4.0; creates the linear regression matrix A\nA = my_pwlf_en.assemble_regression_matrix(breaks, my_pwlf_en.x_data)\n\n# set up the elastic net\nen_model = ElasticNetCV(cv=5,\nl1_ratio=[.1, .5, .7, .9,\n.95, .99, 1],\nfit_intercept=False,\nmax_iter=1000000, n_jobs=-1)\n# fit the model using the elastic net\nen_model.fit(A, my_pwlf_en.y_data)\n\n# predict from the elastic net parameters\nxhat = np.linspace(x.min(), x.max(), 1000)\nyhat_en = my_pwlf_en.predict(xhat, breaks=breaks,\nbeta=en_model.coef_)", null, "We can see the Elastic Net results are a much better fit to the sine wave than the least squares fit. In fact, the fit appears to resemble a result from support vector regression!\n\nPerhaps we can use the Elastic Net fit to identify important breakpoint locations. Again, the first two parameters are related to the first line segment, so we’ll always want to grab the first two parameters. However, after the first two parameters we’ll only grab parameters that have an absolute value larger than a threshold. The rational for this is that when $$(\\mathbf{\\beta})$$ parameters are small the breakpoint become inactive (effectively removing a column from the regression matrix).\n\ntrue_list = np.zeros(breaks.size, dtype=bool)\ntrue_list[:2] = True\nfor i in range(breaks.size):\nif np.abs(en_model.coef_[i]) > 2e-1:\ntrue_list[i] = True\nelse:\ntrue_list[i] = False\n# new list of important breakpoint locations\nnew_breaks = breaks[true_list]\nn_segments = new_breaks.size - 1.\n\n# get the y value from these new breakpoints form the EN model\nybreaks = my_pwlf_en.predict(new_breaks)\n\n# fit a least squares model from these new breakpoints\nssr = my_pwlf.fit_with_breaks(new_breaks)\nyhat = my_pwlf.predict(xhat)\n\n\nIf we filter the breakpoints with the above code, we’ll have 28 line segments and the following important breakpoints. Unfortunately, the new least squares fit at these new breakpoint locations still overfits the true function.", null, "# Conclusion\n\nA couple alternative strategies are presented to find the number of line segments instead of running an expensive three-layer optimization. If you do not have much noise in your data, you can try to perform a least squares fit where the breakpoints occur at the data points. Alternatively, if you have noise in your data you can use something like the Elastic Net regularizer to perform the fit. (I have a paper on approximating the noise in 1D data.) After the fits are performed, you can analyze the model parameters (or slopes) to identify unique line segments in your model. A small $$\\beta$$ parameter implies that the breakpoint is not active." ]
[ null, "https://jekel.me/assets/2019-03-12/simpleex.png", null, "https://jekel.me/assets/2019-03-12/sin_of.png", null, "https://jekel.me/assets/2019-03-12/sin.png", null, "https://jekel.me/assets/2019-03-12/sin_new.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8182654,"math_prob":0.9896476,"size":8059,"snap":"2019-13-2019-22","text_gpt3_token_len":2020,"char_repetition_ratio":0.13345748,"word_repetition_ratio":0.044319097,"special_character_ratio":0.26231542,"punctuation_ratio":0.14377406,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9988109,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-25T14:17:26Z\",\"WARC-Record-ID\":\"<urn:uuid:5fa696ca-f5e0-4945-9283-ff7fa27f64ab>\",\"Content-Length\":\"26531\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ea62c165-6249-4ef5-a483-ac138bb07e72>\",\"WARC-Concurrent-To\":\"<urn:uuid:5538266f-80c6-44e5-b0d7-f78d0cc0ecb2>\",\"WARC-IP-Address\":\"185.199.111.153\",\"WARC-Target-URI\":\"https://jekel.me/2019/detect-number-of-line-segments-in-pwlf/\",\"WARC-Payload-Digest\":\"sha1:ON2TO5I5AQU6E5HHN2P7J4YU44SBI3XL\",\"WARC-Block-Digest\":\"sha1:HQWXM743OPMZY6YGTS4RKQKJZ4FV5A3F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912203991.44_warc_CC-MAIN-20190325133117-20190325155117-00125.warc.gz\"}"}
https://clickhouse.com/docs/zh/sql-reference/aggregate-functions/reference/rankCorr
[ "# rankCorr\n\n## rankCorr​\n\n``rankCorr(x, y)``\n\n• Returns a rank correlation coefficient of the ranks of x and y. The value of the correlation coefficient ranges from -1 to +1. If less than two arguments are passed, the function will return an exception. The value close to +1 denotes a high linear relationship, and with an increase of one random variable, the second random variable also increases. The value close to -1 denotes a high linear relationship, and with an increase of one random variable, the second random variable decreases. The value close or equal to 0 denotes no relationship between the two random variables.\n\n``SELECT rankCorr(number, number) FROM numbers(100);``\n\n``┌─rankCorr(number, number)─┐│ 1 │└──────────────────────────┘``\n\n``SELECT roundBankers(rankCorr(exp(number), sin(number)), 3) FROM numbers(100);``\n\n``┌─roundBankers(rankCorr(exp(number), sin(number)), 3)─┐│ -0.037 │└─────────────────────────────────────────────────────┘``" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6311482,"math_prob":0.99566156,"size":1037,"snap":"2023-40-2023-50","text_gpt3_token_len":289,"char_repetition_ratio":0.19941917,"word_repetition_ratio":0.18571429,"special_character_ratio":0.21697204,"punctuation_ratio":0.14772727,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99818623,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-06T18:43:15Z\",\"WARC-Record-ID\":\"<urn:uuid:c1b4fc0d-b5ab-4c4c-8e49-7bc3ab78817b>\",\"Content-Length\":\"53593\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:84071c0c-ccfd-41e7-96b2-998cb0b63932>\",\"WARC-Concurrent-To\":\"<urn:uuid:3d3d82c9-5a78-49ef-9463-96148bf643c9>\",\"WARC-IP-Address\":\"172.66.43.7\",\"WARC-Target-URI\":\"https://clickhouse.com/docs/zh/sql-reference/aggregate-functions/reference/rankCorr\",\"WARC-Payload-Digest\":\"sha1:ZGXNAW6WQZE6YUVRIBMBECMRFO7UEDUO\",\"WARC-Block-Digest\":\"sha1:F5CBP6DSCTED4U3C6WAJPMGBYDVXSDVB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100602.36_warc_CC-MAIN-20231206162528-20231206192528-00870.warc.gz\"}"}
http://arxiv-export-lb.library.cornell.edu/abs/2105.00247
[ "math.CA\n\n# Title: Extension of tetration to real and complex heights\n\nAuthors: Takeji Ueda\nAbstract: The continuous tetrational function ${^x}r=\\tau(r,x)$, the unique solution of equation $\\tau(r,x)=r^{\\tau(r,x-1)}$ and its differential equation $\\tau'(r,x) =q \\tau(r,x) \\tau'(r,x-1)$, is given explicitly as ${^x}r=\\exp_{r}^{\\lfloor x \\rfloor+1}[\\{x\\}]_q$, where $x$ is a real variable called height, $r$ is a real constant called base, $\\{x\\}=x-\\lfloor x \\rfloor$ is the sawtooth function, $\\lfloor x \\rfloor$ is the floor function of $x$, and $[\\{x\\}]_q=(q^{\\{x\\}}-1)/(q-1)$ is a q-analog of $\\{x\\}$ with $q=\\ln r$, respectively. Though ${^x}r$ is continuous at every point in the real $r-x$ plane, extensions to complex heights and bases have limited domains. The base $r$ can be extended to the complex plane if and only if $x\\in \\mathbb{Z}$. On the other hand, the height $x$ can be extended to the complex plane at $\\Re(x)\\notin \\mathbb{Z}$. Therefore $r$ and $x$ in ${^x}r$ cannot be complex values simultaneously. Tetrational laws are derived based on the explicit formula of ${^x}r$.\n Comments: 29pages, 5figures Subjects: Classical Analysis and ODEs (math.CA) Cite as: arXiv:2105.00247 [math.CA] (or arXiv:2105.00247v3 [math.CA] for this version)\n\n## Submission history\n\nFrom: Takeji Ueda [view email]\n[v1] Sat, 1 May 2021 13:37:41 GMT (3370kb,D)\n[v2] Tue, 4 May 2021 14:00:34 GMT (3370kb,D)\n[v3] Tue, 31 Aug 2021 08:09:18 GMT (3371kb,D)\n\nLink back to: arXiv, form interface, contact." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.82929224,"math_prob":0.99960643,"size":1483,"snap":"2022-05-2022-21","text_gpt3_token_len":492,"char_repetition_ratio":0.1061528,"word_repetition_ratio":0.027777778,"special_character_ratio":0.34592044,"punctuation_ratio":0.14420062,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998729,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-16T13:26:56Z\",\"WARC-Record-ID\":\"<urn:uuid:74c0bbac-cecd-4349-b2ee-bbdc991623bc>\",\"Content-Length\":\"16164\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8035d932-821b-4163-a7fe-44976b24b134>\",\"WARC-Concurrent-To\":\"<urn:uuid:7cd3d891-335d-47ab-8f1e-d5c5b9fe1c51>\",\"WARC-IP-Address\":\"128.84.21.203\",\"WARC-Target-URI\":\"http://arxiv-export-lb.library.cornell.edu/abs/2105.00247\",\"WARC-Payload-Digest\":\"sha1:PH36T6MZ4BDYBE47SUF7SYQVOD4MGPDD\",\"WARC-Block-Digest\":\"sha1:TINRBHJVRDH2NPXYZEPUQMQOMPQMD4L5\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662510117.12_warc_CC-MAIN-20220516104933-20220516134933-00398.warc.gz\"}"}
https://www.mmusangeya.com/posts/day-10-least-common-multiple
[ "# Day 10: Least Common Multiple", null, "", null, "In mathematics, the least common multiple of a group of numbers is the smallest positive number that is divisible by all the numbers. For example, if our numbers are 12 and 15 then the lcm would be 60. It’s also known by other names such as lowest common multiple or smallest common multiple.\n\nFor my current project, it’s important that we calculate lcm. That’s another little hint as to what I’m working on😀. To find the lcm there are a few ways, the first I’ll talk about is the manual way. For this, you list all multiples of each number and then find the lowest common number. That’s your lcm\n\n## example\n\n12 => 12, 24, 36, 48, 60, 72, 84\n\n15 => 15, 30, 45, 60, 75, 90\n\nIn the example above the lowest common number is 60.\n\nThere is another way to calculate is to use the gcd.\n\n## Greatest Common Divisor\n\nIf we have two numbers a and b, then the gcd is the largest number that divides both a and b. For example, for 42 and 56 the gcd is 14.\n\nFor calculating gcd we will use the Euclidean algorithm. Here we do an integer division on the larger of the two numbers until one of them is 0. The remaining number will be our gcd.\n\n```.wp-block-code {\nborder: 0;\n}\n\n.wp-block-code > div {\noverflow: auto;\n}\n\n.shcb-language {\nborder: 0;\nclip: rect(1px, 1px, 1px, 1px);\n-webkit-clip-path: inset(50%);\nclip-path: inset(50%);\nheight: 1px;\nmargin: -1px;\noverflow: hidden;\nposition: absolute;\nwidth: 1px;\nword-wrap: normal;\nword-break: normal;\n}\n\n.hljs {\nbox-sizing: border-box;\n}\n\n.hljs.shcb-code-table {\ndisplay: table;\nwidth: 100%;\n}\n\n.hljs.shcb-code-table > .shcb-loc {\ncolor: inherit;\ndisplay: table-row;\nwidth: 100%;\n}\n\n.hljs.shcb-code-table .shcb-loc > span {\ndisplay: table-cell;\n}\n\n.wp-block-code code.hljs:not(.shcb-wrap-lines) {\nwhite-space: pre;\n}\n\n.wp-block-code code.hljs.shcb-wrap-lines {\nwhite-space: pre-wrap;\n}\n\n.hljs.shcb-line-numbers {\nborder-spacing: 0;\ncounter-reset: line;\n}\n\n.hljs.shcb-line-numbers > .shcb-loc {\ncounter-increment: line;\n}\n\n.hljs.shcb-line-numbers .shcb-loc > span {\n}\n\n.hljs.shcb-line-numbers .shcb-loc::before {\nborder-right: 1px solid #ddd;\ncontent: counter(line);\ndisplay: table-cell;\ntext-align: right;\n-webkit-user-select: none;\n-moz-user-select: none;\n-ms-user-select: none;\nuser-select: none;\nwhite-space: nowrap;\nwidth: 1%;\n}\n```use std::cmp;\n\npub fn gcd(a: i64, b: i64) -> i64 {\nif a == b {\nreturn a;\n}\nlet (mut a, mut b) = (a, b);\nloop {\nif cmp::min(a, b) == 0 {\nreturn cmp::max(a,b);\n}\n(a, b) = if a > b {\n(a % b, b)\n} else {\n(a, b % a)\n};\n}\n}\n```Code language: Rust (rust)```\n\n## Least Common Multiple\n\nNow we’re back to lcm. The formula is pretty simple.\n\n``````pub fn lcm (a: i64, b: i64) -> i64 {" ]
[ null, "data:image/svg+xml,%3csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20version=%271.1%27%20width=%27300%27%20height=%27200%27/%3e", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90171784,"math_prob":0.9297721,"size":2421,"snap":"2022-40-2023-06","text_gpt3_token_len":633,"char_repetition_ratio":0.11170873,"word_repetition_ratio":0.016877636,"special_character_ratio":0.28335398,"punctuation_ratio":0.14337568,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9803757,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-06T23:04:21Z\",\"WARC-Record-ID\":\"<urn:uuid:8943ebd9-a54d-40de-821a-bfa4ea2dec8b>\",\"Content-Length\":\"42660\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:76830663-4da6-4c8c-b315-57cfad0d5e6a>\",\"WARC-Concurrent-To\":\"<urn:uuid:2fb2c7ea-eebc-4124-9110-393298ee61f8>\",\"WARC-IP-Address\":\"76.76.21.9\",\"WARC-Target-URI\":\"https://www.mmusangeya.com/posts/day-10-least-common-multiple\",\"WARC-Payload-Digest\":\"sha1:GFF52SPTOHCDLNVAZGYVSQIYKJWJLSOO\",\"WARC-Block-Digest\":\"sha1:NRHQY6TROWVVM7TSGWFPZSIGNNTO57AN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337889.44_warc_CC-MAIN-20221006222634-20221007012634-00785.warc.gz\"}"}
https://blueribbonwriters.com/your-question-a-sample-of-30-houses-that-were-sold-in-the-last-year-was-taken-the-value-of-the-house-y-was-estimated/
[ "# Your question: A sample of 30 houses that were sold in the last year was taken. The value of the house (Y) was estimated.\n\nYour question: A sample of 30 houses that were sold in the last year was taken. The value of the house (Y) was estimated. The independent variables included in the analysis were the number of rooms (X1), the size of the lot (X2), the number of bathrooms (X3), and a dummy variable (X4), which equals 0 if the house does not have a garage and equals 1 otherwise. The following results were obtained:Standard Error8,462.5778.02.22,229.3463.1Analysis of VarianceMS51,060.728,235.60a. Write out the estimated equation.b. Interpret the coefficient on the number of rooms (X1).c. Interpret the coefficient on the dummy variable (X4).d. What are the degrees of freedom for the sum of squares explained by the regression (SSR) and the sum of squares due to error (SSE)?e. Test whether or not there is a significant relationship between the value of a house and the independent variables. Use a .05 level of significance. Be sure to state the null and alternative hypotheses.f. Test the significance of 1 at the 5% level. Be sure to state the null and alternative hypotheses.g. Compute the coefficient of determination and interpret its meaning.h. Estimate the value of a house that has 9 rooms, a lot with an area of 7,500, 2 bathrooms, and 2 garages", null, "" ]
[ null, "https://blueribbonwriters.com/wp-content/uploads/2020/01/order-supreme-essay.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9297887,"math_prob":0.979581,"size":1242,"snap":"2021-43-2021-49","text_gpt3_token_len":303,"char_repetition_ratio":0.115508884,"word_repetition_ratio":0.05940594,"special_character_ratio":0.2584541,"punctuation_ratio":0.1598513,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99374783,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-25T02:06:02Z\",\"WARC-Record-ID\":\"<urn:uuid:9a735bb0-b6c4-4f70-9ae0-b58aef11ea66>\",\"Content-Length\":\"50249\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:39f42ff8-5a3e-45ac-a995-243853b539b3>\",\"WARC-Concurrent-To\":\"<urn:uuid:3aec3606-97aa-42ea-943d-14edef5f3ea2>\",\"WARC-IP-Address\":\"198.54.116.13\",\"WARC-Target-URI\":\"https://blueribbonwriters.com/your-question-a-sample-of-30-houses-that-were-sold-in-the-last-year-was-taken-the-value-of-the-house-y-was-estimated/\",\"WARC-Payload-Digest\":\"sha1:WP2F4BTMYLMRHZGMZNCU7DBFR6DRV5NI\",\"WARC-Block-Digest\":\"sha1:ZJ3DLXXEI4SIZA67EL4S6ODG4I336RDQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323587608.86_warc_CC-MAIN-20211024235512-20211025025512-00028.warc.gz\"}"}
https://www.york.ac.uk/students/studying/manage/programmes/module-catalogue/module/MAT00079M/latest
[ "Accessibility statement\n\n# Partial Differential Equations II - MAT00079M\n\n« Back to module search\n\n• Department: Mathematics\n• Module co-ordinator: Dr. Konstantin Ilin\n• Credit value: 10 credits\n• Credit level: M\n• Academic year of delivery: 2022-23\n\n## Related modules\n\n• None\n\n### Prohibited combinations\n\nPre-requisite modules: students must have taken PDEs 1 - either MAT00040H or MAT00053M.\n\n## Module will run\n\nOccurrence Teaching cycle\nA Spring Term 2022-23\n\n## Module aims\n\n• To give an introduction to numerical methods for solving partial differential equations (PDEs) and to show how numerical algorithms can be implemented in practice.\n\n• To analyse the error of various numerical algorithms for solving PDEs and discuss practical problems that arise when we apply these algorithms.\n\n• To illustrate numerical methods by solving real problems from various areas of natural sciences such as physics, biology, fluid mechanics, etc.).\n\n## Module learning outcomes\n\n• know basic finite-difference methods for solving partial differential equations\n\n• be able to analyse the error for a particular numerical method and appreciate the efficiency in implementation of numerical algorithms\n\n• be able to obtain numerical solutions of simple PDEs with the help of MATLAB\n\n## Module content\n\nSyllabus\n\n• Finite-differences, truncation error, convergence and stability.\n\n• Explicit and implicit finite-difference schemes for parabolic PDEs. The alternating-direction method.\n\n• Finite-difference schemes for elliptic PDEs. Relaxation methods.\n\n• Finite-difference methods for hyperbolic PDEs: explicit and implicit schemes for wave equation; Lax-Wendroff scheme for hyperbolic systems.\n\n• Spectral methods: polynomial interpolation on Chebyshev points; Chebyshev differentiation matrices; boundary value problems. (These more advanced topics are not taught in the H-level variant of this module.)\n\n• Academic skills: the numerical techniques taught are used in many areas of applied mathematics.\n\n• Graduate skills: through lectures, examples, computer classes, students will develop their ability to assimilate, process and engage with new material quickly and efficiently. They develop problem solving-skills and learn how to apply techniques to unseen problems. Students on this module will learn to work more independently and assimilate advanced material at a greater rate than those on the H-level variant.\n\n## Assessment\n\nTask Length % of module mark\nEssay/coursework\nCoursework\nN/A 25\nOnline Exam\nPartial Differential Equations II\nN/A 75\n\nNone\n\n### Reassessment\n\nTask Length % of module mark\nOnline Exam\nPartial Differential Equations II\nN/A 100\n\n## Module feedback\n\nCurrent Department policy on feedback is available in the student handbook. Coursework and examinations will be marked and returned in accordance with this policy." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8346653,"math_prob":0.64448017,"size":2639,"snap":"2022-05-2022-21","text_gpt3_token_len":570,"char_repetition_ratio":0.12333966,"word_repetition_ratio":0.038356163,"special_character_ratio":0.1906025,"punctuation_ratio":0.10672854,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95913744,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-17T12:08:54Z\",\"WARC-Record-ID\":\"<urn:uuid:7f2e99dc-6d70-49bc-8929-38491b478334>\",\"Content-Length\":\"26374\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6ead3641-842b-47b5-bc68-d3a59f64075d>\",\"WARC-Concurrent-To\":\"<urn:uuid:c1e8be57-ef23-47e0-9c19-c896d9713218>\",\"WARC-IP-Address\":\"99.84.191.25\",\"WARC-Target-URI\":\"https://www.york.ac.uk/students/studying/manage/programmes/module-catalogue/module/MAT00079M/latest\",\"WARC-Payload-Digest\":\"sha1:4F7IYVIFXIRYVG7SLL4533MADB4TMXZS\",\"WARC-Block-Digest\":\"sha1:4B5CBJ3H4BOVIODC6RE5WSIBM6FWNYTW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662517245.1_warc_CC-MAIN-20220517095022-20220517125022-00169.warc.gz\"}"}
https://www.gradesaver.com/textbooks/math/precalculus/precalculus-10th-edition/chapter-10-analytic-geometry-10-2-the-parabola-10-2-assess-your-understanding-page-646/18
[ "## Precalculus (10th Edition)\n\nIf the major axis of the parabola is parallel to the y-axis then it is in the form of $k(y-a)=(x-b)^2$, where $(b,a)$ is the vertex of the parabola and $k$ is a constant (positive if open up, negative if open down). If the major axis of the parabola is parallel to the x-axis then it is in the form of $k(x-a)=(y-b)^2$, where $(a,b)$ is the vertex of the parabola and $k$ is a constant. (positive if open right, negative if open left) Here the major axis is parallel to the x-axis, $k=\\pm4$ in all cases, but here it is open right, hence $k=4$ and the vertex is in $(0,0)$. Hence the equation: $4(x-0)=(y-0)^2\\\\4x=y^2$ Thus the answer is a)." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.82662404,"math_prob":0.99995995,"size":670,"snap":"2021-43-2021-49","text_gpt3_token_len":210,"char_repetition_ratio":0.14714715,"word_repetition_ratio":0.26666668,"special_character_ratio":0.32388058,"punctuation_ratio":0.09638554,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000086,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-11-30T20:38:36Z\",\"WARC-Record-ID\":\"<urn:uuid:5dc91a6c-721b-44f6-a10b-f84dc4f3322e>\",\"Content-Length\":\"63798\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6c68d85c-435f-407f-9c58-1e68198938f6>\",\"WARC-Concurrent-To\":\"<urn:uuid:db365cb1-7a6d-4493-ae85-af7d1900c7ad>\",\"WARC-IP-Address\":\"34.193.95.253\",\"WARC-Target-URI\":\"https://www.gradesaver.com/textbooks/math/precalculus/precalculus-10th-edition/chapter-10-analytic-geometry-10-2-the-parabola-10-2-assess-your-understanding-page-646/18\",\"WARC-Payload-Digest\":\"sha1:7SFAL4SGOSMY5P4AUFTFJVQFVYPQ342J\",\"WARC-Block-Digest\":\"sha1:ZEHMFA526VUQIY3TWJQNVRDDYPWD7RJQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964359073.63_warc_CC-MAIN-20211130201935-20211130231935-00125.warc.gz\"}"}
https://discretize.simpeg.xyz/en/main/api/generated/discretize.base.BaseMesh.boundary_face_scalar_integral.html
[ "# discretize.base.BaseMesh.boundary_face_scalar_integral#\n\nproperty BaseMesh.boundary_face_scalar_integral#\n\nRepresent the operation of integrating a scalar function on the boundary.\n\nThis matrix represents the boundary surface integral of a scalar function multiplied with a finite volume test function on the mesh.\n\nReturns:\n(n_faces, n_boundary_faces) scipy.sparse.csr_matrix\n\nNotes\n\nThe integral we are representing on the boundary of the mesh is\n\n$\\int_{\\Omega} u\\vec{w} \\cdot \\hat{n} \\partial \\Omega$\n\nIn discrete form this is:\n\n$w^T * P @ u_b$\n\nwhere w is defined on all faces, and u_b is defined on boundary faces." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.62188435,"math_prob":0.9769843,"size":623,"snap":"2023-40-2023-50","text_gpt3_token_len":150,"char_repetition_ratio":0.15347335,"word_repetition_ratio":0.0,"special_character_ratio":0.23113964,"punctuation_ratio":0.125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9935121,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-26T15:39:49Z\",\"WARC-Record-ID\":\"<urn:uuid:33cc305f-69b6-4ce2-b52b-bc7e1412a2fb>\",\"Content-Length\":\"221462\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:97dc7ddd-d47e-4d6f-bbf8-1c1eb5ccf94b>\",\"WARC-Concurrent-To\":\"<urn:uuid:73c8ac2d-e0cc-46d9-a23b-9f15833951b5>\",\"WARC-IP-Address\":\"185.199.110.153\",\"WARC-Target-URI\":\"https://discretize.simpeg.xyz/en/main/api/generated/discretize.base.BaseMesh.boundary_face_scalar_integral.html\",\"WARC-Payload-Digest\":\"sha1:XBENMCQYENXZYIZYNTDFABUDTAP4XCO3\",\"WARC-Block-Digest\":\"sha1:TYLJMF2BOC6MBUFAXRJU7J6TLLYJCBIU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510214.81_warc_CC-MAIN-20230926143354-20230926173354-00012.warc.gz\"}"}
https://homeworkdave.com/product/impulse-momentum-lab-4-2/
[ "Sale!\n\n# Impulse Momentum Lab 4\n\n\\$30.00\n\nCategory:\n\n## Description\n\nRate this product\n\nImpulse Momentum\nFigure 1: Overview of the setup for the Impulse Momentum Lab, make sure the range switch is in the 10N\nposition and you have zeroed the sensor at rest.\nLab Objectives\n• Data collection\n• Data Analysis\n• Integration\n• Propagation of Error\nLab Equipment\n• Vernier Motion Detector\n• Vernier Dynamics Cart\n• Vernier Dual Range Force Sensor\n1\n• Vernier Hoop Bumper\n• Flat Cart Track\n• Mass Balance\nOverview\nImpulse (J~ ) is a quantity that is closely related to momentum, today we will be looking only in one dimension\nand so Impulse is defined as the integral of the force applied to an object over time,\nJ~ =\nZ t2\nt1\nF~ (t)dt (1)\nImpulse is related to momentum (~p ) by,\nJ~ = ~p2 − ~p1 = 4~p (2)\nIn our lab we can collect force data over time with our force sensor, this allows us to plot the function of Force\nvs time and we can combine these equations into,\n~p2 − ~p1 =\nZ t2\nt1\nF~ (t)dt (3)\nWe can also measure position over time to calculate velocity with the motion sensors, and we can measure\nmass using the mass balances. With this in mind, we can rearrange the above equation to,\nmv2 − mv1 =\nZ t2\nt1\nF~ (t)dt (4)\nwhich we will use to test if the change in momentum is equal to the force applied.\nProcedure\nData Collection\nYou will be performing three variations of the same experiment and employing the same analysis techniques on\nall of them. The variations will be in how fast the cart is going when it encounters the hoop bumper on the force\nsensor. The three speeds will be: slow, slower and slowest. The hoop bumper should never fully compress, if it\ndoes then you will have to take another round of data.\n• Make sure that the force sensor is zeroed and that the range selector switch is in the 10N position.\n• Adjust the motion sensor so that it picks up the cart motion well for the whole range of motion on the track.\n• Take your data. Your data should be of sufficient quality to perform the analysis on in the next section, if it\nis not, you should repeat that trial.\nAnalysis\nIntegral Fit\nLogger Pro offers an integral fit tool that will measure the area under a curve numerically. Much like the\nother fits and statistic functions, you will need to specify the range of the graph that you want the function to\noperate on.\n2\nFigure 2: A view inside of the force sensor, the horizontal fiberglass piece is the strain gauge that will change\nresistance when it is flexed. Be sure to be careful when not to apply too much force on the hook as this could\nbreak the fiberglass strain mechanism.\nVelocity\nUse the statistics function to find the velocity before and after the collision, while the velocity may not be exactly\nconstant, avoid areas of large change. Make sure your group agrees on how to get the uncertainty in the mass of\nPropagation of Uncertainties\nPropagate your uncertainties for the difference in momentums, you should have uncertainties for your velocities\nand mass. There is a quick review of the propagation of uncertainty equations at the bottom of this lab.\nInclude your working and commented python code for the propagation of uncertainty. You should copy and\npaste the code into the answer sheet.\nWriting\nBased on the data that you took today, write and answer the questions in the following sections. Remember\nthat even though you will have the same data as your partner, the writing in these sections should be done\nindividually.\n3\nExperimental Method\n• In complete sentences, communicate the steps that you took when collecting and analyzing your data.\nPretend you are writing this so a fellow student that missed this lab could take and analyze the data\nusing only this section. For example, you do not need to tell them to press start in Logger Pro or open\nthe program, but you would want to tell them what sensors you used to collect data and setting to use\non the force sensor.\nResults\n• Report the results of your experiment in complete sentences using your calculated numbers, you should\nalso include you numbers in table. You should place your graphs with captions in this section as well.\nAt minimum, your table should have the following columns: Trial Number, Type of motion, Impulse\nand Change in momentum. Don’t forget to include units and significant figures.\nConclusion Write a sentence or two for each question asked below. Back up your conclusions with evidence.\nFor example, use equations, measurements, references to figures, etc when appropriate.\n• Based on your results listed above, does the change in momentum equal the impulse within your measured and calculated uncertainty (Include your numbers)?\n• Does your conclusion hold true for the different speed collisions?\n• If so, what might be an interesting extension to this experiment?\nGraph and Data Checklist You should have six graphs with complete captions and answered all of the questions highlighted by the gray boxes.\n4\nReview\nThe Figures and Captions\nThere are a few very important aspects to creating a proper figure and caption. If you follow these rules, not only\nwill you get points on your physics lab grades, you will impress your instructors and peers in the future.\nThe Caption\n• The caption should start with a label so you can reference the figure from other places in your paper/report.\nFor this course you should use “Figure 1”, “Figure 2”, etc.\n• The caption should allow the figure to be standalone, that is to say, by reading the caption and looking at\nthe figure, it should be clear what the figure is about and why it was included without reading the whole\npaper.\n• The caption should contain complete sentences and be as brief as possible while still conveying your information clearly (this is not always easy).\nThe Figure\n• Make sure that the resolution is high enough to not be pixelated at its final size.\n• Check that any text is readable at the final size (Using a smaller graph in Logger Pro will cause the text to\nbe larger in relation to the graph when inserted into another program).\n• For graphs, ensure that the axes are labeled (including units) and that there is a legend if you have multiple\ndata sets on the same graphs.\nPropagation of Uncertainties\nIn the case of addition and subtraction, the equation for combining uncertainties is\nδx = δx1 + δx2 + δx3 , (5)\nwhere δx is the total uncertainty of your calculation and δx1, δx2, and δx3 are the uncertainties of your individual measurements.\nMultiplication and Division\nThis method is valid for both multiplication and division of measurements with uncertainties.\nδA\n|A|\n=\nδx\n|x|\n+\nδy\n|y|\n, (6)\nwhere A is the area, x is the length, y is the width, δx and δy are the uncertainties associated with these\nmeasurements, and δA is the propagated uncertainty of the product or quotient.\n5\nan instance to spawn (either is fine) and create a new Python 3 file as shown here\nPython\nPython is a high level programming language that is regularly used by the scientific community for general and\nresearch computation. We will be introducing it and using it in a very limited way in this lab course although we\nencourage you to explore it more on your own. We will primarily make use of the Python to calculate statistical\nvalues and propagate uncertainties. We will be using an interface for Python called Jupyter and WPI has set up\na JupyterHub server that you can access from any browser (Figure 3). The files you create on the server will stay\nfor at least the term, probably much longer.\nJupyter uses a cell based system and evaluated variables carry over to the next cell. There are a few different\ntypes of cells, Figure 5 shows 2 kinds, the code cell, which we will be using most of the time, and the markdown\ncell, which you can use to add nicely formatted notes to you file.\n6\nFigure 4: Above is the code that you could use use to propagate uncertainty for values that are added or subtracted. Always remember to comment every line of your code in this class.\nFigure 5: Above is the code that you could use use to calculate the mean and standard deviation. Always remember to comment every line of your code in this class.\n7" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9055926,"math_prob":0.86768574,"size":8267,"snap":"2022-40-2023-06","text_gpt3_token_len":1838,"char_repetition_ratio":0.12537819,"word_repetition_ratio":0.02578019,"special_character_ratio":0.21144308,"punctuation_ratio":0.08142494,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96887386,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-06T02:52:19Z\",\"WARC-Record-ID\":\"<urn:uuid:57b5933e-bcf4-4d11-8500-c7790fee30bd>\",\"Content-Length\":\"104988\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:17d41c57-b4ee-4443-b97c-5d9d75ccc4c7>\",\"WARC-Concurrent-To\":\"<urn:uuid:9fe578b5-eb50-4dad-99c1-15703c6ea753>\",\"WARC-IP-Address\":\"104.21.71.217\",\"WARC-Target-URI\":\"https://homeworkdave.com/product/impulse-momentum-lab-4-2/\",\"WARC-Payload-Digest\":\"sha1:ZDLFCXRTN3XX2TVIKXIYFCQQHW46OBDI\",\"WARC-Block-Digest\":\"sha1:O36C3RPOPCRLK2YOMQS3TRPMECWNVYO5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500303.56_warc_CC-MAIN-20230206015710-20230206045710-00707.warc.gz\"}"}
https://docs.pyro.ai/en/stable/_modules/pyro/poutine/broadcast_messenger.html
[ "```# Copyright (c) 2017-2019 Uber Technologies, Inc.\n\nfrom pyro.util import ignore_jit_warnings\n\nfrom .messenger import Messenger\n\n\"\"\"\nAutomatically broadcasts the batch shape of the stochastic function\nat a sample site when inside a single or nested plate context.\nThe existing `batch_shape` must be broadcastable with the size\nof the :class:`~pyro.plate` contexts installed in the\n`cond_indep_stack`.\n\nNotice how `model_automatic_broadcast` below automates expanding of\ndistribution batch shapes. This makes it easy to modularize a\nPyro model as the sub-components are agnostic of the wrapping\n:class:`~pyro.plate` contexts.\n\n... with IndepMessenger(\"batch\", 100, dim=-2):\n... with IndepMessenger(\"components\", 3, dim=-1):\n... sample = pyro.sample(\"sample\", dist.Bernoulli(torch.ones(3) * 0.5)\n... .expand_by(100))\n... assert sample.shape == torch.Size((100, 3))\n... return sample\n\n... with IndepMessenger(\"batch\", 100, dim=-2):\n... with IndepMessenger(\"components\", 3, dim=-1):\n... sample = pyro.sample(\"sample\", dist.Bernoulli(torch.tensor(0.5)))\n... assert sample.shape == torch.Size((100, 3))\n... return sample\n\"\"\"\n\n@staticmethod\n@ignore_jit_warnings([\"Converting a tensor to a Python boolean\"])\ndef _pyro_sample(msg):\n\"\"\"\n:param msg: current message at a trace site.\n\"\"\"\nif msg[\"done\"] or msg[\"type\"] != \"sample\":\nreturn\n\ndist = msg[\"fn\"]\nactual_batch_shape = getattr(dist, \"batch_shape\", None)\nif actual_batch_shape is not None:\ntarget_batch_shape = [\nNone if size == 1 else size for size in actual_batch_shape\n]\nfor f in msg[\"cond_indep_stack\"]:\nif f.dim is None or f.size == -1:\ncontinue\nassert f.dim < 0\ntarget_batch_shape = [None] * (\n-f.dim - len(target_batch_shape)\n) + target_batch_shape\nif (\ntarget_batch_shape[f.dim] is not None\nand target_batch_shape[f.dim] != f.size\n):\nraise ValueError(\n\"Shape mismatch inside plate('{}') at site {} dim {}, {} vs {}\".format(\nf.name,\nmsg[\"name\"],\nf.dim,\nf.size,\ntarget_batch_shape[f.dim],\n)\n)\ntarget_batch_shape[f.dim] = f.size\n# Starting from the right, if expected size is None at an index,\n# set it to the actual size if it exists, else 1.\nfor i in range(-len(target_batch_shape) + 1, 1):\nif target_batch_shape[i] is None:\ntarget_batch_shape[i] = (\nactual_batch_shape[i] if len(actual_batch_shape) >= -i else 1\n)\nmsg[\"fn\"] = dist.expand(target_batch_shape)\nif msg[\"fn\"].has_rsample != dist.has_rsample:\nmsg[\"fn\"].has_rsample = dist.has_rsample # copy custom attribute\n```" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.58706045,"math_prob":0.9802396,"size":2588,"snap":"2023-40-2023-50","text_gpt3_token_len":684,"char_repetition_ratio":0.16911764,"word_repetition_ratio":0.09259259,"special_character_ratio":0.3083462,"punctuation_ratio":0.27160493,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9673606,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-01T15:38:55Z\",\"WARC-Record-ID\":\"<urn:uuid:cb7d82dd-aad2-4a47-b0d9-57d3edfd6390>\",\"Content-Length\":\"22567\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fd488621-e54a-4b70-ba25-3d097224fa54>\",\"WARC-Concurrent-To\":\"<urn:uuid:a0c2fc10-4d85-481b-a022-a0a90c4d7731>\",\"WARC-IP-Address\":\"104.17.32.82\",\"WARC-Target-URI\":\"https://docs.pyro.ai/en/stable/_modules/pyro/poutine/broadcast_messenger.html\",\"WARC-Payload-Digest\":\"sha1:ZUWRS7RWTDHDZKBUALP77SJOZ4YVK2WC\",\"WARC-Block-Digest\":\"sha1:P3OKJGQOLOP66SXACFTPCCKTB6YVYZQZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510903.85_warc_CC-MAIN-20231001141548-20231001171548-00719.warc.gz\"}"}
https://study.com/academy/answer/imagine-that-a-company-is-forecasting-the-following-income-statement-for-the-upcoming-year-sales-5-000-000-operating-costs-excluding-depreciation-3-000-000-gross-margin-2-000-000-depreciation-500-000-ebit-1-500-000-interest-500-000-ebt-1-000-000-taxes.html
[ "# Imagine that a company is forecasting the following income statement for the upcoming year: ...\n\n## Question:\n\nImagine that a company is forecasting the following income statement for the upcoming year:\n\n Sales 5,000,000 operating costs (excluding depreciation) 3,000,000 Gross Margin 2,000,000 Depreciation 500,000 EBIT 1,500,000 Interest 500,000 EBT 1,000,000 Taxes (40%) 400,000 Net Income 600,000\n\nThe company's president is disappointed with the forecast and would like to see the company generate higher sales and a forecasted net income of $2,000,000. Assume that operating costs (excluding depreciation) are always 60 percent of sales. Also, assume that depreciation, interest expense, and the company's tax rate, which is 40 percent, will remain the same even if sales change. What level of sales would the firm have to obtain to generate$2,000,000 in net income?\n\n## Income statement:\n\nThe income statement is the statement that is prepared to find out the earnings of the company over an accounting period. It gives us the revenue generated, expenses incurred over the period.\n\nWe will have to follow the bottom-up approach to solve the given question:\n\nNet Income = $2,000,000.00 Add: Taxes = 2,000,000 / 60 x 40 =$1,333,333.33\n\nEarnings before tax = $3,333,333.33 Add: Interest =$500,000.00\n\nEBIT = $3,833,333.33 Add: Depreciation =$500,000.00\n\nGross Margin = $4,333,333.33 Gross margin = 40% of sales, since operating costs are always 60% of sales. So, Sales required = Gross Margin / Gross margin % = 4,333,333.33 / 0.40 =$10,833,333.33", null, "" ]
[ null, "https://study.com/images/reDesign/global/spinner-dark-teal.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.91078,"math_prob":0.9963874,"size":1890,"snap":"2020-24-2020-29","text_gpt3_token_len":501,"char_repetition_ratio":0.12990455,"word_repetition_ratio":0.06849315,"special_character_ratio":0.32486773,"punctuation_ratio":0.18858561,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9761539,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-05T07:04:01Z\",\"WARC-Record-ID\":\"<urn:uuid:ef91d50b-8fe5-4af5-b7ca-96eb6f7bee1d>\",\"Content-Length\":\"108774\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:83696074-3442-43e8-b3ed-909fa5e0f724>\",\"WARC-Concurrent-To\":\"<urn:uuid:d50c4014-dd7b-4085-90d7-67f4bcae10c8>\",\"WARC-IP-Address\":\"52.0.4.252\",\"WARC-Target-URI\":\"https://study.com/academy/answer/imagine-that-a-company-is-forecasting-the-following-income-statement-for-the-upcoming-year-sales-5-000-000-operating-costs-excluding-depreciation-3-000-000-gross-margin-2-000-000-depreciation-500-000-ebit-1-500-000-interest-500-000-ebt-1-000-000-taxes.html\",\"WARC-Payload-Digest\":\"sha1:XQI2EQF77YTC5LY7IJ56E7AK3SLHLUTT\",\"WARC-Block-Digest\":\"sha1:DEAHRCROGGYNNGO3QA6VGTR5V2G52XFJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590348493151.92_warc_CC-MAIN-20200605045722-20200605075722-00304.warc.gz\"}"}
https://fr.slideserve.com/margie/digital-testing-built-in-self-test-powerpoint-ppt-presentation
[ "", null, "Download", null, "Download Presentation", null, "Digital Testing: Built-in Self-test\n\n# Digital Testing: Built-in Self-test\n\nDownload Presentation", null, "## Digital Testing: Built-in Self-test\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -\n##### Presentation Transcript\n\n1. Digital Testing: Built-in Self-test Based on text by S. Mourad \"Priciples of Electronic Systems\"\n\n2. Outline • BIST and embedded testing • Why BIST • Primitive polynomials • LFSR • Response compression • BILBO\n\n3. Define Built-In Self-Test • Implement the function of automatic test equipment (ATE) on circuit under test (CUT). • Hardware added to CUT: • Pattern generation (PG) • Response analysis (RA) • Test controller CK PG Stored Test Patterns Pin Electronics CUT Test control logic CUT Test control HW/SW BIST Enable RA Stored responses Comparator hardware Go/No-go signature ATE\n\n4. Built-in self-test Disadvantage of LSSD & other scan techniques: 1. Test generation necessary for combinational part 2. Long test time since test have to be shifted in & out 3. Only stuck-at faults are tested - not good for VLSI\n\n5. Built-in self test Test generation is NP complete. This prompted a search for built-in structures * Built-in self test BIST is an alternative to automatic test vector generation * Test generation & verification done by circuits built into the chip * Pseudo-random test vector generation is accomplished by using shift registers\n\n6. Built-in self-test in VLSI • Test patterns generated on chip • responses to test evaluated on chip • external operations only to initialize test & clock • go no go results • additional pins & silicon area minimized\n\n7. Built-in self test types • operation • (concurrent or not) • test design • (exhaustive or not) • test vector generation • (deterministic or pseudorandom) • data compression • (full or compresses test vectors)\n\n8. A general built-in self test approach\n\n9. Built-in self test * Deterministic testing identifies test vectors to detect specific faults * Pseudorandom testing detects # of faults by any test vector * Fault coverage increases rapidly at the beginning and slows down towards the end * The response data is compressed using a signature analysis * Linear feedback shift registers (LFSR) used to generate test vectors and compress responses\n\n10. Pseudorandom Integers Xk = Xk-1 + 3 (modulo 8) Xk = Xk-1 + 2 (modulo 8) 0 0 7 1 7 1 Start Start 6 2 6 2 +3 +2 5 3 5 3 4 4 Sequence: 2, 5, 0, 3, 6, 1, 4, 7, 2 . . . Sequence: 2, 4, 6, 0, 2 . . . Maximum length sequence: 3 and 8 are relative primes.\n\n11. Pseudo-Random Pattern Generation • Standard Linear Feedback Shift Register (LFSR) • Produces patterns algorithmically – repeatable • Has most of desirable random # properties • May not cover all2n input combinations • Long sequences needed for good fault coverage either hi = 0, i.e., XOR is deleted or hi = Xi Initial state (seed): X0, X1, . . . , Xn-1 must not be 0, 0, . . . , 0\n\n12. Y0 Q D Q Q D D Clk Q Q Q (a) Y Y Y 1 2 3 Y 0 Q Q D Q D D Clk (b) Q Q Q Y Y Y 1 2 3 Y 0 Q Q Q D D D Clk Q Q Q (c) Y Y Y 1 2 3 Pseudo-Random Pattern Generator Various LFSR configurations\n\n13. (a) (b) (c) Clk Y0 Y1Y2Y3 ClkY0 Y1Y2Y3 ClkY0 Y1Y2Y3 1 001 1 001 1 001 1 1 100 1 0 100 1 1 100 2 1 110 2 0 010 2 0 110 3 0 111 3 1 001 3 0 011 4 1 011 4 1 001 5 0 101 6 0 010 7 1 001 Initial state Y0 Q D Q Q D D Clk Q Q Q (a) Y Y Y 1 2 3 Y 0 Q Q D Q D D Clk Repeated states Q Q Q (c) Y Y Y 1 2 3 Pseudo-random Patterns\n\n14. Forcing all possible states in LFSR Modified LFSR • Clk Y0 Y1Y2Y3 Y1’Y2’ • 0 001 1 • 1 1 000 1 • 2 1 100 0 • 3 1 110 0 • 0 111 0 • 5 1 011 0 • 6 0 101 0 • 0 010 0 • 0 001 1 Produces pseudorandom sequence of length 8 Initial state\n\n15. Standard LFSR XOR operations performed outside of the shift register\n\n16. Modular LFSR XOR operations performed inside the shift register\n\n17. Linear feedback shift registers Two basic configurations : - internal XOR (IE) - external XOR (EE) Feedback connections based on coefficients of a characteristic polynomial : P(X) = C0 + C1X + C2X2 +…+ CnXn An LFSR with n-flip flops can assume (2n-1) states with depend upon : initial state, input, and feedback\n\n18. EXTERNAL CONNECTIONS (STANDARD) 2 3 4 1 X X X X INTERNAL CONNECTIONS (MODULAR) 4 3 2 X X X X 1 3 4 P(X) = 1+ X + X Characteristic Polynomial Linear feedback shift registers\n\n19. Y 0 Q D D Q D Q Y0 Q D Q Q D D Clk Q Q Q Clk Y Y Y Q Q Q (a) 1 2 3 Y Y Y 1 2 3 LFSR Equivalence P(X)=1+X+X3\n\n20. Test generation in BIST LFSR generally works without input - so only the initial state & interconnections decide the next state A generator which generates exactly (2n-1) different states is called a maximal-length generator All polynomials are either primitive (irreducible) or nonprimitive\n\n21. Test generation in BIST A primitive polynomial generates a max length sequence of test vectors. The number of primitive polynomials of order n grows rapidly with n p - any prime number which divides (2n-1)\n\n22. Modulo 2 Operations a b a  b a+b a+b a-b a - b sum carry difference borrow 0 0 0 0 0 0 0 0 1 1 1 0 1 1 1 0 1 1 0 1 0 • 1 0 0 1 0 0 Define time translation operation as X k = X (t-k)\n\n23. Math Foundation of LFSR Yj can be represented as: Yj(t) = Yj-1(t - 1) for j  0 We can express Yj in terms of Y0 as: Yj (t) =Y0(t - j) Denote the translation operator as X k, where k represents the time translation units, then Yj (t) =Y0(t)X j On the other hand in LFSR Where the summation is equivalent to an XOR operation. Then we get\n\n24. Math of LFSR Generators From linearity we have and We can then write this expression as Y0 (t) PN (X) = 0 For non-trivial solutions, Y0(t)  0, then we must have PN (X) = 0. Where, PN (X) is called the characteristic polynomial of the LFSR.\n\n25. Primitive Polynomials • Examples of primitive polynomials with minimum number of terms • N Polynomials • 1,2,3,4,6,7,15,22 1 + X + Xn • 3,5,11, 21, 29 1 + X2 + Xn • 10,17,20,25,28,31 1 + X3 + Xn • 9 1 + X4 + Xn • 23 1 + X5 + Xn • 18 1 + X7 + Xn • 8 1 + X2 + X3 + X4 + Xn • 12 1 + X + X3 + X4 + Xn • 13 1 + X + X4 + X6 + Xn • 14, 16 1 + X + X3 + X4 + Xn\n\n26. Test generation in BIST For instance for n=8 a minimum polynomial is Example : Let us follow test generation using a primitive polynomial\n\n27. Reciprocal Polynomials The reciprocal polynomial of P(X) is defined by: so PR(X) = XN + Cj XN-j for 1  j N Thus every coefficient Cjin P(X) is replaced by CN-j in PR(X) For example, the reciprocal of polynomial P(X) = 1+ X+ X3 is PR(X) = 1+ X2 + X3\n\n28. Operations on Polynomials • Polynomial multiplication • x4 + x3 + + 1 • . x + 1 . • x4 + x3 + + 1 • x5 + x4+ + x . • x5 + + x3 + x + 1 since x4 + x4 = 0. • Division is of particular interest when LFSRs are used for response compaction. • x2 + x + 1 . • x2 + 1 ) x4 + x3 + + 1 • x4 + + x2 . • x3 + x2 + + 1 • x3 + + x . • x2 + x + 1 • x2 + + 1 • x • the reminder R(x)=x\n\n29. Operations on Polynomials • Reminder of the division of the input sequence polynomial by the • LFSR polynomial gives the signature for the compacted response • Q(X) X4 + X3 + 1 1 1 0 0 1 • X3 + X2 + 1 |X7 + X5 + X4 + +1 1 1 0 1 | 1 0 1 1 0 0 0 1 • X7 + X6 + X41 1 0 1 • X6 + X5 +1 1 1 0 0 0 0 1 • X6 + X5 + +X31 1 0 1 • X3 + +1 1 0 0 1 • X3 + X2 + 11 1 0 1 • R (X) X2 0 1 0 0 signature Polynomial for the input data\n\n30. Properties of Polynomials • An irreducible polynomial is that polynomial which cannot be factored and it is divisible by only itself and 1. • An irreducible polynomial of degree n is characterized by : • An odd number of terms including the 1 term • Divisibility into1 + xk, where k = 2n - 1. • Any polynomial with all even exponents can be factored and hence is reducible • An irreducible polynomial is primitive if the smallest positive integer k that allows the polynomial to divide evenly into 1 + xk occurs for k = 2n - 1, where n is the degree of the polynomial.\n\n31. Properties of Polynomials • All polynomials of degree 3 are: • x3 + 1= 0 • x3 + x2 + 1 = 0 Primitive • x3 + x + 1 = 0 Primitive • x3 + x2 + x + 1= 0 • But, x3 + 1= (x + 1)( x2 + x + 1) • x3 + x2 + x + 1 = (x + 1)( x2 + 1) • There are several primitive polynomial of degree N. • We are interested in those with fewer terms since they need less XOR gates in the LFSR. • Among primitive polynomial of degree 16 are x16 + x5 + x3 + x2 + 1 and x16 + x4 + x3 + x + 1.\n\n32. Check for Primitive Polynomial • Consider a 3-rd order primitive polynomial x3 + x + 1 = 0 • If this polynomial is primitive it must divide evenly into 1 + x 7 (7 = 2 3 – 1) where 3 is the degree of the polynomial. We can check that 1 + x 7= (x 3+ x + 1)(x 4 + x 2 + x + 1)\n\n33. Test data compression • To verify response of a tested circuit use • test data compression • Ones count compression • ex 10011010 => 0(x)=4 • Transition count compression • ex 10011010 => c(x) =5 • Parity check compression • ex 10011010 => p(x) =0 • Syndrome testing (normalized # of 1’s ) • ex 10011010+> s(x) =4/8 • Compression using Walsh spectra • Cyclic code compression (LFSR)\n\n34. Parity Compression Computes parity\n\n35. Ones Count If we have a test of length L and the fault-free count is m, then the possibility of aliasing is [C (L, m) - 1] patterns out of total number of possible strings of length L, (2L - 1).\n\n36. One Count example For m = 5 and L = 8, aliasing probability will be Pa (m) =( C(8,5)-1 ) / (2^8-1) =55 /255  0.2. Not a very reliable method\n\n37. Transition Count Computes transitions\n\n38. Signature Analysis Uses LFSR to obtain a signature\n\n39. LFSR as Response Analyzer • Use cyclic redundancy check code (CRCC) generator (LFSR) for response compacter • Treat data bits from circuit POs to be compacted as a decreasing order coefficient polynomial • CRCC divides the PO polynomial by its characteristic polynomial • Leaves remainder of division in LFSR • Must initialize LFSR to seed value (usually 0) before testing • After testing – compare signature in LFSR to precomputed signature of fault-free circuit\n\n40. Signature Analysis • LFSR seed is “00000”\n\n41. Signature by Logic Simulation X0 0 1 0 0 0 1 1 1 1 Input bits Initial State 1 0 0 0 1 0 1 0 X1 0 0 1 0 0 0 0 1 0 X2 0 0 0 1 0 0 0 0 1 X3 0 0 0 0 1 0 1 0 1 X4 0 0 0 0 0 1 0 1 0 Signature\n\n42. X2 X7 X7 + 1 + X5 X5 X5 + X3 + X3 + X3 X3 + X + X + X X5 + X3 + X + 1 Char. polynomial + X2 + X2 + X2 + 1 + 1 remainder Signature: X0X1X2X3X4 = 1 0 1 1 0 Signature by Polynomial Division Input bit stream: 0 1 0 1 0 0 0 1 0 ∙ X0 + 1 ∙ X1 + 0 ∙ X2 + 1 ∙ X3 + 0 ∙ X4 + 0 ∙ X5 + 0 ∙ X6 + 1 ∙ X7 Polynomial division equivalence of datacompression\n\n43. Test generation based on a nonprimitive polynomial x4 + x2 +1 generates only 6 out of possible 15 states\n\n44. Multiple-Input Signature Register (MISR) • Problem with ordinary LFSR response compacter: • Too much hardware if one of these is put on each primary output (PO) • Solution: MISR – compacts all outputs into one LFSR • Works because LFSR is linear – obeys superposition principle • Superimpose all responses in one LFSR – final remainder is XOR sum of remainders of polynomial divisions of each PO by the characteristic polynomial\n\n45. X0 (t + 1) X1 (t + 1) X2 (t + 1) 0 0 1 1 1 0 X0 (t) X1 (t) X2(t) d0 (t) d1 (t) d2(t) 0 1 0 = + Modular MISR Example\n\n46. SSA M 1 M 3 4 1 2 2 M 3 M 4 BELLMAC M 1 M 2 LSFR M 3 M 4 PSA M M M M 2 3 4 1 2 3 4 1 2 3 M(X)= M + X M + X M + X M 1 2 3 4 Space Compaction – parallel outputs\n\n47. Test data compression BIST To reduce the number of response data a compression Based on LFSR (signature analysis) is used. Probability that 2 sequences which differ by 1 bit only will have the same signature is zero Data entering LFSR serially produces a reminder of the division of the data stream polynomial by the polynomial used for LFSR design\n\n48. A faulty data stream will yield the same signature (reminder of polynomial division) as a fault-free data when they have the same reminder The likelihood of this is in the range of where n is the number of the compressor bits The same effect can be obtained on multi-input shift registers with faster processing speed & smallerchip area. Fault-free signature 2n-1 faulty signatures Test data compression BIST\n\n49. Test data compression BIST • As in the single-input case the probability of • detecting uniformly distributed fault in the output • stream is (1 - 2-n ) • Probability of not detecting error after • checking its signature is greater than 2-n - the • probability of not catching the signature error. • Example 1: n = 4, Aliasing probability = 6.25% • Example 2: n = 8, Aliasing probability = 0.39% • Example 3: n = 16, Aliasing probability = 0.0015%\n\n50. LFSR Design Guidelines In using LFSR for data compression: • Chose r large enough to reduce 2-r • Repeat test using different feedback connections • Repeat test with different test vector • Compress serial output of MISR into LFSR to capture errors" ]
[ null, "https://fr.slideserve.com/img/player/ss_download.png", null, "https://fr.slideserve.com/img/replay.png", null, "https://thumbs.slideserve.com/1_4440638.jpg", null, "https://fr.slideserve.com/img/output_cBjjdt.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7702014,"math_prob":0.994075,"size":12262,"snap":"2021-21-2021-25","text_gpt3_token_len":3986,"char_repetition_ratio":0.14325339,"word_repetition_ratio":0.09191457,"special_character_ratio":0.3412983,"punctuation_ratio":0.052652895,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9953185,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,1,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-20T22:32:44Z\",\"WARC-Record-ID\":\"<urn:uuid:e0166d3a-583b-441f-9731-7ade5257c00b>\",\"Content-Length\":\"107553\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:02ebb6e5-65d0-4daa-8e29-2a11c994c61e>\",\"WARC-Concurrent-To\":\"<urn:uuid:2018190a-b9a3-40c7-b952-6e83d583466c>\",\"WARC-IP-Address\":\"44.236.52.34\",\"WARC-Target-URI\":\"https://fr.slideserve.com/margie/digital-testing-built-in-self-test-powerpoint-ppt-presentation\",\"WARC-Payload-Digest\":\"sha1:BNX3GCFVVMANODBTW6ECCFZ2GWSC5J6N\",\"WARC-Block-Digest\":\"sha1:S56FGCBQ43Z2KRYJDL7PF3BUNUFMCIAT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488257796.77_warc_CC-MAIN-20210620205203-20210620235203-00018.warc.gz\"}"}
https://datascience.stackexchange.com/questions/40944/both-train-and-test-error-are-decreasing-in-xgboost-iterations
[ "# Both train and test error are decreasing in XGBoost iterations\n\nI have an issue with training an XGBoost classifier in a sence that both train and test error only decrease throughout more iterations (num_boost_round) even if I use 1000 num boost rounds and 10 early stopping rounds. Then when I try to apply the model on a separate set not used for testing and training I can see that a model trained over 100 rounds performs much better than 1000 one. My learning rate is 0.01.\n\nI am wondering whether this is a normal situation (and I should just do early stopping on this independent validation set) or whether I am doing something wrong. Theoretically, the test error should start increasing at some point, but this is just not happening.\n\nI am using XGBoost and I am splitting my dataset in train/test like this:\n\nX_train, X_test, y_train, y_test = train_test_split(X, Y, test_size=0.3, random_state=42)\n\ndtrain = xgb.DMatrix(X_train, label=y_train)\ndtest = xgb.DMatrix(X_test, label=y_test)\n\n\nThem I train it in the following way:\n\nwatchlist = [(dtest, 'eval'), (dtrain, 'train')]\nprogress = dict()\n\n# Train and predict with early stopping\nxg_reg = xgb.train(\nparams=params,\ndtrain=dtrain, num_boost_round=boost_rounds,\nevals=watchlist, # using validation on a test set for early stopping; ideally should be a separate validation set\nearly_stopping_rounds=early_stopping,\nevals_result=progress)\n\n\nNote that I have used gridsearch to find the optimal hyperparameters (params).\n\nA plot which I get (yellow is my cutoff point identified pretty much via testing on the independent set):", null, "This is a common situation and can be caused by a number of things, such as:\n\n1. Too much variance in the model (e.g. did the hyperparameter tuning identify low values for eta, alpha, lambda, gamma, subsampling/column sampling/row sampling, minimum child weights and/or high values for depth and number of leaves?)\n2. Having a small dataset with high variance. XGBoost is prone to overfitting and this is exacerbated when there isn't much data for it.\n3. Not shuffling the data so that the validation set has lower variance than (or differs in distribution from) the training and test sets. train_test_split shuffles by default, so this shouldn't be a problem if you've used it as indicated in the question for generating the validation set also.\n\nStopping training early is a perfectly valid and common method of increasing bias in a model and doing so based on a validation set is acceptable. It is preferable for the training to stop based on the test set. To achieve this you could address the potential issues above. Without knowing more about the data and how the validation set was generated, the most reliable advice I can give is to alter the hyperparameters to increase model bias.\n\nSimply you are using the training set for early stopping.\n\nTry by setting\n\nwatchlist = [(dtrain, 'train'), (dtest, 'eval')] # the last one is used for early stopping" ]
[ null, "https://i.stack.imgur.com/br37a.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8589493,"math_prob":0.8243559,"size":1513,"snap":"2020-45-2020-50","text_gpt3_token_len":364,"char_repetition_ratio":0.11332008,"word_repetition_ratio":0.0,"special_character_ratio":0.2333113,"punctuation_ratio":0.11956522,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97209674,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-27T20:29:34Z\",\"WARC-Record-ID\":\"<urn:uuid:23f294ed-448f-4549-92ef-0efda85875fc>\",\"Content-Length\":\"158100\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0b03d390-ab15-40e1-8a6d-d7ca9af0fd36>\",\"WARC-Concurrent-To\":\"<urn:uuid:885f6ad6-fecb-4f73-82a5-6f56d9a09cdf>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://datascience.stackexchange.com/questions/40944/both-train-and-test-error-are-decreasing-in-xgboost-iterations\",\"WARC-Payload-Digest\":\"sha1:W6LLQ6C22ZUEWP5VG4OMKEVZGKWTPZJ2\",\"WARC-Block-Digest\":\"sha1:53FZEVNXR4I4D73W664W2EGBQCXOCXFN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141194171.48_warc_CC-MAIN-20201127191451-20201127221451-00512.warc.gz\"}"}
https://hello-sunil.in/javascript-higher-order-functions/
[ "", null, "# Higher Order Functions in JavaScript – Beginner’s Guide\n\nAs a frontend developer, you should always strive to learn new techniques and discover ways to work smarter with JavaScript. One such technique is using higher order functions.\n\nHigher order functions are one of the topics that can be hard to understand. This article will help you understand what higher order functions are and how to work with them.\n\nYou will also learn about the difference between high order and first class functions and about high order built-in functions in JavaScript.\n\n## Functions are first-class citizens in JavaScript\n\nIn JavaScript, functions are first-class citizens(JavaScript treats functions as objects). This means that they can be assigned to a variable and/or be passed as arguments and can also be returned from another function.\n\nThese features or abilities open the door for various types of functions like, First-class functions, Callback functions, Higher-order functions, Anonymous functions and more.\n\nHaving a clear and better understanding of how higher order functions work can save you a lot of time and make your logical implementation seamless.\n\n## JavaScript and first class functions\n\nFirst-class functions are a unique feature in JavaScript, meaning that functions here are treated like any other variable. They can be passed as arguments, returned by another function, or assigned as a value to a variable.\n\nIn JavaScript, everything you can do with other types like object, string, or number, you can do with functions. You can pass them as parameters to other functions (callbacks), assign them to variables and returned from another function. This is why functions in JavaScript are known as First-Class Functions.\n\nAssigning functions to variables:\n\nAssigning functions to variables is one common thing you can do with them. This is also called creating function expressions.\n\nThe reason for this name is that you create a function inside an expression. You then assign this expression to a variable. From now on you can use the variable name to reference, and call, this function.\n\n```// Create function with function expression and assign it to a variable\nconst myFunc = function() {\nreturn 'Hello'\n}\nconsole.log(myFunc()); //Hello```\n\nPassing functions as arguments:\n\nOne thing you may have seen is passing functions as arguments to other functions. These passed functions are usually passed as the last argument and later used as callbacks.\n\nA callback is a function that gets executed when all operations that have been completed. This is a common practice.\n\nThis works due to the fact that JavaScript is single-threaded programming language. This means that only one operation can be executed at the time. So, when you pass a callback function, and invoke it at the end, it will be invoked when all preceding operations are completed.\n\nOne situation when functions are passed as arguments frequently is when you work with event listeners.\n\n``target.addEventListener(event, function, useCapture)``\n\nThe `addEventListener` has three parameters. `event` and `function` are most frequently used. `useCapture` is used occasionally.\n\nAlso, the second parameter, the `function`, is the callback. When specific `addEventListener` is triggered this callback function is invoked.\n\n```<body>\n<button id='btn'>Hello</button>\n\n<script>\n// Find button in the DOM\nconst button = document.querySelector('#btn')\n\n// Create function to handle the event\nfunction handleButtonClick() {\n// Show log on click\nconsole.log('click on: ', this)\n}\n\n// Create event listener for click event on button\n// and pass \"handleButtonClick\" function as a callback function\n\n//Output - click on: <button id='btn'>Hello</button>\n</script>\n</body>```\n\nKindly note here we passed the `handleButtonClick` function by name, without parentheses. This means that you are passing the function object itself.\n\nIf you passed that function with parentheses that would mean you are invoking the function right away and passing the result of executing that function.\n\nLets see one more example:\n\n```function formalGreeting() {\nconsole.log(\"How are you?\");\n}\nfunction casualGreeting() {\nconsole.log(\"What's up?\");\n}\nfunction greet(type, greetFormal, greetCasual) {\nif(type === 'formal') {\ngreetFormal();\n} else if(type === 'casual') {\ngreetCasual();\n}\n}\ngreet('casual', formalGreeting, casualGreeting);\n// prints 'What's up?'```\n\nReturning functions:\n\nAnother thing you can do with functions is that you can return them from other functions. This is something expected, since functions are a type of objects, and you can return objects in JavaScript.\n\nThis can be useful when you want to use function to create templates for new functions.\n\n```// Create function that returns function\n// a template for new functions\nfunction changeText(word, replacement, text) {\n// Return a new function\n// that will be later assigned to a variable\nreturn function(text) {\nreturn text.replace(word, replacement)\n}\n}\n\n// Create new function for changing text\n// to positive mood using the \"changeText\" function\n// This invokes and \"changeText\" function\n// and stores returned function in a variable\n\n// Create new function for changing text\n// to negative mood using the \"changeText\" function\n// This invokes and \"changeText\" function\n// and stores returned function in a variable\n\n// Call the \"makePositive\" function\n// This invokes the returned function\n// stored in the variable after calling\n// the \"changeText\" function\nmakePositive('Everything that happened is bad and everything that will happen is also bad.')\n// 'Everything that happened is good and everything\n//that will happen is also good.'\n\n// Call the \"makePositive\" function\n// This invokes the returned function\n// stored in the variable after calling\n// the \"changeText\" function\nmakeNegative('Everything that happened is good and everything that will happen is also good.')\n// 'Everything that happened is bad and everything\n//that will happen is also bad.'```\n\nLet’s see an example:\n\n```function calculate(operation) {\nswitch (operation) {\nreturn function (a, b) {\nconsole.log(`\\${a} + \\${b} = \\${a + b}`);\n};\ncase \"SUBTRACT\":\nreturn function (a, b) {\nconsole.log(`\\${a} - \\${b} = \\${a - b}`);\n};\n}\n}\n\nIn the above code, when we invoke the function `calculate` with an argument, it switches on that argument and then finally returns an anonymous function.\n\nSo if we call the function `calculate()` and store its result in a variable and console log it, we will get the following output:\n\n```function calculate(operation) {\nswitch (operation) {\nreturn function (a, b) {\nconsole.log(`\\${a} + \\${b} = \\${a + b}`);\n};\ncase \"SUBTRACT\":\nreturn function (a, b) {\nconsole.log(`\\${a} - \\${b} = \\${a - b}`);\n};\n}\n}\n\nYou can see that `calculateAdd` contains an anonymous function that the `calculate()` function returned.\n\nThere are two ways to call this inner function which we’ll explore now.\n\nCall the returned function using a variable:\n\nIn this method, we stored the return function in a variable as shown above and then invoked the variable to the inner function.\n\nLet’s see it in code:\n\n```function calculate(operation) {\nswitch (operation) {\nreturn function (a, b) {\nconsole.log(`\\${a} + \\${b} = \\${a + b}`);\n};\ncase \"SUBTRACT\":\nreturn function (a, b) {\nconsole.log(`\\${a} - \\${b} = \\${a - b}`);\n};\n}\n}\n// Output: 2 + 3 = 5\n\nconst calculateSubtract = calculate(\"SUBTRACT\");\ncalculateSubtract(2, 3);\n// Output: 2 - 3 = -1```\n\nSo what’d we do here?\n\n• We called the `calculate()` function and passed `ADD` as the argument\n• We stored the returned anonymous function in the `calculateAdd` variable, and\n• We invoked the inner returned function by calling `calculateAdd()` with the required arguments.\n\nCall the returned function using double parentheses:\n\nThis is a very sophisticated way of calling the inner returned function. We use double parentheses `()()` in this method.\n\nLet’s see it in code:\n\n```function calculate(operation) {\nswitch (operation) {\nreturn function (a, b) {\nconsole.log(`\\${a} + \\${b} = \\${a + b}`);\n};\ncase \"SUBTRACT\":\nreturn function (a, b) {\nconsole.log(`\\${a} - \\${b} = \\${a - b}`);\n};\n}\n}\n// Output: 2 + 3 = 5\n\ncalculate(\"SUBTRACT\")(2, 3);\n// Output: 2 - 3 = -1```\n\nThe arguments in the first parentheses belong to the outer function, while the arguments in the second parentheses belong to the inner returned function.\n\nThe `calculate()` method returns a function as explained earlier, and it is that returned function which is immediately called using the second parentheses.\n\n## What are Higher Order Functions 🧐?\n\nYou may wonder what those three things have to do with high order functions. The first one about variables not much. However, the second and third, passing functions as arguments and returning functions, a lot.\n\nHere is the thing, high order functions are functions that take another function as an argument, and/or returns another function.\n\nSo an Higher Order Function is a function that will at least :\n\n• take one or more functions as arguments\n• returns a function as its result\n\nHigher order functions are functions that operate on other functions, either by taking them as arguments or by returning them. In simple words, A higher order function is a function that receives a function as an argument or returns the function as output.\n\nThe function that is passed as an argument to the higher-order function is known as a Callback Function, because is it, to be ‘called-back’ by the higher order function at a later time.\n\nIn all examples, where you were passing a function as an argument, or returning a function, you were actually working with high order functions.\n\nYou probably expected something more complex than this. Especially due to how many JavaScript developers talk about high order functions. However, it is really that simple.\n\n```// High-order function no.1:\n// Function that takes a function as a argument\nfunction myHighOrderFuncOne(myFunc) {\n// some code\n}\n\n// High-order function no.2:\n// Function that returns a function\nfunction myHighOrderFuncTwo() {\n// some code\n\n// Return a function\nreturn function() {\n// some code\n}\n}\n\n// High-order function no.3:\n// Function that takes a function as a argument\n// and also returns a function\nfunction myHighOrderFuncThree(myFunc) {\n// some code\n\n// Return a function\nreturn function() {\n// some code\n}\n}```\n\nFew more examples are as follows:\n\nTaking a function as an argument:\n\nHere is an example of a function that takes a function as an argument.\n\n```// normal function\nfunction greetEnglish(name){\nreturn `Hello \\${name}`;\n}\nfunction greetSpanish(name){\nreturn `Hola \\${name}`;\n}\n// Our higher order function\nfunction greeting(otherGreeting, name){\nconsole.log(`Hello \\${name}`);\nreturn console.log(otherGreeting(name));\n}\ngreeting(greetSpanish, \"Sunil\");\n//output: Hello Sunil // first greets in English\n//output: Hola Sunil // greets in the language passed ```\n\nIn the above code snippet the two functions, `greetEnglish(name)`and `greetSpanish(name)` returns the greeting in respective language.\n\nThe function` greeting()` is a higher order function that takes another function and a string as a parameter. This function prints greeting in English by default and in any other language depending on the passed function as a parameter(here in Spanish).\n\nAlso, higher order function can also accept anonymous function as a parameter.\n\n```function greeting(callback, name){\nconsole.log(`Hello \\${name}`);\nreturn callback(name);\n}\ngreeting(function (name) {\nconsole.log(`hola \\${name}`)\n} , \"Sunil\")\n\n//output: Hello Sunil /* first greets in English */\n//output: Hola Sunil /* second greets in Spanish */```\n\nWe can also express the same code in arrow function way:\n\n```function greeting(callback, name){\nconsole.log(`Hello \\${name}`);\nreturn callback(name);\n}\ngreeting(name => {console.log(`hola \\${name}`)}, \"Sunil\")\n\n//output: Hello Sunil /* first greets in English */\n//output: Hola Sunil /* second greets in Spanish */```\n\nAlso Read: Arrow Functions in JavaScript\n\nReturning a function as a result:\n\nNow let us take another function that returns a function.\n\n```// Define a function that returns a function\nfunction returnFunc() {\nreturn function() {\nconsole.log('Hi');\n}\n}\n\n// Take the returned function in a variable.\nconst fn = returnFunc();\n\n// Now invoke the returned function.\nfn(); // logs 'Hi' in the console\n\n// Alternatively - A bit odd syntax but good to know\nreturnFunc()(); // logs 'Hi' in the console```\n\nBoth of the examples above are examples of Higher-Order functions. They either accept a function as an argument or return a function.\n\nPlease note, it is not mandatory for a higher order function to perform both accepting an argument and returning a function. Performing either will make the function a higher order function.\n\n## In-built Higher Order Functions in JavaScript\n\nIn JavaScript, there are plenty of usages of higher order functions. You may be using them without knowing them as higher order functions.\n\nFor example, take the popular Array methods like, `map()`, `filter()`, `reduce()`, `find()`, `sort()` and many more. All these functions take another function as an argument to apply it to the elements of an array.\n\n### In-built Higher Order Functions – map()\n\n`map()` method allows us to process each element in the array and give back a new array with the same length.\n\n```var Array2 = [4,8,12,16,20];\nvar data = Array2.map(function(element){\nreturn element + 4;\n})\nconsole.log(data); //[ 8, 12, 16, 20, 24 ]```\n\n`data` contains an array where each of the elements in `Array2` gets added by `4`. The array on which map is applied will produce an array with the same length.\n\n### In-built Higher Order Functions – filter()\n\n`filter()` method allows to filter out some element in the array and give the rest of the element as an array output.\n\n```var Array4 = [12,45,41,74,91];\nvar data = Array4.filter(function(element){\nreturn element > 40;\n})\nconsole.log(data); //[ 45, 41, 74, 91 ]```\n\n`data` contains all the elements present in `Array4` which is more than 40.\n\n### In-built Higher Order Functions – reduce()\n\n`reduce()` method allows us to process all the elements in the array to give back a single value.\n\n```var Array3 = [112,415,4,274,911];\nvar data = Array3.reduce(function(a,b){\nreturn a+b;\n},0)\nconsole.log(data); //1716```\n\nHere `data` contains the sum of all the elements present in the `Array3`. The start element in the syntax is required to have a start value before the reduction starts.\n\nIn the above example If we give `2` instead of `0` in the start value. `2` will be added to the sum of all elements in that array.\n\nAnd If the array on which reduction is applied is having at least 1 element then we can miss out that start value in the function. The reduction will start from first element of the array then second element and so on.\n\n### In-built Higher Order Functions – forEach()\n\n`forEach()` method allows us to loop over each element in an array.\n\n```var Array1 = [1,2,3,4,5];\nvar data = Array1.forEach(function(element){\nconsole.log(element);\n})\nconsole.log(data);\n//Output -\n//1\n//2\n//3\n//4\n//5```\n\nHere `element` represents each element in the `Array1`. It prints out all the elements present in the array. Kindly note, `forEach()` method acts same as that of a for loop.\n\n## Creating Our Own Higher Order Function in JavaScript\n\nUp until this point, we saw various higher order functions built into the JavaScript language. Now let’s create our own higher order function.\n\nLet’s imagine JavaScript didn’t have the native `map` method. We could build it ourselves thus creating our own higher order function.\n\nLet’s say, we have an array of strings and we want to convert this array to an array of integers, where each element represent the length of the string in the original array.\n\n```const strArray = ['JavaScript', 'Python', 'PHP', 'Java', 'C'];\nfunction mapForEach(arr, fn) {\nconst newArray = [];\nfor(let i = 0; i < arr.length; i++) {\nnewArray.push(\nfn(arr[i])\n);\n}\nreturn newArray;\n}\nconst lenArray = mapForEach(strArray, function(item) {\nreturn item.length;\n});\n\nconsole.log(lenArray); // prints [ 10, 6, 3, 4, 1 ]```\n\nIn the above example, we created an higher order function `mapForEach` which accepts an array and a callback function `fn`. This function loops over the provided array and calls the callback function `fn` inside the `newArray.push` function call on each iteration.\n\nThe callback function `fn` receives the current element of array and returns the length of that element, which is stored inside the `newArray`. After the for loop has finished, the `newArray` is returned and assigned to the `lenArray`.\n\n## Conclusion\n\nWe have learned what higher order functions are and some built-in higher order functions. We also learned how to create our own higher order function.\n\nIn a nutshell, a higher order function is a function that may receive a function as an argument and can even return a function. higher order functions are just like regular functions with an added ability of receiving and returning other functions are arguments and output.\n\nThat’s all for now. Thank you for reading and we hope this article will be very helpful to understand the basics of higher order function. Stay tuned for more amazing content. Peace out! 🖖\n\n## Resource\n\nClick on a star to rate it!\n\nAverage rating 0 / 5. Vote count: 0\n\nNo votes so far! Be the first to rate this post.\n\nWe are sorry that this post was not useful for you!\n\nLet us improve this post!\n\nTell us how we can improve this post?\n\n## Similar articles you may like", null, "Hi there 👋 I am a front-end developer passionate about cutting-edge, semantic, pixel-perfect design. Writing helps me to understand things better.", null, "Hi there 👋 I am a front-end developer passionate about cutting-edge, semantic, pixel-perfect design. Writing helps me to understand things better." ]
[ null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%201500%20500'%3E%3C/svg%3E", null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20100%20100'%3E%3C/svg%3E", null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%2080%2080'%3E%3C/svg%3E", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7698698,"math_prob":0.91671973,"size":17435,"snap":"2023-40-2023-50","text_gpt3_token_len":3813,"char_repetition_ratio":0.20222592,"word_repetition_ratio":0.14389272,"special_character_ratio":0.24169773,"punctuation_ratio":0.1268824,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9692587,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-24T10:45:21Z\",\"WARC-Record-ID\":\"<urn:uuid:a9e3da6f-2d5b-4eaf-9fcc-58d0a23fa5b6>\",\"Content-Length\":\"150658\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:337f2188-2551-4a4a-a2fd-9fa6cd4a375a>\",\"WARC-Concurrent-To\":\"<urn:uuid:b42c56e6-ff10-4e4a-a3f3-b09774e66c5a>\",\"WARC-IP-Address\":\"166.62.6.65\",\"WARC-Target-URI\":\"https://hello-sunil.in/javascript-higher-order-functions/\",\"WARC-Payload-Digest\":\"sha1:NFN5TT6KT3CYR45LAZ4GRB4L6NTSBPQ4\",\"WARC-Block-Digest\":\"sha1:KY7FAGP4WTSIGXU2E2Q5ZZURWYLWIGSL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506632.31_warc_CC-MAIN-20230924091344-20230924121344-00121.warc.gz\"}"}
http://ixtrieve.fh-koeln.de/birds/litie/document/39295
[ "Document (#39295)\n\nAuthor\nSoergel, D.\nPopescu, D.\nTitle\nOrganization authority database design with classification principles\nSource\nClassification and authority control: expanding resource discovery: proceedings of the International UDC Seminar 2015, 29-30 October 2015, Lisbon, Portugal. Eds.: Slavic, A. u. M.I. Cordeiro\nImprint\nWürzburg : Ergon-Verlag\nYear\n2015\nPages\nS.69-82\nAbstract\nWe illustrate the principle of unified treatment of all authority data for any kind of entities, subjects/topics, places, events, persons, organizations, etc. through the design and implementation of an enriched authority database for organizations, maintained as an integral part of an authority database that also includes subject authority control / classification data, using the same structures for data and common modules for processing and display of data. Organization-related data are stored in information systems of many companies. We specifically examine the case of the World Bank Group (WBG) according to organization role: suppliers, partners, customers, competitors, authors, publishers, or subjects of documents, loan recipients, suppliers for WBG-funded projects and subunits of the organization itself. A central organization authority where each organization is identified by a URI, represented by several names and linked to other organizations through hierarchical and other relationships serves to link data from these disparate information systems. Designing the conceptual structure of a unified authority database requires integrating SKOS, the W3C Organization Ontology and other schemes into one comprehensive ontology. To populate the authority database with organizations, we import data from external sources (e.g., DBpedia and Library of Congress authorities) and internal sources (e.g., the lists of organizations from multiple WBG information systems).\nContent\nPräsentation unter: http://www.udcds.com/seminar/2015/media/slides/Soergel-Popescu_InternationalUDCSeminar2015.pdf.\nTheme\nNormdateien\n\nSimilar documents (author)\n\n1. Popescu, F.: ¬An approach to eponyms in mathematics (2009) 2.57\n2.565884 = sum of:\n2.565884 = product of:\n5.131768 = sum of:\n5.131768 = weight(author_txt:popescu in 3120) [ClassicSimilarity], result of:\n5.131768 = score(doc=3120,freq=1.0), product of:\n0.83266324 = queryWeight, product of:\n1.2262138 = boost\n9.860925 = idf(docFreq=5, maxDocs=42306)\n0.06886294 = queryNorm\n6.163078 = fieldWeight in 3120, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n9.860925 = idf(docFreq=5, maxDocs=42306)\n0.625 = fieldNorm(doc=3120)\n0.5 = coord(1/2)\n\n2. Frâncu, V.; Popescu, T.: Twenty years after : scientific research in the field of knowledge organization in Romania (1993-2012) (2014) 2.05\n2.0527074 = sum of:\n2.0527074 = product of:\n4.105415 = sum of:\n4.105415 = weight(author_txt:popescu in 1611) [ClassicSimilarity], result of:\n4.105415 = score(doc=1611,freq=1.0), product of:\n0.83266324 = queryWeight, product of:\n1.2262138 = boost\n9.860925 = idf(docFreq=5, maxDocs=42306)\n0.06886294 = queryNorm\n4.9304624 = fieldWeight in 1611, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n9.860925 = idf(docFreq=5, maxDocs=42306)\n0.5 = fieldNorm(doc=1611)\n0.5 = coord(1/2)\n\n3. Patrick, T.B.; Sievert, M.C.; Popescu, M.: Text indexing of images based on graphical image content (1999) 1.54\n1.5395306 = sum of:\n1.5395306 = product of:\n3.0790613 = sum of:\n3.0790613 = weight(author_txt:popescu in 681) [ClassicSimilarity], result of:\n3.0790613 = score(doc=681,freq=1.0), product of:\n0.83266324 = queryWeight, product of:\n1.2262138 = boost\n9.860925 = idf(docFreq=5, maxDocs=42306)\n0.06886294 = queryNorm\n3.697847 = fieldWeight in 681, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n9.860925 = idf(docFreq=5, maxDocs=42306)\n0.375 = fieldNorm(doc=681)\n0.5 = coord(1/2)\n\n4. Soergel, D.E.: Organizing information : principles of database and retrieval systems (1985) 1.39\n1.391677 = sum of:\n1.391677 = product of:\n2.783354 = sum of:\n2.783354 = weight(author_txt:soergel in 868) [ClassicSimilarity], result of:\n2.783354 = score(doc=868,freq=1.0), product of:\n0.55377966 = queryWeight, product of:\n8.041766 = idf(docFreq=36, maxDocs=42306)\n0.06886294 = queryNorm\n5.026104 = fieldWeight in 868, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n8.041766 = idf(docFreq=36, maxDocs=42306)\n0.625 = fieldNorm(doc=868)\n0.5 = coord(1/2)\n\n5. Soergel, D.: ¬The Broad System of Ordering : a critique (1979) 1.39\n1.391677 = sum of:\n1.391677 = product of:\n2.783354 = sum of:\n2.783354 = weight(author_txt:soergel in 1864) [ClassicSimilarity], result of:\n2.783354 = score(doc=1864,freq=1.0), product of:\n0.55377966 = queryWeight, product of:\n8.041766 = idf(docFreq=36, maxDocs=42306)\n0.06886294 = queryNorm\n5.026104 = fieldWeight in 1864, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n8.041766 = idf(docFreq=36, maxDocs=42306)\n0.625 = fieldNorm(doc=1864)\n0.5 = coord(1/2)\n\nSimilar documents (content)\n\n1. Functional Requirements for Subject Authority Data (FRSAD) : a conceptual model (2009) 0.25\n0.24808757 = sum of:\n0.24808757 = product of:\n0.62021893 = sum of:\n0.013812438 = weight(abstract_txt:classification in 574) [ClassicSimilarity], result of:\n0.013812438 = score(doc=574,freq=1.0), product of:\n0.07352361 = queryWeight, product of:\n1.0581353 = boost\n4.007765 = idf(docFreq=2089, maxDocs=42306)\n0.017337376 = queryNorm\n0.18786398 = fieldWeight in 574, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.007765 = idf(docFreq=2089, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.014362953 = weight(abstract_txt:through in 574) [ClassicSimilarity], result of:\n0.014362953 = score(doc=574,freq=1.0), product of:\n0.07546445 = queryWeight, product of:\n1.0720104 = boost\n4.060318 = idf(docFreq=1982, maxDocs=42306)\n0.017337376 = queryNorm\n0.1903274 = fieldWeight in 574, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.060318 = idf(docFreq=1982, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.00995842 = weight(abstract_txt:from in 574) [ClassicSimilarity], result of:\n0.00995842 = score(doc=574,freq=2.0), product of:\n0.05371068 = queryWeight, product of:\n1.107653 = boost\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.017337376 = queryNorm\n0.18540856 = fieldWeight in 574, product of:\n1.4142135 = tf(freq=2.0), with freq of:\n2.0 = termFreq=2.0\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.012844381 = weight(abstract_txt:systems in 574) [ClassicSimilarity], result of:\n0.012844381 = score(doc=574,freq=1.0), product of:\n0.08018365 = queryWeight, product of:\n1.3533692 = boost\n3.4173236 = idf(docFreq=3771, maxDocs=42306)\n0.017337376 = queryNorm\n0.16018704 = fieldWeight in 574, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.4173236 = idf(docFreq=3771, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.014352695 = weight(abstract_txt:other in 574) [ClassicSimilarity], result of:\n0.014352695 = score(doc=574,freq=1.0), product of:\n0.08634409 = queryWeight, product of:\n1.4043965 = boost\n3.5461698 = idf(docFreq=3315, maxDocs=42306)\n0.017337376 = queryNorm\n0.16622671 = fieldWeight in 574, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.5461698 = idf(docFreq=3315, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.048478972 = weight(abstract_txt:subjects in 574) [ClassicSimilarity], result of:\n0.048478972 = score(doc=574,freq=2.0), product of:\n0.13477382 = queryWeight, product of:\n1.4326185 = boost\n5.4261475 = idf(docFreq=505, maxDocs=42306)\n0.017337376 = queryNorm\n0.35970616 = fieldWeight in 574, product of:\n1.4142135 = tf(freq=2.0), with freq of:\n2.0 = termFreq=2.0\n5.4261475 = idf(docFreq=505, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.041452937 = weight(abstract_txt:database in 574) [ClassicSimilarity], result of:\n0.041452937 = score(doc=574,freq=1.0), product of:\n0.20761725 = queryWeight, product of:\n2.8114445 = boost\n4.259421 = idf(docFreq=1624, maxDocs=42306)\n0.017337376 = queryNorm\n0.19966036 = fieldWeight in 574, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.259421 = idf(docFreq=1624, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.02906772 = weight(abstract_txt:data in 574) [ClassicSimilarity], result of:\n0.02906772 = score(doc=574,freq=1.0), product of:\n0.18332003 = queryWeight, product of:\n3.1258402 = boost\n3.382671 = idf(docFreq=3904, maxDocs=42306)\n0.017337376 = queryNorm\n0.1585627 = fieldWeight in 574, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.382671 = idf(docFreq=3904, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.06939545 = weight(abstract_txt:organization in 574) [ClassicSimilarity], result of:\n0.06939545 = score(doc=574,freq=1.0), product of:\n0.32745877 = queryWeight, product of:\n4.1777277 = boost\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.017337376 = queryNorm\n0.2119212 = fieldWeight in 574, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.36649296 = weight(abstract_txt:authority in 574) [ClassicSimilarity], result of:\n0.36649296 = score(doc=574,freq=8.0), product of:\n0.51913506 = queryWeight, product of:\n5.623387 = boost\n5.3247476 = idf(docFreq=559, maxDocs=42306)\n0.017337376 = queryNorm\n0.70596844 = fieldWeight in 574, product of:\n2.828427 = tf(freq=8.0), with freq of:\n8.0 = termFreq=8.0\n5.3247476 = idf(docFreq=559, maxDocs=42306)\n0.046875 = fieldNorm(doc=574)\n0.4 = coord(10/25)\n\n2. Koenig, M.; Neveroski, K.: Knowledge management : early development (2009) 0.22\n0.21777423 = sum of:\n0.21777423 = product of:\n0.54443556 = sum of:\n0.06260115 = weight(abstract_txt:customers in 828) [ClassicSimilarity], result of:\n0.06260115 = score(doc=828,freq=1.0), product of:\n0.13192658 = queryWeight, product of:\n1.0022566 = boost\n7.5922413 = idf(docFreq=57, maxDocs=42306)\n0.017337376 = queryNorm\n0.47451508 = fieldWeight in 828, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n7.5922413 = idf(docFreq=57, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.017798226 = weight(abstract_txt:design in 828) [ClassicSimilarity], result of:\n0.017798226 = score(doc=828,freq=1.0), product of:\n0.0718685 = queryWeight, product of:\n1.0461575 = boost\n3.9623983 = idf(docFreq=2186, maxDocs=42306)\n0.017337376 = queryNorm\n0.2476499 = fieldWeight in 828, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.9623983 = idf(docFreq=2186, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.019150604 = weight(abstract_txt:through in 828) [ClassicSimilarity], result of:\n0.019150604 = score(doc=828,freq=1.0), product of:\n0.07546445 = queryWeight, product of:\n1.0720104 = boost\n4.060318 = idf(docFreq=1982, maxDocs=42306)\n0.017337376 = queryNorm\n0.25376987 = fieldWeight in 828, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.060318 = idf(docFreq=1982, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.016262034 = weight(abstract_txt:from in 828) [ClassicSimilarity], result of:\n0.016262034 = score(doc=828,freq=3.0), product of:\n0.05371068 = queryWeight, product of:\n1.107653 = boost\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.017337376 = queryNorm\n0.30277094 = fieldWeight in 828, product of:\n1.7320508 = tf(freq=3.0), with freq of:\n3.0 = termFreq=3.0\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.024219597 = weight(abstract_txt:systems in 828) [ClassicSimilarity], result of:\n0.024219597 = score(doc=828,freq=2.0), product of:\n0.08018365 = queryWeight, product of:\n1.3533692 = boost\n3.4173236 = idf(docFreq=3771, maxDocs=42306)\n0.017337376 = queryNorm\n0.30205157 = fieldWeight in 828, product of:\n1.4142135 = tf(freq=2.0), with freq of:\n2.0 = termFreq=2.0\n3.4173236 = idf(docFreq=3771, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.019136926 = weight(abstract_txt:other in 828) [ClassicSimilarity], result of:\n0.019136926 = score(doc=828,freq=1.0), product of:\n0.08634409 = queryWeight, product of:\n1.4043965 = boost\n3.5461698 = idf(docFreq=3315, maxDocs=42306)\n0.017337376 = queryNorm\n0.22163561 = fieldWeight in 828, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.5461698 = idf(docFreq=3315, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.13373114 = weight(abstract_txt:suppliers in 828) [ClassicSimilarity], result of:\n0.13373114 = score(doc=828,freq=1.0), product of:\n0.2757036 = queryWeight, product of:\n2.0490332 = boost\n7.760864 = idf(docFreq=48, maxDocs=42306)\n0.017337376 = queryNorm\n0.485054 = fieldWeight in 828, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n7.760864 = idf(docFreq=48, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.03875696 = weight(abstract_txt:data in 828) [ClassicSimilarity], result of:\n0.03875696 = score(doc=828,freq=1.0), product of:\n0.18332003 = queryWeight, product of:\n3.1258402 = boost\n3.382671 = idf(docFreq=3904, maxDocs=42306)\n0.017337376 = queryNorm\n0.21141694 = fieldWeight in 828, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.382671 = idf(docFreq=3904, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.12025167 = weight(abstract_txt:organizations in 828) [ClassicSimilarity], result of:\n0.12025167 = score(doc=828,freq=1.0), product of:\n0.34860066 = queryWeight, product of:\n3.6430228 = boost\n5.519286 = idf(docFreq=460, maxDocs=42306)\n0.017337376 = queryNorm\n0.34495538 = fieldWeight in 828, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n5.519286 = idf(docFreq=460, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.09252727 = weight(abstract_txt:organization in 828) [ClassicSimilarity], result of:\n0.09252727 = score(doc=828,freq=1.0), product of:\n0.32745877 = queryWeight, product of:\n4.1777277 = boost\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.017337376 = queryNorm\n0.2825616 = fieldWeight in 828, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.0625 = fieldNorm(doc=828)\n0.4 = coord(10/25)\n\n3. Bianchini, D.; Antonellis, V. De: Linked data services and semantics-enabled mashup (2012) 0.20\n0.19761793 = sum of:\n0.19761793 = product of:\n0.5489387 = sum of:\n0.033513557 = weight(abstract_txt:through in 2436) [ClassicSimilarity], result of:\n0.033513557 = score(doc=2436,freq=4.0), product of:\n0.07546445 = queryWeight, product of:\n1.0720104 = boost\n4.060318 = idf(docFreq=1982, maxDocs=42306)\n0.017337376 = queryNorm\n0.44409728 = fieldWeight in 2436, product of:\n2.0 = tf(freq=4.0), with freq of:\n4.0 = termFreq=4.0\n4.060318 = idf(docFreq=1982, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.01836992 = weight(abstract_txt:from in 2436) [ClassicSimilarity], result of:\n0.01836992 = score(doc=2436,freq=5.0), product of:\n0.05371068 = queryWeight, product of:\n1.107653 = boost\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.017337376 = queryNorm\n0.34201616 = fieldWeight in 2436, product of:\n2.236068 = tf(freq=5.0), with freq of:\n5.0 = termFreq=5.0\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.17292364 = weight(abstract_txt:dbpedia in 2436) [ClassicSimilarity], result of:\n0.17292364 = score(doc=2436,freq=5.0), product of:\n0.1660294 = queryWeight, product of:\n1.1243597 = boost\n8.51719 = idf(docFreq=22, maxDocs=42306)\n0.017337376 = queryNorm\n1.0415243 = fieldWeight in 2436, product of:\n2.236068 = tf(freq=5.0), with freq of:\n5.0 = termFreq=5.0\n8.51719 = idf(docFreq=22, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.027137706 = weight(abstract_txt:sources in 2436) [ClassicSimilarity], result of:\n0.027137706 = score(doc=2436,freq=1.0), product of:\n0.10407126 = queryWeight, product of:\n1.2589056 = boost\n4.7681975 = idf(docFreq=976, maxDocs=42306)\n0.017337376 = queryNorm\n0.2607608 = fieldWeight in 2436, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.7681975 = idf(docFreq=976, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.021192148 = weight(abstract_txt:systems in 2436) [ClassicSimilarity], result of:\n0.021192148 = score(doc=2436,freq=2.0), product of:\n0.08018365 = queryWeight, product of:\n1.3533692 = boost\n3.4173236 = idf(docFreq=3771, maxDocs=42306)\n0.017337376 = queryNorm\n0.26429513 = fieldWeight in 2436, product of:\n1.4142135 = tf(freq=2.0), with freq of:\n2.0 = termFreq=2.0\n3.4173236 = idf(docFreq=3771, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.02900286 = weight(abstract_txt:other in 2436) [ClassicSimilarity], result of:\n0.02900286 = score(doc=2436,freq=3.0), product of:\n0.08634409 = queryWeight, product of:\n1.4043965 = boost\n3.5461698 = idf(docFreq=3315, maxDocs=42306)\n0.017337376 = queryNorm\n0.3358986 = fieldWeight in 2436, product of:\n1.7320508 = tf(freq=3.0), with freq of:\n3.0 = termFreq=3.0\n3.5461698 = idf(docFreq=3315, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.048361756 = weight(abstract_txt:database in 2436) [ClassicSimilarity], result of:\n0.048361756 = score(doc=2436,freq=1.0), product of:\n0.20761725 = queryWeight, product of:\n2.8114445 = boost\n4.259421 = idf(docFreq=1624, maxDocs=42306)\n0.017337376 = queryNorm\n0.23293708 = fieldWeight in 2436, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.259421 = idf(docFreq=1624, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.11747579 = weight(abstract_txt:data in 2436) [ClassicSimilarity], result of:\n0.11747579 = score(doc=2436,freq=12.0), product of:\n0.18332003 = queryWeight, product of:\n3.1258402 = boost\n3.382671 = idf(docFreq=3904, maxDocs=42306)\n0.017337376 = queryNorm\n0.64082354 = fieldWeight in 2436, product of:\n3.4641016 = tf(freq=12.0), with freq of:\n12.0 = termFreq=12.0\n3.382671 = idf(docFreq=3904, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.08096137 = weight(abstract_txt:organization in 2436) [ClassicSimilarity], result of:\n0.08096137 = score(doc=2436,freq=1.0), product of:\n0.32745877 = queryWeight, product of:\n4.1777277 = boost\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.017337376 = queryNorm\n0.24724141 = fieldWeight in 2436, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.0546875 = fieldNorm(doc=2436)\n0.36 = coord(9/25)\n\n4. Mitchell, J.S.: ¬The road ahead for library clasification systems (1997) 0.19\n0.18846995 = sum of:\n0.18846995 = product of:\n0.67310697 = sum of:\n0.03222902 = weight(abstract_txt:classification in 3864) [ClassicSimilarity], result of:\n0.03222902 = score(doc=3864,freq=1.0), product of:\n0.07352361 = queryWeight, product of:\n1.0581353 = boost\n4.007765 = idf(docFreq=2089, maxDocs=42306)\n0.017337376 = queryNorm\n0.43834928 = fieldWeight in 3864, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.007765 = idf(docFreq=2089, maxDocs=42306)\n0.109375 = fieldNorm(doc=3864)\n0.016430555 = weight(abstract_txt:from in 3864) [ClassicSimilarity], result of:\n0.016430555 = score(doc=3864,freq=1.0), product of:\n0.05371068 = queryWeight, product of:\n1.107653 = boost\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.017337376 = queryNorm\n0.30590853 = fieldWeight in 3864, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.109375 = fieldNorm(doc=3864)\n0.029970223 = weight(abstract_txt:systems in 3864) [ClassicSimilarity], result of:\n0.029970223 = score(doc=3864,freq=1.0), product of:\n0.08018365 = queryWeight, product of:\n1.3533692 = boost\n3.4173236 = idf(docFreq=3771, maxDocs=42306)\n0.017337376 = queryNorm\n0.37376976 = fieldWeight in 3864, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.4173236 = idf(docFreq=3771, maxDocs=42306)\n0.109375 = fieldNorm(doc=3864)\n0.033489622 = weight(abstract_txt:other in 3864) [ClassicSimilarity], result of:\n0.033489622 = score(doc=3864,freq=1.0), product of:\n0.08634409 = queryWeight, product of:\n1.4043965 = boost\n3.5461698 = idf(docFreq=3315, maxDocs=42306)\n0.017337376 = queryNorm\n0.38786232 = fieldWeight in 3864, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.5461698 = idf(docFreq=3315, maxDocs=42306)\n0.109375 = fieldNorm(doc=3864)\n0.09672351 = weight(abstract_txt:database in 3864) [ClassicSimilarity], result of:\n0.09672351 = score(doc=3864,freq=1.0), product of:\n0.20761725 = queryWeight, product of:\n2.8114445 = boost\n4.259421 = idf(docFreq=1624, maxDocs=42306)\n0.017337376 = queryNorm\n0.46587417 = fieldWeight in 3864, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.259421 = idf(docFreq=1624, maxDocs=42306)\n0.109375 = fieldNorm(doc=3864)\n0.16192274 = weight(abstract_txt:organization in 3864) [ClassicSimilarity], result of:\n0.16192274 = score(doc=3864,freq=1.0), product of:\n0.32745877 = queryWeight, product of:\n4.1777277 = boost\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.017337376 = queryNorm\n0.49448282 = fieldWeight in 3864, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.109375 = fieldNorm(doc=3864)\n0.30234128 = weight(abstract_txt:authority in 3864) [ClassicSimilarity], result of:\n0.30234128 = score(doc=3864,freq=1.0), product of:\n0.51913506 = queryWeight, product of:\n5.623387 = boost\n5.3247476 = idf(docFreq=559, maxDocs=42306)\n0.017337376 = queryNorm\n0.58239424 = fieldWeight in 3864, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n5.3247476 = idf(docFreq=559, maxDocs=42306)\n0.109375 = fieldNorm(doc=3864)\n0.28 = coord(7/25)\n\n5. Pattuelli, C.; Rubinow, S.: ¬The knowledge organization of DBpedia : a case study (2013) 0.18\n0.17779954 = sum of:\n0.17779954 = product of:\n0.6349983 = sum of:\n0.017798226 = weight(abstract_txt:design in 3777) [ClassicSimilarity], result of:\n0.017798226 = score(doc=3777,freq=1.0), product of:\n0.0718685 = queryWeight, product of:\n1.0461575 = boost\n3.9623983 = idf(docFreq=2186, maxDocs=42306)\n0.017337376 = queryNorm\n0.2476499 = fieldWeight in 3777, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n3.9623983 = idf(docFreq=2186, maxDocs=42306)\n0.0625 = fieldNorm(doc=3777)\n0.018416584 = weight(abstract_txt:classification in 3777) [ClassicSimilarity], result of:\n0.018416584 = score(doc=3777,freq=1.0), product of:\n0.07352361 = queryWeight, product of:\n1.0581353 = boost\n4.007765 = idf(docFreq=2089, maxDocs=42306)\n0.017337376 = queryNorm\n0.2504853 = fieldWeight in 3777, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n4.007765 = idf(docFreq=2089, maxDocs=42306)\n0.0625 = fieldNorm(doc=3777)\n0.009388889 = weight(abstract_txt:from in 3777) [ClassicSimilarity], result of:\n0.009388889 = score(doc=3777,freq=1.0), product of:\n0.05371068 = queryWeight, product of:\n1.107653 = boost\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.017337376 = queryNorm\n0.17480488 = fieldWeight in 3777, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n2.796878 = idf(docFreq=7014, maxDocs=42306)\n0.0625 = fieldNorm(doc=3777)\n0.17676298 = weight(abstract_txt:dbpedia in 3777) [ClassicSimilarity], result of:\n0.17676298 = score(doc=3777,freq=4.0), product of:\n0.1660294 = queryWeight, product of:\n1.1243597 = boost\n8.51719 = idf(docFreq=22, maxDocs=42306)\n0.017337376 = queryNorm\n1.0646487 = fieldWeight in 3777, product of:\n2.0 = tf(freq=4.0), with freq of:\n4.0 = termFreq=4.0\n8.51719 = idf(docFreq=22, maxDocs=42306)\n0.0625 = fieldNorm(doc=3777)\n0.054810617 = weight(abstract_txt:data in 3777) [ClassicSimilarity], result of:\n0.054810617 = score(doc=3777,freq=2.0), product of:\n0.18332003 = queryWeight, product of:\n3.1258402 = boost\n3.382671 = idf(docFreq=3904, maxDocs=42306)\n0.017337376 = queryNorm\n0.2989887 = fieldWeight in 3777, product of:\n1.4142135 = tf(freq=2.0), with freq of:\n2.0 = termFreq=2.0\n3.382671 = idf(docFreq=3904, maxDocs=42306)\n0.0625 = fieldNorm(doc=3777)\n0.18505454 = weight(abstract_txt:organization in 3777) [ClassicSimilarity], result of:\n0.18505454 = score(doc=3777,freq=4.0), product of:\n0.32745877 = queryWeight, product of:\n4.1777277 = boost\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.017337376 = queryNorm\n0.5651232 = fieldWeight in 3777, product of:\n2.0 = tf(freq=4.0), with freq of:\n4.0 = termFreq=4.0\n4.5209856 = idf(docFreq=1250, maxDocs=42306)\n0.0625 = fieldNorm(doc=3777)\n0.17276645 = weight(abstract_txt:authority in 3777) [ClassicSimilarity], result of:\n0.17276645 = score(doc=3777,freq=1.0), product of:\n0.51913506 = queryWeight, product of:\n5.623387 = boost\n5.3247476 = idf(docFreq=559, maxDocs=42306)\n0.017337376 = queryNorm\n0.33279672 = fieldWeight in 3777, product of:\n1.0 = tf(freq=1.0), with freq of:\n1.0 = termFreq=1.0\n5.3247476 = idf(docFreq=559, maxDocs=42306)\n0.0625 = fieldNorm(doc=3777)\n0.28 = coord(7/25)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6877074,"math_prob":0.9975577,"size":19427,"snap":"2019-43-2019-47","text_gpt3_token_len":7464,"char_repetition_ratio":0.25809607,"word_repetition_ratio":0.47770154,"special_character_ratio":0.5386833,"punctuation_ratio":0.2836388,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99974257,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-20T14:13:32Z\",\"WARC-Record-ID\":\"<urn:uuid:01fcaac6-00ac-4d1d-a417-c81cadbc2327>\",\"Content-Length\":\"37665\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d69acc25-7cf1-4248-b6f2-bd8478517297>\",\"WARC-Concurrent-To\":\"<urn:uuid:431cf826-5e01-417f-8149-3069630cedb7>\",\"WARC-IP-Address\":\"139.6.160.6\",\"WARC-Target-URI\":\"http://ixtrieve.fh-koeln.de/birds/litie/document/39295\",\"WARC-Payload-Digest\":\"sha1:RETKXXNM4T36HV7TJ5IYKNKS3GCZ33CH\",\"WARC-Block-Digest\":\"sha1:LZ5Y7OJH5ONTBAE6OYRLVE6AXWWECRLS\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986710773.68_warc_CC-MAIN-20191020132840-20191020160340-00306.warc.gz\"}"}
https://soup-dev.websitetoolbox.com/post/copying-attribute-values-to-other-geometries-9774473
[ "Hi, seeing as Soup's copy/transfer attribute features are rather particle centric - from my understanding at least - I am trying to discover a way to copy values between 2 nurbsCurves. Here is the case:\n\nIn my grooming workflow guide curves have custom parameters setup on them that influence the simulated fur (eg. deformation radius). When a groom is updated, these guide curves are replaced by a new set of curves, which have different names and only default values in these common/shared attributes. 2 curves only share the same position on the character mesh, so a world space (nurbsCurveShape1.cv) or uv space coordinate/(follicleShape.uparam/vparam).\n\nDoes soup allow me to copy attribute data between different objects?  Its basically a simple get/setAttr, but requiring a nearest position lookup to define the target curve.\n\nThanks!\nQuote 0 0\nYes, easily.\nBut i don't think you need much of SOuP really.\nWhat you need is to collect the positions of the first CV of the \"old\" curves and store them into vector array.\nThen do the same with the new set of curves.\nThen run proximity check on them and find the closest pairs between them.\nThe get/setAttr between them.\n\nif you have a minimal Maya scene with the couple of \"old\" and \"new\" curves i can provide you the few lines of code that will take care of it, in case tech problems like that are not your forte.\nQuote 0 0\nHello Peter,\n\ngreat, simpler than expected. Thanks for you help! Can you please elaborate the proximity check for me, or point out the node/object that handles this?\n\nAm still curious as how to achieve this using soup itself, as I'd like to understand such basics better, so far haven't noodled anything meaningful together... But to follow up you suggestion, here is my reply to the pythonic approach, including a test scene containing two curves with attributes on both Shapes (roots positioned on a sphere).\n\nQuote:\nThen run proximity check on them and find the closest pairs between them.\n\n\"Elegant' proximity checking is the only thing I am not yet familiar with in Maya, ie. how to script the nearest point evaluation part using a function that has this built-in. Only know of a direct 'if condition'  B == A of the actual two point position values in the 2 lists, say rounded to the third floating point value. Is there a node/maya object to handle this comparison instead? Similar to Houdini's copy (by nearest point) node?\n\nThis is a simple start to saving the point positions for the test scene supplied. I'd add code to create a second list of the new curves .cv positions (vector array). In an if loop compare if curveB pos == curveA pos, if condition is met, setAttr A->B.\n\nYou can ignore this half baked script part if you want, it needs some improvements 🙂\n\nThanks again,\nJan\n\n`''' 1 - save old root positions for curvesA cv list '''from maya import cmdscurvesA = cmds.ls(sl=True)rootCvListA = list()for c in curvesA:    getRootCv = cmds.ls(\"%s.cv\" %c, fl=1)    ''' using cmds.xform, could use cmds.pointPosition just the same '''    rootCvPositionA = cmds.xform(getRootCv, q=True, ws=True, t=True)    rootCvListA.append(rootCvPositionA)''' 2 - same code as above for new root positions on curvesB list'''curvesB = cmds.ls(sl=True)''' as above etc etc '''''' 3  - temp code: a loop setting the attr, to do: better rounding formatting for the if condition, exception handling if list len differs, etc '''for i in rootCvListA:    if rootCvListB[i] == rootCvListA:        cmds.setAttr('%s.deformationRadius' %curvesB[i], '%s.deformationRadius' %curvesA[i])`\nQuote 0 0\n`import maya.cmds as mcimport maya.OpenMaya as omdef transfer():    # source and target curves    src = mc.ls(\"src*\", typ=\"nurbsCurve\") or []    tgt = mc.ls(\"tgt*\", typ=\"nurbsCurve\") or []    # source points (cv)    src_cnt = len(src)    src_pnts = om.MFloatPointArray(src_cnt)    for i in range(src_cnt):         x,y,z = mc.pointPosition(src[i]+\".cv\", w=True)         src_pnts[i].x = x         src_pnts[i].y = y         src_pnts[i].z = z    # targets points (cv)    tgt_cnt = len(tgt)    tgt_pnts = om.MFloatPointArray(tgt_cnt)    for i in range(tgt_cnt):         x,y,z = mc.pointPosition(tgt[i]+\".cv\", w=True)         tgt_pnts[i].x = x         tgt_pnts[i].y = y         tgt_pnts[i].z = z    # find the closest pairs    for i in range(src_cnt):        idx = None        dst = 999999999.9        for j in range(tgt_cnt):            dst2 = src_pnts[i].distanceTo(tgt_pnts[j])            if dst2 < dst:                idx = j                dst = dst2        # copy source.influenceRadius to target.influenceRadius        mc.setAttr(tgt[idx]+\".influenceRadius\", mc.getAttr(src[i]+\".influenceRadius\"))transfer()`\nQuote 0 0\nHi Peter,\n\nthank you very much for this solution, your help is very inspiring! Tried it out on 10,000 curves and took around 102 seconds. I will be getting more into openMaya for my future component wrangling.\n\nWill post the additions to this script when I have it ready. Planned are options to define 2 curve sets as inputs, array length mismatch handling, and a .json file dump/read, so this can be included in other scripts (rig builds for example).\n\nWe should wrap this thread up here, just asking out of curiosity:  are there any existing SOuP examples that do something similar? Or is it just simpler and more sensible to do this with code?\nQuote 0 0" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.79858834,"math_prob":0.8697218,"size":2152,"snap":"2019-26-2019-30","text_gpt3_token_len":533,"char_repetition_ratio":0.11126629,"word_repetition_ratio":0.0,"special_character_ratio":0.24256505,"punctuation_ratio":0.12993039,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96022743,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-17T04:52:26Z\",\"WARC-Record-ID\":\"<urn:uuid:64a5d650-dd8d-47c7-9715-47cc47721c5e>\",\"Content-Length\":\"78968\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cb8e59d8-b9cb-42f2-be3b-5d0d828df501>\",\"WARC-Concurrent-To\":\"<urn:uuid:a53e3bc9-3dcc-4f5c-a591-24164bb8d67c>\",\"WARC-IP-Address\":\"54.86.173.148\",\"WARC-Target-URI\":\"https://soup-dev.websitetoolbox.com/post/copying-attribute-values-to-other-geometries-9774473\",\"WARC-Payload-Digest\":\"sha1:2LO3GGIOVF6C2ZBIXPFDO2HWJAFV55CZ\",\"WARC-Block-Digest\":\"sha1:3R4GJKLS4E5NG6REVLGR42EBYJHAX5SG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195525046.5_warc_CC-MAIN-20190717041500-20190717063500-00487.warc.gz\"}"}
https://www.onlinemathlearning.com/multiply-algebraic-fractions.html
[ "", null, "# Multiplying Algebraic Fractions\n\nRelated Topics:\nMore Lessons for GCSE Maths\nMath Worksheets\n\nExamples, solutions, and videos to help GCSE Maths students learn how to multiply algebraic fractions.\n\nSolve equations with algebraic fractions\nAlgebraic Fractions Lesson (Part 1 of 2)\nMultiplying fractions\n\nAlgebraic Fractions Lesson (Part 2 of 2)\nMultiplying fractions\nMultiplying and dividing algebraic fractions\n\nTry the free Mathway calculator and problem solver below to practice various math topics. Try the given examples, or type in your own problem and check your answer with the step-by-step explanations.", null, "", null, "" ]
[ null, "https://www.onlinemathlearning.com/objects/default_image.gif", null, "https://www.onlinemathlearning.com/objects/default_image.gif", null, "https://www.onlinemathlearning.com/objects/default_image.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.76386356,"math_prob":0.9778991,"size":712,"snap":"2020-45-2020-50","text_gpt3_token_len":150,"char_repetition_ratio":0.1539548,"word_repetition_ratio":0.019607844,"special_character_ratio":0.1755618,"punctuation_ratio":0.084745765,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999848,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-04T08:58:15Z\",\"WARC-Record-ID\":\"<urn:uuid:fab8bbc8-351b-4b3d-813a-653ad94c6619>\",\"Content-Length\":\"42755\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:236e1cc8-a68f-4cfd-a782-0f0e167a7431>\",\"WARC-Concurrent-To\":\"<urn:uuid:ded4b227-fc95-4b13-8c01-1743fe39341c>\",\"WARC-IP-Address\":\"173.247.219.45\",\"WARC-Target-URI\":\"https://www.onlinemathlearning.com/multiply-algebraic-fractions.html\",\"WARC-Payload-Digest\":\"sha1:USH6SLC74JZLQ3P235RIIBOJFDRHSMTQ\",\"WARC-Block-Digest\":\"sha1:UDLBMKSVE2FYLEDLTAQUKN5NSTBWZERN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141735395.99_warc_CC-MAIN-20201204071014-20201204101014-00608.warc.gz\"}"}
https://codytechs.com/speedup-python-list-and-dictionary/
[ "", null, "# SpeedUp Python List and Dictionary", null, "Today, we will be discussing the optimization technique in Python. In this article, you will get to know to speed up your code by avoiding the re-evaluation inside a list and dictionary.\n\nHere I have written the decorator function to calculate the execution time of a function.\n\n``````import functools\nimport time\n\ndef timeit(func):\n@functools.wraps(func)\ndef newfunc(*args, **kwargs):\nstartTime = time.time()\nfunc(*args, **kwargs)\nelapsedTime = time.time() - startTime\nprint('function - {}, took {} ms to complete'.format(func.__name__, int(elapsedTime * 1000)))\nreturn newfunc\n``````\n\nlet’s move to the actual function\n\n## Avoid Re-evaluation in Lists\n\nEvaluating `nums.append` inside the loop\n\n``````@timeit\ndef append_inside_loop(limit):\nnums = []\nfor num in limit:\nnums.append(num)\n\nappend_inside_loop(list(range(1, 9999999)))\n``````\n\nIn the above function `nums.append` function references that are re-evaluated each time through the loop. After execution, The total time taken by the above function\n\n``````o/p - function - append_inside_loop, took 529 ms to complete\n``````\n\nEvaluating `nums.append` outside the loop\n\n``````@timeit\ndef append_outside_loop(limit):\nnums = []\nappend = nums.append\nfor num in limit:\nappend(num)\n\nappend_outside_loop(list(range(1, 9999999)))\n``````\n\nIn the above function, I evaluate `nums.append` outside the loop and used `append` inside the loop as a variable. Total time is taken by the above function\n\n``````o/p - function - append_outside_loop, took 328 ms to complete\n``````\n\nAs you can see when I have evaluated the `append = nums.append` outside the `for` loop as a local variable, it took less time and speed-up the code by `201 ms`.\n\nThe same technique we can apply to the dictionary case also, look at the below example\n\n## Avoid Re-evaluation in Dictionary\n\nEvaluating `data.get` each time inside the loop\n\n``````@timeit\ndef inside_evaluation(limit):\ndata = {}\nfor num in limit:\ndata[num] = data.get(num, 0) + 1\n\ninside_evaluation(list(range(1, 9999999)))\n``````\n\nTotal Time taken by the above function –\n\n``````o/p - function - inside_evaluation, took 1400 ms to complete\n``````\n\nEvaluating `data.get` outside the loop\n\n``````@timeit\ndef outside_evaluation(limit):\ndata = {}\nget = data.get\nfor num in limit:\ndata[num] = get(num, 0) + 1\n\noutside_evaluation(list(range(1, 9999999)))\n``````\n\nTotal time taken by the above function –\n\n``````o/p - function - outside_evaluation, took 1189 ms to complete\n``````\n\nAs you can see we have speed-up the code here by `211 ms`.\n\nI hope you like the explanation of the optimization technique in Python for the list and dictionary. Still, if any doubt or improvement regarding it, ask in the comment section. Also, don’t forget to share your optimization technique." ]
[ null, "https://codytechs.com/wp-content/themes/cool-blog/assets/loader/style-5.gif", null, "https://codytechs.com/wp-content/uploads/2021/12/speedup-python-list-and-dictionary-1.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7171791,"math_prob":0.98681325,"size":2576,"snap":"2022-40-2023-06","text_gpt3_token_len":630,"char_repetition_ratio":0.16368584,"word_repetition_ratio":0.098445594,"special_character_ratio":0.2542702,"punctuation_ratio":0.12447257,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9913125,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,6,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-29T13:46:07Z\",\"WARC-Record-ID\":\"<urn:uuid:5a78b469-db60-49b6-a122-6606bd5fe974>\",\"Content-Length\":\"134426\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f01ac673-052b-4e63-9c5c-6c87d9dd8da0>\",\"WARC-Concurrent-To\":\"<urn:uuid:8c121e71-ec09-475a-85d7-91cb6228bfc0>\",\"WARC-IP-Address\":\"145.14.151.34\",\"WARC-Target-URI\":\"https://codytechs.com/speedup-python-list-and-dictionary/\",\"WARC-Payload-Digest\":\"sha1:6MA3ZLW3IP6S34T44N77OLLQK63ONTSV\",\"WARC-Block-Digest\":\"sha1:44WMK7LUUCR6EHTR74RB5XOXUE7H4BOS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335355.2_warc_CC-MAIN-20220929131813-20220929161813-00554.warc.gz\"}"}
https://completesuccess.in/index.php/2017/07/10/quiz-155/
[ "# Quiz – 155\n\n### Quant Quiz\n\nDirections (Q. 1–2): What approximate value should come in the place of question mark (?) in the following questions?\nQ1. 4201 ÷ 59.998 × 29.88 = ? × 21.145\n1) 90               2) 80             3) 85              4) 100             5) 95\n\nQ2. 959.98 × 780.01 ÷ 23.99 = ?\n1) 30200               2) 30800               3) 31200              4) 21200              5) 30600\n\nQ3. A man bought a mobile and a laptop for Rs. 78000. He sold the mobile at a gain of 25% and the laptop at a loss of 15%, thereby gaining 5% on the whole. Find the cost price of mobile.\n1) Rs. 39000               2) Rs. 34000               3) Rs. 30000               4) Rs. 38000               5) Rs. 32000\n\nQ4. In a regular week, there are 6 working days and for each day the working hours are 8. A man gets Rs. 40 per hour for regular work and Rs. 45 per hour for overtime. If he earns Rs. 10,500 in 5 weeks, then how many hours does he work for?\n1) 220               2) 240               3) 260               4) 210               5) 280\n\nQ5. A class has an equal number of boys and girls. Ten girls left the class to practice for music, leaving thrice as many boys as girls in the classroom. What was the total number of girls and boys present initially in the classroom?\n1) 50               2) 40               3) 35               4) 30               5) 38\n\nQ6. Surbhi’s science test consist of 85 questions from three sections- i.e. A, B and C. 10 questions from section A, 30 questions from section B and 45 question from section C. Although, she answered 70% of section A, 50% of section B and 60% of section C correctly. She did not pass the test because she got less than 60% of the total marks. How many more questions she would have to answer correctly to earn 60% of the marks which is passing grade?\n1) 4               2) 2               3) 5               4) 6               5) 8\n\nQ7. A house owner wants to get his house painted. He is told that this would require 45 kg of paint. Allowing for 6.25% wastage and assuming that the paint is available in 4 kg tins, the number of tins required for painting the house?\n1) 18               2) 11               3) 14               4) 13               5) 12\n\nQ8. One litre of water is evaporated from 8 litre solution containing 5% sugar. The percentage of sugar in the remaining solution is:\n1) 5.71%                2) 6.12%               3) 5%               4) 7.17%               5) 6%\n\nQ9. Two men together start a journey in the same direction. They travel 12 and 20 km/day respectively. After travelling for 8 days the man travelling at 12 km/day doubles his speed and both of them finish the distance in the same time. Find the number of days taken by them to reach the destination.\n1) 28 days               2) 26 days               3) 24 days               4) 30 days               5) 22 days\n\nQ10. Divide Rs. 12615 between P and Q so that P’s share at the end of 6 years may equal to Q’s share at the end of 8 years, compound interest being 5%.\n1) Rs. 6015, Rs. 6600             2) Rs. 6615, Rs. 6000            3) Rs. 7615, Rs. 5000             4) Rs. 6215, Rs. 6400              5) Rs. 6415, Rs. 6200\n\n1. 4\n\n? = (4200 / 60 * 30)/21 = 70*30/21 = 100\n\n1. 3\n\n? = 960 * 780 / 24 = 31200\n\n1. 1\n\nLet the cost price of mobile be Rs. x and laptop be Rs.(78000-x)\n\nx * 25/100 – (78000-x) * 15/100 = 78000 * 5/100\n\n25x + 15x – 78000 × 15 = 78000 × 5\n\n40x = 78000 × 20\n\nx = Rs. 39000\n\n4.3;\n\nSuppose the man works overtime for x hours.\n\nNow, working hours in 5 week = 5 × 6 × 8 = 240 hr.\n\n240 × 40 + x × 45 = 10, 500\n\n9600 + 45x = 10,500\n\nx = (10500 – 9600)/45 = 20hr\n\nTotal hours = 240 + 20 = 260hr\n\n1. 4; Let the number of boys and girls be x each\n\n3(x – 10) = x Þ 2x = 30\n\nx = 15\n\nTotal number of students = 2x = 30\n\n1. 2; Number of questions attempted correctly\n\n= 70% of 10 + 50% of 30 + 60% of 45\n\n= 7 + 15 + 27 = 49\n\nPassing grade = 60/100 * 85 = 51\n\nReqd Ans = 51 – 49 = 2\n\n1. 5; Total paint required = 45 + wastage = 45 + x\n\nx/(45 + x) * 100 = 6.25\n\n100x = 281.25 + 6.25x\n\nx = 3kg\n\nTotal number of tins = (45 + 3)/4 = 12 tins\n\n1. 1\n\nSugar contained = 5/100 * 8 = 0.4\n\nNow, % sugar in remaining solution = 0.4/7 * 100 = 5.71%\n\n1. 3;\n\nFor distance,\n\nDistance travelled in 8 days by 1st man,\n\nD1 = 12 × 8 = 96 km.\n\nand by 2nd man,\n\nD2 = 20 × 8 = 160 km\n\nFor remaining distance, let both take t days\n\nto reach the final destination.\n\nx – 96 = 2 × 12 × t\n\nx – 96 = 24 t ………. (i)\n\nand x – 160 = 20 t …… (ii)\n\nFrom (i) and (ii); we get,\n\nx – 96 – x + 160 = 24 t – 20 t\n\n64 = 4 t\n\nt = 16 days.\n\nTotal number of days = 16 + 8 = 24 days.\n\n1. 2\n\nQ’s share = 1 / (1 + 5/100)^6 : 1 / (1 + 5/100)^8\n\n= 1 : (100/105)^2\n\n= 21^2 : 20^2\n\n= 441 : 400\n\nP’s share = 441/841 * 12615 = Rs. 6615\n\nQ’s share = 400/841 * 12615 = Rs. 6000\n\n### Reasoning Quiz\n\nDirections : Study the following information carefully and answer the given questions :\nEight persons, viz S, T, U, V, W, X, Y and Z are sitting around a circular table facing the centre. Each of them has a different hobby, viz Singing, Acting, Dancing, Cycling, Swimming, Tracking, Painting and Reading, not necessarily in the same order. S, who likes reading, sits third to the left of W. The one who likes painting sits on the immediate right of S. V, who likes acting, sits second to the right of T. T is not on immediate neighbour of W. U, who likes dancing, sits exactly in the middle of the persons whom hobbies are swimming and painting. Y who likes singing, sits second to the left of Z, who likes tracking.\n\nQ1. Which of the following pair represent the immediate neighbours of the person whose hobby is acting ?\n1) T W               2) U Y               3) S Z               4) T Z               5) W Y\n\nQ2. How many people sit between S and the person whose hobby is cycling when counted clockwise ?\n1) None               2) One               3) Two               4) Three              5) Four\n\nQ3. What is the position of T with respect to the position of the person whose hobby is swimming ?\n1) Third to the left               2) Fourth to the right               3) Fifth to the left               4) Second to the right              5) Second to the left\n\nQ4. Who exactly sits between Y and Z ?\n1) S               2) T               3) U               4) V               5) W\n\nQ5. Who sits on the immediate left of the X ?\n1) T               2) U               3) V               4) S               5) None of these\n\nQ6. Whose hobby is tracking ?\n1) Z               2) X               3) U               4) T               5) None of these\n\nQ7. Varun walks 10m. towards west, then turn to his right and walks 5 meter and turns to his left and walks 2 m. and meet his friend. Then, again turns to his left and walks 5m. What is the shortest distance between his starting point and where he meets his friend ?\n1) 12 m.               2) 13 m.               3) 11 m.               4) 14 m.               5) None of these\n\nQ8. Deepika is sister of Kumud. Mohit is brother of Kumud. Tina is mother of Reena, who is sister of Mohit. Pramod is father of Kumud. At least how many daughter does Pramod have ?\n1) One               2) Two               3) Three               4) Four               5) None of these\n\nQ9. Which of the following expression will be true if the expression-?\nA ≤ G = Q < S ≤ B > C > I is definitely true?\n1) Q>C               2) I > G               3) G = Q               4) Q < B               5) None of these\n\nQ10. Which of the following symbols should replace the question mark (?) in the given expression in order to make the expressions A< P as well as B > D definitely true?\nP ≤ B = T > A ? D ≥ C\n1) <               2) ≤               3) >               4) Either 2) or 3)               5) None of these\n\n1. 3;\n2. 3;\n3. 4;\n4. 2;\n5. 4;\n6. 1;\n7. 2; Distance travelled by Varun shown in fig. i.e.\n\nDC = EB = 2m.\n\nEA = EB + BA = 10 + 2 = 12m\n\nTriangle(DEA) is right angled at E.\n\nDA^2 = DE^2 + EA^2\n\nDA = sqroot(DE^2 + EA^2)\n\nDA = 13m\n\n1. 2\n\nSex of Kumud is unknown So, Pramod at least have two daughters.\n\n1. 5\n\nOption (3) is re-statement and only option (4) can be\n\nconcluded as ‘<‘ supersedes ‘≤‘. Hence, Q < B.\n\n10.5\n\n### English Quiz\n\nDirections (Q. 1-5): Read each sentence to find out whether there is any grammatical or idiomatic error in it. The error, if any, will be in one part of the sentence. The number of that part is the answer. If there is ‘No error’, the answer is 5). (Ignore errors of punctuation, If any).\n\nQ1. 1) If anything, the insular state / 2) of urban life demands / 3) a serious look on outsiders by those / 4) who consider themselves insiders./ 5) No error\n\nQ2. 1) In defining professional success, / 2) women place more value than men do on individual achievement, / 3) having passion for his work, receiving respect / 4) and making a difference / 5) No error\n\nQ3. 1) The fact that the interviewee all agreed / 2) to take time from their hectic schedules / 3) to share their insights with students might / 4) introduce a selection effect./ 5) No error\n\nQ4. 1) Now I look back on my career / 2) in the private sector / 3) and realise how I should have been / 4) leading all along. / 5) No error\n\nQ5. 1) It is a thing whose knowledge / 2) may not be acquired / 3) through direct perception / 4) nor can we gain it through inference. /5) No error\n\nDirections (Q. 6-10): Rearrange the following seven sentences (A), (B), (C), (D), (E), (F) and (G) in the proper sequence to form a meaningful paragraph and then answer the questions given below.\n(A) These would be employees with strong interpersonal skills.\n(B) While selecting mentors, it is important to select employees who possess the required knowledge, skills and experience that would benefit the mentors.\n(C) Who are committed and willing to set aside the time to work with a mentor.\n(D) And act as positive role models with a genuine interest in developing others.\n(E) It is important to plan a mentoring programme that aligns with the culture of the organisation as well as development needs of the employees.\n(F) The mentor has to be chosen carefully based on the development plan and need.\n(G) The mentor and mentee need to be explained the pros and cons the mentoring programme.\n\nQ6. Which of the following would be the SECOND sentence after rearrangement?\n1) F               2) C               3) A               4) G               5) E\n\nQ7. Which of the following should be the LAST (SEVENTH) sentence after rearrangement?\n1) A               2) B               3) D               4) C               5) F\n\nQ8. Which of the following should be the FOURTH sentence after rearrangement?\n1) E               2) C               3) F               4) A               5) G\n\nQ9. Which of the following should be the FIRST sentence after rearrangement?\n1) B               2) D               3) C               4) E               5) A\n\nQ10. Which of the following should be the FIFTH sentence after rearrangement?\n1) E               2) G               3) C               4) F               5) B\n\n1. 3; Replace ‘on’ with ‘at’\n2. 3; Replace ‘his’ with ‘their’\n3. 1; Replace ‘interviewee’ with ‘interviewees’\n4. 5; No error\n5. 2; Replace ‘may’ with ‘can’\n\n1. 1\n2. 3\n3. 2\n4. 4\n5. 5\n\n### Computer Quiz\n\nQ1. Which process check to ensure the components of the computer are operating and connected properly?\na)Booting               b)Processing               c)Saving               d)Editing               e)None of these\n\nQ2. What is the main folders on a storage device called?\na)Platform               b)interface               c)Root directory               d)Device driver               e)None of these\n\nQ3. The name that the user give to a document is referred to as?\na)Name given               b)Document given               c)File name               d)Document identify              e)None of these\n\nQ4. Information in a database is typically stored in this, which consists of vertical columns and horizontal rows?\na)Field               b)Record               c)Table               d)File               e)None of these\n\nQ5. The default extension of Access database file is?\na)db              b)adb              c)dba              d)mdb              e)None of these\n\nQ6. A storage device where the access time is depended upon the location of the data is?\na)Random access               b)Serial access               c)Sequential access               d)Transaction access              e)None of these\n\nQ7. _________ means that the data contained in a database is accurate and reliable.\na)Data redundancy               b)Data integrity               c)Data reliability               d)Data consistency              e)None of these\n\nQ8. In computer language, one kilobyte equals?\na)1000 bytes               b)1024 bytes               c)100 bytes               d)8 bytes               e)None of these\n\nQ9. Example of a telecommunications device is a?\na)Keyboard               b)Mouse               c)Modem               d)Printer               e)Scanner\n\nQ10. Data on floppy disks is recorded in rings called ____?\na)Sectors               b)Ringers               c)Rounders               d)Tracks              e)Segments" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.88053954,"math_prob":0.97124434,"size":11079,"snap":"2021-43-2021-49","text_gpt3_token_len":3682,"char_repetition_ratio":0.10455982,"word_repetition_ratio":0.014279532,"special_character_ratio":0.3705208,"punctuation_ratio":0.1210443,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9830836,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-05T02:17:59Z\",\"WARC-Record-ID\":\"<urn:uuid:3c687d6a-a9d6-45a2-9f6f-fa0de31c63bc>\",\"Content-Length\":\"75105\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cdf593f4-560f-4cf8-b284-7c5d898c0d6d>\",\"WARC-Concurrent-To\":\"<urn:uuid:9bfe23c6-1984-4472-9c73-22008654fc1d>\",\"WARC-IP-Address\":\"172.67.169.254\",\"WARC-Target-URI\":\"https://completesuccess.in/index.php/2017/07/10/quiz-155/\",\"WARC-Payload-Digest\":\"sha1:TDBQNINO7ELROPHXFIN6TLEV3EWUHETH\",\"WARC-Block-Digest\":\"sha1:OYA6UN64HK4GPLKXL4QUW34ZVQATK37S\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363134.25_warc_CC-MAIN-20211205005314-20211205035314-00396.warc.gz\"}"}
https://metanumbers.com/55399
[ "## 55399\n\n55,399 (fifty-five thousand three hundred ninety-nine) is an odd five-digits prime number following 55398 and preceding 55400. In scientific notation, it is written as 5.5399 × 104. The sum of its digits is 31. It has a total of 1 prime factor and 2 positive divisors. There are 55,398 positive integers (up to 55399) that are relatively prime to 55399.\n\n## Basic properties\n\n• Is Prime? Yes\n• Number parity Odd\n• Number length 5\n• Sum of Digits 31\n• Digital Root 4\n\n## Name\n\nShort name 55 thousand 399 fifty-five thousand three hundred ninety-nine\n\n## Notation\n\nScientific notation 5.5399 × 104 55.399 × 103\n\n## Prime Factorization of 55399\n\nPrime Factorization 55399\n\nPrime number\nDistinct Factors Total Factors Radical ω(n) 1 Total number of distinct prime factors Ω(n) 1 Total number of prime factors rad(n) 55399 Product of the distinct prime numbers λ(n) -1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) -1 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 10.9223 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 55,399 is 55399. Since it has a total of 1 prime factor, 55,399 is a prime number.\n\n## Divisors of 55399\n\n2 divisors\n\n Even divisors 0 2 1 1\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 2 Total number of the positive divisors of n σ(n) 55400 Sum of all the positive divisors of n s(n) 1 Sum of the proper positive divisors of n A(n) 27700 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 235.37 Returns the nth root of the product of n divisors H(n) 1.99996 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 55,399 can be divided by 2 positive divisors (out of which 0 are even, and 2 are odd). The sum of these divisors (counting 55,399) is 55,400, the average is 27,700.\n\n## Other Arithmetic Functions (n = 55399)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 55398 Total number of positive integers not greater than n that are coprime to n λ(n) 55398 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 5625 Total number of primes less than or equal to n r2(n) 0 The number of ways n can be represented as the sum of 2 squares\n\nThere are 55,398 positive integers (less than 55,399) that are coprime with 55,399. And there are approximately 5,625 prime numbers less than or equal to 55,399.\n\n## Divisibility of 55399\n\n m n mod m 2 3 4 5 6 7 8 9 1 1 3 4 1 1 7 4\n\n55,399 is not divisible by any number less than or equal to 9.\n\n## Classification of 55399\n\n• Arithmetic\n• Prime\n• Deficient\n\n### Expressible via specific sums\n\n• Polite\n• Non-hypotenuse\n\n• Prime Power\n• Square Free\n\n## Base conversion (55399)\n\nBase System Value\n2 Binary 1101100001100111\n3 Ternary 2210222211\n4 Quaternary 31201213\n5 Quinary 3233044\n6 Senary 1104251\n8 Octal 154147\n10 Decimal 55399\n12 Duodecimal 28087\n16 Hexadecimal d867\n20 Vigesimal 6i9j\n36 Base36 16qv\n\n## Basic calculations (n = 55399)\n\n### Multiplication\n\nn×i\n n×2 110798 166197 221596 276995\n\n### Division\n\nni\n n⁄2 27699.5 18466.3 13849.8 11079.8\n\n### Exponentiation\n\nni\n n2 3069049201 170022256686199 9419062998158738401 521806671034995948676999\n\n### Nth Root\n\ni√n\n 2√n 235.37 38.1213 15.3418 8.88588\n\n## 55399 as geometric shapes\n\n### Circle\n\nRadius = n\n Diameter 110798 348082 9.6417e+09\n\n### Sphere\n\nRadius = n\n Volume 7.12188e+14 3.85668e+10 348082\n\n### Square\n\nLength = n\n Perimeter 221596 3.06905e+09 78346\n\n### Cube\n\nLength = n\n Surface area 1.84143e+10 1.70022e+14 95953.9\n\n### Equilateral Triangle\n\nLength = n\n Perimeter 166197 1.32894e+09 47976.9\n\n### Triangular Pyramid\n\nLength = n\n Surface area 5.31575e+09 2.00373e+13 45233.1\n\n## Cryptographic Hash Functions\n\nmd5 7787981698c0c4b7cdb0824c5f0ed814 39f39255f63eac4235cd3cb3d873a08ad6298a5b 1afcd026549ea2984a401d5a8455c40e7107bc955ad1b6c554bc1533d94768a7 a68a1565065a515e0f8c31dcc9d002c0afa450e9b40fddd7dc6840a5174bfcec945eb1b7758afcf9a20048e29fdd325fde75c550be22e8d6760860fb4b3075a6 139d90093076e8832da93f2d3b034450ace30481" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.63290465,"math_prob":0.9807754,"size":4559,"snap":"2021-21-2021-25","text_gpt3_token_len":1604,"char_repetition_ratio":0.120307356,"word_repetition_ratio":0.02962963,"special_character_ratio":0.45426628,"punctuation_ratio":0.075738125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99690014,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-25T06:29:46Z\",\"WARC-Record-ID\":\"<urn:uuid:2f121809-1893-4246-a2ff-3d4036621841>\",\"Content-Length\":\"59655\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:738ba445-4c75-4f87-bd23-6953db0bb201>\",\"WARC-Concurrent-To\":\"<urn:uuid:d6237d18-b49a-4fdc-a2ea-72d08dcd6ad3>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/55399\",\"WARC-Payload-Digest\":\"sha1:TT52WGXOYPCNSMW7Z44U4O35CBV5VIR3\",\"WARC-Block-Digest\":\"sha1:B2FEX2NGA672ADWNW4I4CQPRT4Q6G3YN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487622113.11_warc_CC-MAIN-20210625054501-20210625084501-00268.warc.gz\"}"}
https://forum.facepunch.com/t/ive-begun-my-attempt-to-understand-the-lua-pil/228049
[ "", null, "I've begun my attempt to understand the Lua PIL...\n\nAnd i often run into very small confusions, if anyone wants to be annoyed by small questions over Steam, you can add me.\n\nI’ll probably ask you the dumbest questions, but i can promise it won’t be after atleast an attempt of research.\n\nI won’t give you 3 pages of code, to make you check why anything errors, or where i’m missing a bloody comma.\n\nThe LUA PIL leaves a lot of small things unexplained, and well, i don’t know any coding.\n\nMainly questions like ‘return n * fact(n-1)’\ni think i understand that as \"return to the function, factorial, times, func.factorial, brackets, n-1’ but i don’t understand why 1 is subtracted from the integer, or if that is what actually happens, because the description is simply factorial output of a number, not any subtraction involved.\n\nadd me on steam for a carpet bombardment of dumb confusions like the one above^^\n\nThis is more of a general programming/math thing and not just Lua, but the subtration is for recursion. Consider this:\n\nfunction fact(n)\nif (n == 1) then\nreturn 1\nend\n\nreturn n * fact(n-1)\nend\n\nSo fact(5) is 5 * 4 * 3 * 2 * 1 (5! in math notation), and the function does that accordingly.\n\nSo the bracket after the ‘fact’ function is the number? does ‘n-1’ signify a number or what?\n\n[editline]14th August 2016[/editline]\n\nOH, is it just to make the factorial function so it goes to the next integer, which is less than.\n\nSo instead of it breaking and stopping at 5*\n\nit goes factorial -1 to let it go 5 * 4 * 3 * 2 * 1, and the code repeats in to get the sum\n\ni am severely stupid, and this is probably false ^^^^\n\nn is the argument which signifies the number. The first time, it’s the user inputted number; the other times, it’s the number provided by recursion. So if n is 5, you’d be calling:\n\nfact(5) -> fact(4) -> fact(3) -> fact(2) -> fact(1), which results in 5 * 4 * 3 * 2 * 1\n\nyeah, okay.\n\nn * fact(n-1)\n\nnumber * factorial(number -1)\n\ni was confused by the minus one\n\nbut i see it’s to avoid it from going\n\n5 * 5\n\nand instead -1’s the number, so it gets going at 5 * 4 * 3 * 2 * 1\n\n[editline]14th August 2016[/editline]\n\nthx" ]
[ null, "https://aws1.discourse-cdn.com/business20/uploads/facepunch1/original/2X/2/247ce2d604259e1d664d736f5aec099098a77581.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9123422,"math_prob":0.9308237,"size":853,"snap":"2022-05-2022-21","text_gpt3_token_len":200,"char_repetition_ratio":0.09305065,"word_repetition_ratio":0.0,"special_character_ratio":0.22508793,"punctuation_ratio":0.1160221,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9817498,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-17T02:19:39Z\",\"WARC-Record-ID\":\"<urn:uuid:95f17d08-b758-482d-8342-bad394bffc85>\",\"Content-Length\":\"25448\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5dc36577-f6e7-4f9c-9070-d3f4dacd1576>\",\"WARC-Concurrent-To\":\"<urn:uuid:83e6d42f-1ac0-4602-bd8d-95d17526b037>\",\"WARC-IP-Address\":\"184.104.202.142\",\"WARC-Target-URI\":\"https://forum.facepunch.com/t/ive-begun-my-attempt-to-understand-the-lua-pil/228049\",\"WARC-Payload-Digest\":\"sha1:SX6UHLUSGAUGDQCIPNHZVGQRR43FC7L2\",\"WARC-Block-Digest\":\"sha1:ULFUU6BWQUZNTGWM2RXP6XL26KF2L33X\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320300253.51_warc_CC-MAIN-20220117000754-20220117030754-00560.warc.gz\"}"}
https://reference.wolfram.com/language/ref/SnDispersion.html
[ "# SnDispersion\n\nSnDispersion[list]\n\ngives the", null, "statistic of the elements in list.\n\nSnDispersion[list,c]\n\ngives the", null, "statistic with scaling factor c.\n\n# Details and Options", null, "• SnDispersion is a robust measure of dispersion.\n• SnDispersion is a rank-based estimator with its statistic based on absolute pairwise differences. The statistic does not require location estimation.\n• For the list {x1,x2,,xn}, the value of", null, "estimator is given by the median of {zi,1in} multiplied by a scaling factor c, where zi is the median of {xi xj,1jn} over j.  »\n• When c is not specified, a positive scaling factor c* that satisfies", null, "is applied to make", null, "statistic a consistent estimator of the scale parameter for normally distributed data. Also, a finite sample correction is used by default to make the estimator unbiased for small samples.\n• SnDispersion[{{x1,y1,},{x2,y2,},}] gives {SnDispersion[{x1,x2,}],SnDispersion[{y1,y2,}],}.\n• SnDispersion supports a Method option. The following explicit settings can be specified:\n• \"FiniteSample\" uses finite sample correction (default) \"None\" no correction\n• The option Method is ignored if the scaling factor c is specified in the input.\n\n# Examples\n\nopen all close all\n\n## Basic Examples(3)\n\nSnDispersion of a list:\n\n In:=", null, "Out=", null, "SnDispersion of columns of a matrix:\n\n In:=", null, "Out=", null, "SnDispersion of a list with scaling factor 1:\n\n In:=", null, "Out=", null, "## Properties & Relations(2)\n\nIntroduced in 2017\n(11.1)" ]
[ null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/2.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/3.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/details_1.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/4.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/5.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/6.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/I_2.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/O_1.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/I_4.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/O_2.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/I_6.png", null, "https://reference.wolfram.com/language/ref/Files/SnDispersion.en/O_3.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7038362,"math_prob":0.9359876,"size":1410,"snap":"2019-51-2020-05","text_gpt3_token_len":356,"char_repetition_ratio":0.1628734,"word_repetition_ratio":0.0,"special_character_ratio":0.24326241,"punctuation_ratio":0.14559387,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9866822,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,5,null,5,null,5,null,5,null,5,null,5,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-17T21:42:23Z\",\"WARC-Record-ID\":\"<urn:uuid:e9cc4a2a-fc52-4800-99de-3c53f99731d9>\",\"Content-Length\":\"78499\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:70c028f0-c694-4592-aa28-01e3343039fd>\",\"WARC-Concurrent-To\":\"<urn:uuid:a1ebd90f-63cf-4d63-9760-93e083d869b8>\",\"WARC-IP-Address\":\"140.177.205.163\",\"WARC-Target-URI\":\"https://reference.wolfram.com/language/ref/SnDispersion.html\",\"WARC-Payload-Digest\":\"sha1:AN2K7XMOY6EHKLCQP3LZ6HAVTDBJUPXI\",\"WARC-Block-Digest\":\"sha1:HFIKSZIKZK5FTJXLGOZ2MZ4UZC42NGV4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250591234.15_warc_CC-MAIN-20200117205732-20200117233732-00346.warc.gz\"}"}
https://www.javatpoint.com/cpp-multiset-end-function
[ "# C++ multiset end()\n\nC++ multiset end() function is used to return an iterator which is next to the last entry in the multiset.\n\nNone\n\n## Return value\n\nIt returns an iterator which is pointing next to the last element of the multiset.\n\nConstant.\n\nNo changes.\n\n## Data Races\n\nConcurrently accessing the elements of a multiset is safe.\n\nThe container is accessed neither the non-const nor the const versions modify the container.\n\n## Exception Safety\n\nThis member function never throws exception.\n\n## Example 1\n\nLet's see the simple example for end() function:\n\nOutput:\n\n```C++\nC++\nJava\nJava\n```\n\nIn the above example, end() function is used to return an iterator pointing next to the last element in the mymultiset multiset.\n\n## Example 2\n\nLet's see a simple example to iterate over the multiset using for-each loop:\n\nOutput:\n\n```0 0 1 1 2 2 5\n```\n\n## Example 3\n\nLet's see a simple example to iterate over the multiset using while loop:\n\nOutput:\n\n```Elements of mymultiset are:\nAman\nDeep\nDeep\nNikita\nSonu\n```\n\nIn the above example, end() function is used to return an iterator pointing next to the last element in the mymultiset multiset.\n\n## Example 4\n\nLet's see a simple example:\n\nOutput:\n\n```Enter value to find: 60\n\nEnter value to find: 20\nElement found: 20\n```\n\nIn the above example, end() function is used to return an iterator pointing next to the last element in the mymultiset multiset.\n\nNext TopicC++ multiset\n\n### Feedback", null, "", null, "", null, "" ]
[ null, "https://www.javatpoint.com/images/facebook32.png", null, "https://www.javatpoint.com/images/twitter32.png", null, "https://www.javatpoint.com/images/pinterest32.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6374673,"math_prob":0.85662395,"size":1516,"snap":"2021-43-2021-49","text_gpt3_token_len":360,"char_repetition_ratio":0.17063493,"word_repetition_ratio":0.30039525,"special_character_ratio":0.21899736,"punctuation_ratio":0.101045296,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9566721,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-02T22:59:32Z\",\"WARC-Record-ID\":\"<urn:uuid:4eb26893-c414-4682-9c83-f0a1af87e83e>\",\"Content-Length\":\"43372\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b96e87f8-8d1b-4b0f-963e-e6df9f8d70b7>\",\"WARC-Concurrent-To\":\"<urn:uuid:c16c217d-38ec-4490-9c8c-f0d0afc04d26>\",\"WARC-IP-Address\":\"104.21.79.8\",\"WARC-Target-URI\":\"https://www.javatpoint.com/cpp-multiset-end-function\",\"WARC-Payload-Digest\":\"sha1:C7SSJVLPXCABBWVRITLJ56KKAAATK4SK\",\"WARC-Block-Digest\":\"sha1:BM334XVMJ64YECF46NDZB6GZAZ44JBHA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362297.22_warc_CC-MAIN-20211202205828-20211202235828-00429.warc.gz\"}"}
http://www.expertsmind.com/library/explain-the-molal-freezing-point-constant-for-benzene-5541750.aspx
[ "### Explain the molal freezing point constant for benzene\n\nAssignment Help Chemistry\n##### Reference no: EM13541750\n\nThe normal freezing point of benzene is 5.5 degrees C. A benzene solution contains 62.5 mg of naphthalene (MW = 128g/mol) per 1.00g benzene. The solution freezes at 3.0 degrees C. What is the molal freezing point constant for benzene?\n\n#### Response and present a logical sequence of ideas\n\nRead each question carefully and address all parts of the question. Not only will you be evaluated by the correctness of your answer but on your ability to communicate the\n\n#### Would a change in volume of the container affect fraction\n\nWill the equilibrium constant for the reaction increase or decrease with increasing temperature? Explain. At constant temperature, would a change in the volume of the contain\n\n#### Compute the density of a neutron\n\nNeutron stars are believed to be composed of solid nuclear matter, primarily neutrons.If the radius of a neutron is 1.0 × 10-13 cm, calculate the density of a neutron in g/c\n\n#### Explain aluminum hydroxide reacts with sulfuric acid\n\nAluminum hydroxide reacts with sulfuric acid as follows: 2 Al(OH)3 (s) + 3H2SO4 (aq) rightarrow Al2(SO4)3 (aq) + 6H2O (l) Which reagent is the limiting reactant when 0.700mo\n\n#### Acid-base titration and analytical chemistry\n\nAcid-base titration & analytical chemistry, A 0.213-g sample of uranyl(VI)nitrate, UO2(NO3)2, is dissolved in 20.0 mL of 1.0 M H2SO4 and shaken with Zn. The zinc reduces the\n\n#### Maximize the yiled of your fisher esterification product\n\nQuestion- If the cost of both of the alcohol and carboxylic acid were prohibitive, how would you maximize the yiled of your Fisher esterification product while keeping the c\n\n#### Compute the energy in mev released by the decay\n\nthe relevant masses for this decay, and calculate the energy (in MeV) released by the decay of one such atom. You can neglect the mass of the neutrino that is one of the dec\n\n#### Define what is its solubility at 42.3 degrees c\n\nExplain the solubility of AgCl(s) in water at 25 degrees C is 1.33 x 10-5 mol/L and its Delta H of solution is 65.7 kJ/mol. Define what is its solubility at 42.3 degrees C\n\n### Write a Review", null, "" ]
[ null, "http://www.expertsmind.com/prostyles/images/3.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8878397,"math_prob":0.91931015,"size":2220,"snap":"2020-24-2020-29","text_gpt3_token_len":584,"char_repetition_ratio":0.09296029,"word_repetition_ratio":0.0,"special_character_ratio":0.25,"punctuation_ratio":0.1091314,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97558147,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-06T16:35:30Z\",\"WARC-Record-ID\":\"<urn:uuid:04c4c747-18ed-454d-8c2a-9047903fd7d7>\",\"Content-Length\":\"52280\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d87a0196-d1b3-4ef0-9fa7-1465e1e6cfb7>\",\"WARC-Concurrent-To\":\"<urn:uuid:1183b4ec-9a0a-44d8-bbd3-6338de8c1899>\",\"WARC-IP-Address\":\"198.38.85.49\",\"WARC-Target-URI\":\"http://www.expertsmind.com/library/explain-the-molal-freezing-point-constant-for-benzene-5541750.aspx\",\"WARC-Payload-Digest\":\"sha1:DCCY4OUP3XWMBLSF2ZH2I3LX6H2JVRYI\",\"WARC-Block-Digest\":\"sha1:OKT4DHHGUNWHUUS2VXY5TY2NLVDOWZLG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655881763.20_warc_CC-MAIN-20200706160424-20200706190424-00169.warc.gz\"}"}
https://electronics.stackexchange.com/questions/539033/how-to-make-describe-an-element-with-negative-resistance-of-minus-1-ohm?noredirect=1
[ "# How to make/describe an element with negative resistance of minus 1 Ohm?\n\nHow do I make/describe an element with negative resistance of minus 1 Ohm?\n\nIt's I–V characteristic should then be\n\n$$\\I = -U\\$$\n\nIs this possible?\n\n• I need exactly what I wrote. No compromises. The negative resistance should not be used differentially.\n• I need to build such the device. It should not only work grounded, but at any potential.\n• Of course it should be kind of \"active\".\n• If a power source is required for such a device -- then that is ok. Power sources are allowed :)\n• Comments are not for extended discussion; this conversation has been moved to chat. Dec 25 '20 at 19:27\n\nYou can make such a device using active components. If one end of the resistor is grounded, this simple circuit would work, at least in theory. The op-amp would have to be able to deliver sufficient current and have sufficient voltage swing for whatever voltage you wanted to apply.", null, "simulate this circuit – Schematic created using CircuitLab\n\nFor example, if you apply 5V, the op-amp would have to swing to +10V while sourcing 5A.\n\nAn actual negative resistor would be a power source (P = E^2/R) so it's impossible to have such a device that does not use or contain a source of energy.\n\nThere are a few devices and circuits that exhibit negative differential resistance- over some region of operation the current drops with increasing voltage (while the total current is always positive). For example, Esaki diodes, discharge tubes, switching power supplies. So in a small signal analysis, resistance can be negative.\n\nEdit:\n\nYou've added that you require it to be ungrounded. In that case, merely power it by a battery or an isolated DC-DC converter and use the circuit as shown (with a suitable power op-amp). There are still many \"compromises\" - as in limitations and non-idealities as there are with any real circuit or element, of course.\n\nHere is a simulation with a 1K resistor for R1 which simulates a -1K resistor.", null, "simulate this circuit", null, "As you can see the current through the simulated -1K resistor is the mirror of the current through the real 1K resistor R4. I've offset the other side of the resistor by 5V from ground in each case and the sawtooth goes from 0 to 10V so the voltage across each element goes from -5V to +5V. Not shown are the power supplies.\n\nYou won't easily be able to simulate the isolated version because op-amp models typically have ground nodes within the model.\n\n• @Circuitfantasist in that case write a better answer. Dec 24 '20 at 22:38\n• @mkeith No, no, don't dare Circuit fantasist to write an answer! Dec 24 '20 at 23:10\n• @PeteW it is not enough that the slope of the V/I curve be negative. It must also be linear, or somewhat linear. A resistor means V / I = k, where k is constant. A constant power load means that V * I = k, where k is constant. Not the same thing. Dec 24 '20 at 23:10\n• @Circuitfantasist It behaves like a -1 ohm resistor with one end grounded. Just as requested. For 0V input (short the input to ground) current is 0. For 1V input, current into point X is -1A. Etc. Dec 24 '20 at 23:25\n• @PeteW A switching power supply with a constant load on a regulated output is (ideally) a constant power device. But it's only differential resistance. If you look at the input current at the minimum input voltage at which it will operate, the current will flow into the (+) terminal of the supply. As you increase the voltage the current will decrease from that (high) value to lower values. But it will never get to zero, let alone negative. Dec 24 '20 at 23:28\n\nA resistor is a two terminal circuit element that enforces the following relationship between voltage and current:\n\nV / I = R\n\nWhere V is the voltage measured across the two terminals, and I is the current flowing through the element. To be a resistor, R must be constant over a range of voltage and currents.\n\nLogically, then, a resistor with resistance of -1 Ohms would be a two terminal element which enforces the following rule:\n\nV / I = -1\n\nI think this explains what a negative resistance is or would be at a theoretical and/or mathematical level. Approximating a negative resistance with electronics is possible (see Spehro's answer). But that is more of a negative resistance emulator than a true negative resistance.\n\nA true negative resistor would deliver power to any voltage source connected to it. The higher the voltage (in magnitude), the more the power. So this is not possible for a passive circuit element. Spehro showed how it can be done with active elements.\n\n• No, this does not explain anything useful to one who wants to make a negative resistor. To make sure of this, ask the OP to make a negative resistor according to your recipe. It is a recipe for mathematicians.They will even write, for their convenience, a/b = c and a/b = -c ...and will be happy... Dec 24 '20 at 23:32\n• @Circuitfantasist write your own answer. Nothing is stopping you. Also, please stop speaking for the OP. That is presumptuous. Dec 24 '20 at 23:33\n• Passivness of an element is not required. Negative resistor should change electromotive force inside it according to applied voltage.\n– Dims\nDec 24 '20 at 23:45\n• @Circuitfantasist you are a teacher sitting in on another professor's class and criticizing the curriculum and method of presentation in front of all the students (and the world). Please go teach your own class. That is what I am asking you. Dec 24 '20 at 23:54\n• I agree with Fantasist. The question posted by OP already showed they understand that a negative resistor would have the relation $V=-I$. Dec 25 '20 at 0:22\n\nUtterly impractical, but just to indulge the puzzle in an abstract sense:\n\nTwo howland pumps chould function as a floating \"negative resistor\" within a bounded range of voltages/currents/frequencies? (for a no-batteries concept)\n\n(Not completely sure I got the +/- right on the Howland pumps but hopefully you get the idea)\n\nPS -- Merry XMAS", null, "• Here you have a floating negative resistor electronics.stackexchange.com/questions/460605/…\n– G36\nDec 26 '20 at 16:30\n• Nice, though I have a suspicion that without some compensation these things would very much prefer to oscillate. Dec 26 '20 at 19:16\n• @G36, It is a great challenge to reveal the idea behind this mess of resistors and op-amps in your answer... It reminds me of an interesting RG discussion, five years ago, when I managed to do it with Antoniou's GIC. I am tempted to do it with this circuit solution… but I am afraid that I will \"waste\" the rest of Christmas holidays in thinking :) Dec 27 '20 at 16:14\n\nSame idea to the answer with the howland's, but with less stuff -- or a bilateral version of the regular NIC /// update /// realized this is the same circuit of G36 in comment above.", null, "" ]
[ null, "https://i.stack.imgur.com/3DjPU.png", null, "https://i.stack.imgur.com/i7Gh6.png", null, "https://i.stack.imgur.com/fJoOA.png", null, "https://i.stack.imgur.com/mMzsf.jpg", null, "https://i.stack.imgur.com/wYHFb.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9379784,"math_prob":0.90780985,"size":1790,"snap":"2021-31-2021-39","text_gpt3_token_len":403,"char_repetition_ratio":0.11758119,"word_repetition_ratio":0.0,"special_character_ratio":0.21396647,"punctuation_ratio":0.0787172,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97495717,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-16T12:16:39Z\",\"WARC-Record-ID\":\"<urn:uuid:40fd3ae8-c563-4763-b35c-18b38d9d4d20>\",\"Content-Length\":\"218217\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5a0bfde6-415f-46c0-ba46-b287351008e5>\",\"WARC-Concurrent-To\":\"<urn:uuid:38284a6b-f5fd-4f51-9ef5-912325e78a83>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://electronics.stackexchange.com/questions/539033/how-to-make-describe-an-element-with-negative-resistance-of-minus-1-ohm?noredirect=1\",\"WARC-Payload-Digest\":\"sha1:WE6DNKTPCMTKTNOT3W7B3ZDPBH57JCYX\",\"WARC-Block-Digest\":\"sha1:UMETPPNGDEGKYOCKBXAY4TNFDZJPKD3U\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780053493.41_warc_CC-MAIN-20210916094919-20210916124919-00401.warc.gz\"}"}
https://igraph.org/python/tutorial/develop/tutorials/online_user_actions/online_user_actions.html
[ "# python-igraph Manual\n\nFor using igraph from Python\n\n# Online user actions¶\n\nThis example reproduces a typical data science situation in an internet company. We start from a pandas DataFrame with online user actions, for instance for an online text editor: the user can create a page, edit it, or delete it. We want to construct and visualize a graph of the users highlighting collaborations on the same page/project.\n\n```import igraph as ig\nimport numpy as np\nimport pandas as pd\nimport matplotlib.pyplot as plt\n\n# User data (usually would come with time stamp)\naction_dataframe = pd.DataFrame([\n['2r09ej221sk2k5', 'editPage', 'greatProject'],\n['oi32ncwosap399', 'editPage', 'greatProject'],\n['4r4320dkqpdokk', 'createPage', 'miniProject'],\n['320eljl3lk3239', 'editPage', 'miniProject'],\n['3203ejew332323', 'createPage', 'private'],\n['3203ejew332323', 'editPage', 'private'],\n['40m11919332msa', 'createPage', 'private2'],\n['40m11919332msa', 'editPage', 'private2'],\n['2r09ej221sk2k5', 'editPage', 'anotherGreatProject'],\n],\ncolumns=['userid', 'action', 'project'],\n)\n```\n\nThis block just introduces the toy data: a DataFrame with three columns, namely the user id, the action, and the page or project that was being actioned upon. Now we need to check when two users worked on the same page. We choose to use a weighted adjacency matrix for this, i.e. a table with rows and columns indexes by the users that has nonzero entries whenever folks collaborate. First, let’s get the users and prepare an empty matrix:\n\n```users = action_dataframe['userid'].unique()\nnp.zeros((len(users), len(users)), np.int32),\nindex=users,\ncolumns=users,\n)\n```\n\nThen, let’s iterate over all projects one by one, and add all collaborations:\n\n```for project, project_data in action_dataframe.groupby('project'):\nproject_users = project_data['userid'].values\nfor i1, user1 in enumerate(project_users):\nfor user2 in project_users[:i1]:\n```\n\nThere are many ways to achieve the above matrix, so don’t be surprised if you came up with another algorithm ;-)\n\nNow it’s time to make the graph:\n\n```g = ig.Graph.Weighted_Adjacency(adjacency_matrix, mode='plus')\n```\n\nAnd finally, let’s plot a layout of the graph, for instance a circle:\n\n```# Make a layout first\nlayout = g.layout('circle')\n\n# Make vertex size based on their closeness to other vertices\nvertex_size = g.closeness()\nvertex_size = [0.5 * v**2 if not np.isnan(v) else 0.05 for v in vertex_size]\n\n# Make mpl axes\nfig, ax = plt.subplots()\n\n# Plot graph in that axes\nig.plot(\ng,\ntarget=ax,\nlayout=layout,\nvertex_label=g.vs['name'],\nvertex_color=\"lightblue\",\nvertex_size=vertex_size,\nedge_width=g.es[\"weight\"],\n)\nplt.show()\n```\n\nWe added a few fancy features to this plot to show off igraph’s capabilities. The result is shown below.", null, "The collaboration graph: thicker edges mean multiple collaborations, and larger vertices indicate users with higher closeness to the rest of the network.¶\n\nLoops indicate “self-collaborations”, which are not very meaningful. To filter out loops without losing the edge weights, we can use:\n\n```g = g.simplify(combine_edges='first')\n```\n\nand then repeat the plotting code verbatim. The result is shown below." ]
[ null, "https://igraph.org/python/tutorial/develop/_images/online_user_actions.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.59588754,"math_prob":0.76167023,"size":3243,"snap":"2022-27-2022-33","text_gpt3_token_len":847,"char_repetition_ratio":0.13738808,"word_repetition_ratio":0.00477327,"special_character_ratio":0.28276289,"punctuation_ratio":0.21440823,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98089,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-03T04:42:17Z\",\"WARC-Record-ID\":\"<urn:uuid:ee797ebb-1115-477f-98bb-38908bcbed0e>\",\"Content-Length\":\"21856\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:84c36c33-5d1d-415d-885e-3b4c82d0b9d5>\",\"WARC-Concurrent-To\":\"<urn:uuid:efb171eb-fa8d-44ad-8641-829fb2a07a40>\",\"WARC-IP-Address\":\"185.199.109.153\",\"WARC-Target-URI\":\"https://igraph.org/python/tutorial/develop/tutorials/online_user_actions/online_user_actions.html\",\"WARC-Payload-Digest\":\"sha1:VF532SDZZ5WTAONWSBTR5BMHVTDZVHRX\",\"WARC-Block-Digest\":\"sha1:UXORYABOWVTEWSW4KTMVY3EJ7VB5B3AY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104215790.65_warc_CC-MAIN-20220703043548-20220703073548-00396.warc.gz\"}"}
http://forums.wolfram.com/mathgroup/archive/2004/Oct/msg00138.html
[ "", null, "", null, "", null, "", null, "", null, "", null, "", null, "NMininimize vs. FIndMinimum with NDSolve?\n\n• To: mathgroup at smc.vnet.net\n• Subject: [mg51135] NMininimize vs. FIndMinimum with NDSolve?\n• From: Manuel Morales <Manuel.A.Morales at williams.edu>\n• Date: Tue, 5 Oct 2004 04:37:45 -0400 (EDT)\n• Sender: owner-wri-mathgroup at wolfram.com\n\n```Is it possible to use NMinimize to estimate parameters for a\ndifferential equation solved with NDSolve? I *am* able to use\nFindMinimum, but NMinimize doesn't seem to work...\n\nHere is what I am doing using FindMinimum:\n\nsse[r_?NumberQ, q_?NumberQ] := Block[{sol, f},\n\nPlus @@ Table[\nsol = NDSolve[{f'[t] == r f[t] + q f[t]^2,\nf == data[[i]][][]},\nf, {t, 0, 10}][];\nPlus @@ Apply[(f[#1] - #2)^2 &, data[[i]], {1}] /. sol, {i, 1,\nLength[data]}]];\nparams = FindMinimum[sse[r, q], {r, .1, .2}, {q, -.001, -.002}]\n\nHowever, using NMinimize to estimate doesn't work. That is, if I replace\nthe last line with:\n\nparams = NMinimize[sse[r, q], {r, q}]\n\nI get a bunch of error messages.\n\nThanks for any help. If anyone wants to try this, you can generate a\ntest data set below:\n\nBlock[{r, q},\nr = .5; q = -.001;\ndata = Table[\nsol = NDSolve[{f'[t] == r f[t] + q f[t]^2, f == j},\nf, {t, 0, 10}][];\nTable[{i, f[i] /. sol}, {i, 0, 10, 2}],\n{j, 1, 301, 150}]\n]\n\nManuel\n\n```\n\n• Prev by Date: MathLink error\n• Next by Date: Re: A way around the limitations of Re[] and Im[]" ]
[ null, "http://forums.wolfram.com/mathgroup/images/head_mathgroup.gif", null, "http://forums.wolfram.com/mathgroup/images/head_archive.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/2.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/0.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/0.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/4.gif", null, "http://forums.wolfram.com/mathgroup/images/search_archive.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.70333517,"math_prob":0.98802,"size":1245,"snap":"2021-31-2021-39","text_gpt3_token_len":462,"char_repetition_ratio":0.10717163,"word_repetition_ratio":0.08737864,"special_character_ratio":0.41445783,"punctuation_ratio":0.27707008,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9968601,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-27T20:01:09Z\",\"WARC-Record-ID\":\"<urn:uuid:837a118e-afed-4220-8986-dcb506289a3f>\",\"Content-Length\":\"44993\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:053c1697-6d78-4b43-af10-da2a1c346f2b>\",\"WARC-Concurrent-To\":\"<urn:uuid:30cec1e4-647d-4750-afa0-65e2cac2732d>\",\"WARC-IP-Address\":\"140.177.205.73\",\"WARC-Target-URI\":\"http://forums.wolfram.com/mathgroup/archive/2004/Oct/msg00138.html\",\"WARC-Payload-Digest\":\"sha1:7YC55MX2ATO36BSXRO4PI46C73DPAFVU\",\"WARC-Block-Digest\":\"sha1:VKTSR3MWNFMXLKGLAGFJ4FRJRNBFR6TJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780058467.95_warc_CC-MAIN-20210927181724-20210927211724-00360.warc.gz\"}"}
https://otland.net/threads/help-simplifying-the-script.282864/#post-2708929
[ "# LuaHelp simplifying the script\n\n#### MorganaSacani\n\n##### Active Member\nI'm creating a script, but I will have to do a lot of repetitions. For that I need to understand how to create a loop and make my work easier\nLua:\n``````function onUse(cid, item, fromPosition, itemEx, toPosition)\n-- Trees\n\n-- Stones\n\n-- Corpses\nif itemEx.itemid == 2813 then -- Dead Rat\nif math.random(1, 100) <= 60 then\ndoPlayerAddItem(cid, 2666, 3) -- Raw Meat\nelse\nend\nif math.random(1, 100) <= 30 then\ndoTransformItem(itemEx.uid, 2815)\n-- doDecayItem(itemEx.uid)\nend\nend\n\nreturn true\nend``````\n\nI thought of something like this, but I don't know how to do it:\nLua:\n``````local TARGETS = {\n = {\n = 3, -- Raw meat\n = 1, -- Leather\n}\n}``````\n\nI need to add the doTransformItem in the loop too but I don't know how\n\nSolution\nThis problem happens when I try to use the pick on some other itemId that is not in the table.\n\nLua:\n``````function onUse(cid, item, fromPosition, itemEx, toPosition)\nif not config[itemEx.itemid] then\n-- in case you want to notify the player\n-- doPlayerSendTextMessage(cid, MESSAGE_STATUS_SMALL, \"You cannot use foo on bar.\")\nreturn true\nend\n\n-- etc etc\nend``````\n\n#### amatria\n\n##### Well-Known Member\nI hope this helps:\n\nLua:\n``````local config = {\n = {\nchance = 60,\nsuccess = {id = 2666, qty = 3},\nfail = {id = 5878, qty = 1}\n},\ndoTransform = {\nchance = 30,\nsuccess = {id = 2815}\n}\n}\n}\n\n-- function onUse(...)\nlocal doTransformTable = config[itemEx.itemid].doTransform\n\nif math.random(1, 100) <= addItemTable.chance then\nelse\nend\n\nif math.random(1, 100) <= doTransformTable.chance then\n-- doTransformItem(itemEx.uid, doTransformTable.success.id)\nelse\n-- doDecayItem(itemEx.uid)\nend``````\n\nLast edited:\n•", null, "MorganaSacani and Tofame\nOP\nOP\nM\n\n#### MorganaSacani\n\n##### Active Member\n[19:30:29] [Error - Action Interface]\n[19:30:29] data/actions/scripts/tools/pick.lua", null, "nUse\n[19:30:29] Description:\n[19:30:29] data/actions/scripts/tools/pick.lua:16: attempt to index a nil value\n[19:30:29] stack traceback:\n[19:30:29] data/actions/scripts/tools/pick.lua:16: in function <data/actions/scripts/tools/pick.lua:15>\n\nLua:\n``````local config = {\n = {\nchance = 75,\nsuccess = {id = 2666, qty = 3},\nfail = {id = 5878, qty = 1}\n},\ndoTransform = {\nchance = 20,\nsuccess = {id = 2814}\n}\n}\n}\n\nfunction onUse(cid, item, fromPosition, itemEx, toPosition)\nlocal doTransformTable = config[itemEx.itemid].doTransform\n\nlocal stamina = 5\nif getPlayerAttrStamina(cid) >= stamina then\ndoPlayerRemoveAttrStamina(cid, stamina)\nif math.random(1, 100) <= addItemTable.chance then\ndoSendMagicEffect(toPosition, CONST_ME_BLOCKHIT)\nelse\ndoSendMagicEffect(toPosition, CONST_ME_BLOCKHIT)\nend\n\nif math.random(1, 100) <= doTransformTable.chance then\ndoDecayItem(itemEx.uid)\ndoTransformItem(itemEx.uid, doTransformTable.success.id)\ndoSendMagicEffect(toPosition, CONST_ME_POFF)\nend\nelse\ndoPlayerSendTextMessage(cid, MESSAGE_STATUS_SMALL, \"You are out of vigor.\")\nend\n\nif math.random(1, 100) <= 10 then doPlayerRemoveAttrFood(cid, 1) end\n-- if math.random(1, 100) <= 20 then doPlayerRemoveAttrWater(cid, 1) end\n\nreturn true\nend``````\n\nThis problem happens when I try to use the pick on some other itemId that is not in the table.\n\nLast edited:\n\n#### amatria\n\n##### Well-Known Member\nThis problem happens when I try to use the pick on some other itemId that is not in the table.\n\nLua:\n``````function onUse(cid, item, fromPosition, itemEx, toPosition)\nif not config[itemEx.itemid] then\n-- in case you want to notify the player\n-- doPlayerSendTextMessage(cid, MESSAGE_STATUS_SMALL, \"You cannot use foo on bar.\")\nreturn true\nend\n\n-- etc etc\nend``````\n\n•", null, "MorganaSacani\nOP\nOP\nM\n\n#### MorganaSacani\n\n##### Active Member\nLua:\n``````function onUse(cid, item, fromPosition, itemEx, toPosition)\nif not config[itemEx.itemid] then\n-- in case you want to notify the player\n-- doPlayerSendTextMessage(cid, MESSAGE_STATUS_SMALL, \"You cannot use foo on bar.\")\nreturn true\nend\n\n-- etc etc\nend``````\nWow thx!\n\n•", null, "amatria" ]
[ null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.76926464,"math_prob":0.8194094,"size":986,"snap":"2022-40-2023-06","text_gpt3_token_len":322,"char_repetition_ratio":0.104887985,"word_repetition_ratio":0.23076923,"special_character_ratio":0.336714,"punctuation_ratio":0.13705584,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95154136,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-29T03:59:39Z\",\"WARC-Record-ID\":\"<urn:uuid:63b8d497-54cd-4559-8b69-32fef6f1286f>\",\"Content-Length\":\"113201\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1ab963ce-7043-40d3-9779-dfb3223f5359>\",\"WARC-Concurrent-To\":\"<urn:uuid:3b5dccfa-c162-4c23-8d4a-3208f0c8f283>\",\"WARC-IP-Address\":\"104.21.51.77\",\"WARC-Target-URI\":\"https://otland.net/threads/help-simplifying-the-script.282864/#post-2708929\",\"WARC-Payload-Digest\":\"sha1:V3B3GUOG57CADDMQ4BF4PGLCY6TWN2M2\",\"WARC-Block-Digest\":\"sha1:T3YDWW4QJO5YSHF5GNI5QZSAAHLJKCTW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499697.75_warc_CC-MAIN-20230129012420-20230129042420-00449.warc.gz\"}"}
https://www.rdocumentation.org/packages/permutations/versions/1.0-5/topics/permorder
[ "# permorder\n\n0th\n\nPercentile\n\n##### The order of a permutation\n\nReturns the order of a permutation $$P$$: the smallest strictly positive integer $$n$$ for which $$P^n$$ is the identity.\n\n##### Usage\npermorder(x, singly = TRUE)\n##### Arguments\nx\n\nPermutation, coerced to cycle form\n\nsingly\n\nBoolean, with default TRUE meaning to return the order of each element of the vector, and FALSE meaning to return the order of the vector itself (that is, the smallest strictly positive integer for which all(x^n==id)).\n\n##### Details\n\nCoerces its argument to cycle form.\n\nThe order of the identity permutation is 1.\n\n##### Note\n\nUses mLCM() from the numbers package.\n\nsgn\n\n• permorder\n##### Examples\n# NOT RUN {\nx <- rperm(5,20)\npermorder(x)\npermorder(x,FALSE)\n\nstopifnot(all(is.id(x^permorder(x))))\nstopifnot(is.id(x^permorder(x,FALSE)))\n# }\n\nDocumentation reproduced from package permutations, version 1.0-5, License: GPL-2\n\n### Community examples\n\nLooks like there are no examples yet." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6623225,"math_prob":0.97132045,"size":814,"snap":"2020-45-2020-50","text_gpt3_token_len":214,"char_repetition_ratio":0.14814815,"word_repetition_ratio":0.05172414,"special_character_ratio":0.23955774,"punctuation_ratio":0.11258278,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99566627,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-24T18:07:50Z\",\"WARC-Record-ID\":\"<urn:uuid:013406f2-ea85-4360-90ad-7dd9f878fc89>\",\"Content-Length\":\"14152\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:59183e44-c1cf-4a40-b6d0-0cf28818ea03>\",\"WARC-Concurrent-To\":\"<urn:uuid:3c9e16f1-406b-4725-9e7f-c2a333a1c3b2>\",\"WARC-IP-Address\":\"52.4.138.252\",\"WARC-Target-URI\":\"https://www.rdocumentation.org/packages/permutations/versions/1.0-5/topics/permorder\",\"WARC-Payload-Digest\":\"sha1:T5FIPK5PBLLH3SKWUM7SRQSFT42AQFEY\",\"WARC-Block-Digest\":\"sha1:QARZAF2EKGXV6MYD7L573WTERNFW72PY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141176922.14_warc_CC-MAIN-20201124170142-20201124200142-00209.warc.gz\"}"}
https://ta-netzsch.com/shelf-life-of-drugs-reduce-your-testing-time-by-using-thermal-analysis
[ "# Shelf life of drugs: Reduce Your Testing Time by Using Thermal Analysis\n\nHow to determine the shelf life of drugs without long time testing? First predictions about the shelf-life concerning thermal stability are achieved using thermogravimetric measurements with a kinetics Evaluation. This occurs within some hours or days.\n\nThe shelf life is the amount of time a product can be stored and still be considered as safe and effective for use. The shelf life of pharmaceuticals is affected, amongst others, by:\n• Humidity;\n• Light;\n• Gas atmosphere;\n• Temperature conditions.\nShelf life  determination usually requires time-consuming tests. How to determine the shelf life of drugs without long testing times? First predictions about the shelf-life concerning thermal stability are achieved using thermogravimetric measurements with kinetics evaluation. This takes some hours or days.\n\n## 5-year-forecast within some hours – What do you need for that?\n\n• A thermobalance, a device that stores the mass variations of the sample during its heating;\n• Kinetics Neo, a software that determines the kinetics of the decomposition reaction.\n\n## How to proceed?\n\n1. Carry out TGA measurements at different heating rates.\n2. Carry out the kinetics evaluation with Kinetics Neo;\n3. Use the kinetics model to predict the sample behavior for specified temperatures and times;\n4. Validate the kinetic model by comparing a measurement at a isothermal temperature with the curve calculated by Kinetics Neo.\nLet us do it together on potassium clavulanate. This pharmaceutical substance is generally used with the antibiotic amoxicillin to increase its effectiveness.\n\n#### 1. TG measurements at different heating rates\n\nFigure 1 displays the TGA  and DTG (first derivative) curves of the measurement on potassium clavulanate at 10 K/min and in a dynamic nitrogen atmosphere. The first mass-loss step, detected between room temperature and 120°C, results from the evaporation of surface water (click here for more information). Further, the three mass-loss steps identified between 120°C and 600°C are due to the decomposition of potassium clavulanate.", null, "Figure 1. TGA measurement on potassium clavulanate in pierced crucibles at 10 K/min in a dynamic nitrogen atmosphere, solid lines: TGA, dashed lines: DTG Figure 2 depicts the TGA and DTG (first derivative) curves of the measurements on potassium clavulanate at heating rates of 1, 3, 5 and 10 K/min. The mass-loss steps are shifted to higher temperatures with increasing heating rates (kinetic influence). For example, at a heating rate of 1 K/min, the first decomposition step occurs at 167°C (DTG peak), while at a heating rate of 10 K/min, it occurs at 184°C (DTG peak).", null, "Figure 2. TGA measurement on potassium clavulanate in pierced crucibles at different heating rates in a dynamic nitrogen atmosphere, solid lines: TGA, dashed lines: DTG\n\n#### 2. TG measurements and Kinetics Neo\n\nThe dependence of the decomposition on the heating rate allows for evaluation of the decomposition kinetics with the help of NETZSCH Kinetics Neo software. Kinetics Neo proposes a kinetic model with five consecutive steps of nth order (click here for more information).  It calculates the kinetics parameters of each step (activation energy, pre-exponential factor, …). The water release is not taken into account for the calculation. Figure 3 compares the measured TGA curves (dotted lines) with the calculated curves (solid lines) of the chosen 5-step model. The correlation between measured and calculated curves is very good!", null, "Figure 3. Kinetic evaluation of the decomposition of potassium clavulanate. Dotted lines: measured curves; solid lines: calculated curves based on a five-step reaction of nth order. The correlation coefficient between measured and calculated curves amounts to >0.999.\n\n#### 3. Kinetics Neo predicts the sample behavior during storage at specified temperatures\n\nKinetics Neo uses the calculation to predict how the sample would behave during long-time storage at different temperatures. Figure 4 displays the 5-year forecast of the decomposition process of potassium clavulanate. This plot was realized in some days, taking the measurements and evaluation with Kinetics Neo into account.", null, "Figure 4. Five-year forecast of the decomposition process of potassium clavulanate in a nitrogen atmosphere between 20°C and 80°C\n\n#### 4. The validation of the kinetics model ensures the accuracy of the calculation\n\nThe kinetic model calculated by Kinetics Neo should be validated for prediction of the decomposition behavior under isothermal conditions. For that,  a potassium clavulanate sample of 9.23 mg was heated to 200°C and then kept isothermal for two hours. Figure 5 compares the mass losses determined via measurement to those determined via prediction (Kinetics Neo). The comparison shows the good agreement between the two curves and thus the reliability of the calculation.", null, "Figure 5. Comparison of the measured and predicted mass change of potassium clavulanate during heating to 200°C and isothermal segment; the release of surface water is not monitored.\nSubscribe\nNotify of" ]
[ null, "https://ta-netzsch.com/wp-content/uploads/2018/11/K-Clavulanat-TG-10-Kmin.png", null, "https://ta-netzsch.com/wp-content/uploads/2018/11/Figure2_.png", null, "https://ta-netzsch.com/wp-content/uploads/2018/11/Figure5.png", null, "https://ta-netzsch.com/wp-content/uploads/2018/11/Figure7.png", null, "https://ta-netzsch.com/wp-content/uploads/2018/11/Figure8_.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89515823,"math_prob":0.9714176,"size":4137,"snap":"2021-43-2021-49","text_gpt3_token_len":826,"char_repetition_ratio":0.13815631,"word_repetition_ratio":0.073365234,"special_character_ratio":0.1895093,"punctuation_ratio":0.090655506,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9709595,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,4,null,4,null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-26T19:18:20Z\",\"WARC-Record-ID\":\"<urn:uuid:768d7e97-a760-4faf-9d02-a0d577dafa35>\",\"Content-Length\":\"113257\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cf50bebf-ed4e-402b-a525-4df607e7e774>\",\"WARC-Concurrent-To\":\"<urn:uuid:bcb2a75f-b9d5-4b0e-966d-e579d6de1189>\",\"WARC-IP-Address\":\"217.160.0.10\",\"WARC-Target-URI\":\"https://ta-netzsch.com/shelf-life-of-drugs-reduce-your-testing-time-by-using-thermal-analysis\",\"WARC-Payload-Digest\":\"sha1:P2DSKE3BGXXFTO2PP6XKDTLQDK7IRDFF\",\"WARC-Block-Digest\":\"sha1:WC46SMYSSPB5NWVHAG7IC3EMOD2PTCEA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323587915.41_warc_CC-MAIN-20211026165817-20211026195817-00580.warc.gz\"}"}
https://www.javatpoint.com/linear-function-in-discrete-mathematics
[ "# Linear Function in Discrete mathematics\n\nA linear function can be described as a function that shows a straight line on the coordinate plane. Suppose there is a function y = 3x - 2, which shows a straight line on a coordinate plane. Hence this function is also a linear function. Since, we can replace y with f(x). So we can use another way to write this function, i.e., f(x) = 3x+2. In this section, we will learn about the definition, graph, domain, and range of the linear function. After that, we will learn to identify a linear function and find its inverse.\n\n### Definition of Linear function\n\nA linear function can be described as a function, which must be in the form f(x) = mx+b. In this equation, m and b are used to indicate the real numbers. This equation looks the same as the slope-intercept equation from a line, which is y = mx+b. They look similar because a linear function is used to represent a line. That means the graph of this function is a line. Here\n\n'm' is used to indicate the slope of a line\n\n'b' is used to indicate the y intercept of a line\n\n'x' is used to indicate the independent variable.\n\nf(x) or 'y' is used to indicate the dependent variable.", null, "A linear function can be described as an algebraic function.\n\n### Example and Equation of Linear function\n\nThe parent linear function is indicated by f(x) = x, which is actually a line passing through the origin. In general, the equation of linear function is indicated as f(x) = mx + b. Some examples of linear function are described as follows:\n\nf(x) = 6x-5.\n\nf(x) = -7x - 0.7\n\nf(x) = 4\n\n### Real-life example of Linear function\n\nWe can also explain the linear function with the help of some real-life applications, which are described as follows:\n\n• Suppose there is a movie streaming company that charges a monthly fee approx 500rs, and for every movie downloaded, they also charge an additional fee of 30rs. In this case, the linear function will be used to represent the total monthly fee as f(x) = 30x + 500. Here x is used to show the number of movies that we have downloaded in a month.\n• Suppose there is a t-shirt company that prints designs and logos on t-shirts, and that company charges a one-time fee of 3800 and 500 per t-shirt. Now we can use the linear function to show the total fee as f(x) = 500x + 3800. Here x is used to indicate the number of t-shirts.\n• In linear programming problems, we can use the linear function because it represents an objective function. This function will help to maximize the profits and minimize the close.\n\n### Finding of Linear function\n\nWe can find the linear function with the help of either point-slope form or the slope-intercept form. The process of determining a linear function and determining the equation of a line is similar, and we will explain this with the help of following example.\n\nExample: In this example, we have to determine the linear function, which contains two functions (-1, 15) and (2, 27).\n\nSolution: From the question, we have two points, i.e., (x1, y1) = (-1, 15), and (x2, y2) = (2, 27).\n\nStep 1: In this step, we will use the slope formula to determine the slope of the function like this:\n\nM = (y2-y1) / (x2-x1) = (27-15) / (2-(-1)) = 12 /3 = 4.\n\nStep 2: In this step, we will use the point slope form so that we can find out the equation of linear function like this:\n\ny - y1= m(x - x1)\n\ny-15 = 4(x-(-1))\n\ny-15 = 4(x+1)\n\ny-15 = 4x+4\n\ny = 4x+19\n\nTherefore, the linear function equation is f(x) = 4x + 19.\n\n### Identifying a Linear function\n\nIf we get the information about a function in the form of a graph, and that graph is a line, then that function will be a linear function. If we get information about a function in the form of algebraic, which is in the form f(x) = mx+b, then that function will also be a linear function. If we want to check that the given data, which is represented in the table format, represents a linear function, then we can do this with the help of following steps:\n\n• We will calculate the differences in x values\n• Then, we will calculate the differences in y values\n• Lastly, we will see whether the ratio of differences in y values to the differences of x values always be a constant.\n\nExample: In this example, we have some data in the table, and we have to show whether this data represents a linear function.\n\nx y\n3 15\n5 23\n7 31\n11 47\n13 55\n\nSolution: To do this, we will calculate the differences in x values, y values, and ratio (difference in y) / (difference in x) every time, and from these calculations, we will see whether the ratio is a constant.", null, "### Graphing a Linear function\n\nAs we know that we can graph a line with the help of any two points on it. When we are able to find those two points, then we need to just join them in a line and then extend them on both sides. The following things are contained by the graph of a linear function f(x) = mx+b\n\nWhen m>0, in this case, the graph will be an increasing line.\n\nWhen m<0, in this case, the graph will be a decreasing line\n\nWhen m<0, in this case, the graph will be a decreasing line.", null, "• We can determine two points on it.\n• We can use the y-intercept and its slope.\n\nGraphing a Linear function by finding two points\n\nWe will use the function f(x) = mx+b so that we can determine the two points on it. To do this, we will take some random values for x and find the corresponding value of y with the help of substituting these values on the function f(x). Now we will explain the process of graph a function with the help of an example in which we will graph a function f(x) = 3x + 5 like this:\n\nStep 1: In this step, we will use some random values to determine the two points on the line. So we will take two points as x = -1, and x = 0.\n\nStep 2: Now, we will find the corresponding y values with the help of substituting the above values of x in the function.\n\nIn the following table, we can see the linear function y = 3x+5 like this:\n\nx y\n-1 3(-1)+5 = 2\n0 3(0)+5 = 5\n\nTherefore, (-1, 2) and (0, 5) are two points on the line.\n\nStep 3: Now, we will plot these points on the graph and use a line to join them. We will also extend the line on left side and right side like this:", null, "Graphing a Linear function using y-intercept and slope\n\nWith the help of the y-intercept 'b' and slope 'm' of a linear function f(x) = mx+b, we can graph any function. Now we will explain the process to do this by again using the same linear function f(x) = 3x+5. The (0, b) = (0, 5) is used to show the y-intercept of this function, and m = 3 is used to show its slope. The steps/process to do this is described as follows:\n\nStep 1: In this step, we will plot the y-intercept (0, b), which is equal to (0, 5). So we will plot the points (0, 5).\n\nStep 2: Now, we have to write the slope in the form of a fraction rise/run and then find out the \"rise\" and \"run\".\n\nHere slope = 3 = 3/1 = rise/run\n\nSo rise = 3, and run = 1.\n\nStep 3: In this step, we will get the new points by rising y-intercepts vertically with the help of \"rise\" and then run horizontally with the help of \"run\".\n\n#### Note: The graph will go up if the \"rise\" is positive, and the graph will go down if the \"rise\" is negative. Similarly, we will go right if the \"run\" is positive, and we will go left if the \"run\" is negative.\n\nIn this graph, we will go up by 3 units from y-intercept and thereby go right by 1 unit.\n\nStep 4: Now, we will use a line to join the points from step 1 to step 2, and extend those lines on both sides.", null, "### Domain and Range of a Linear function\n\nA set of all real numbers is contained by the range and domain of a linear function. In the below image, we can see f(x) = 2x+3 and g(x) = 4-x both functions are plotted on the same axes like this:", null, "Here R is used to show the domain of a linear function, and R is also used to show the range of a linear function.\n\n#### Note:\n\n1. If the problem does not contain any specific range or domain, only then the domain and range of a linear function will be R.\n2. The horizontal line will be shown by the linear function f(x) = b if the slope m = 0. In this case, the range of this function = {b} and the domain of this function = R.\n\n### Inverse of a Linear function\n\nThe function f-1(x) is used to indicate the inverse of a linear function f(x) = ax+b in such a way that f(f-1(x)) = f-1(f(x)) = x. Now we will use an example to show the process to identify the inverse of a linear function. In this example, we have a linear function f(x) = 3x+5, and we will find the inverse of this function.\n\nStep 1: In the first step, we will replace f(x) with y. By replacing, we will get the following equation:\n\ny = 3x+5\n\nStep 2: Now, we will interchange the variables x and y and get the following equation:\n\nx = 3y+5\n\nStep 3: Now we will solve the above equation for y like this:\n\nx-5 = 3y\n\ny = (x-5) /3\n\nStep 4: Now we will replace y by inverse function f-1(x), and get the following:\n\nf-1(x) = (x-5) /3\n\nNote that the function f(x) and the inverse function f-1(x) are always symmetric with respect to line y = x. Now we will plot the linear function f(x) and its inverse function f-1(x). Here f(x) = 3x+5 and f-1(x) = (x-5)/3. Here we will check whether these functions are symmetric about y = x, and we will also see when (x, y) lies on f(x), then (y, x) lies on f-1(x). To prove this, we will take an example in which we have (-1, 2), which lies on f(x), and (-2, 1), which lies on f-1(x). The graphical representation of all these things is described as follows:", null, "### Piecewise Linear function\n\nThere are some cases where the linear function is defined in a uniform way throughout its domain. This is because its domain can be split into two or more than two parts, so the linear function can be defined in two or more than two ways in some cases. This type of linear function is known as the piecewise linear function. The example of a piecewise linear function is described as follows:\n\nExample: In this example, we have a linear function, and we have to plot the graph of this function. The function f(x) is described as follows:", null, "Solution: The above described piecewise function is linear in both the above described parts of its domain. Now we will determine the endpoint of the line by taking both the cases.\n\nWhen the case is x ∈ [-2, 1):\n\nx y\n-2 -2+2 = 0\n1\nIn this case, the hole is 1 [2, 1]\n1+2 = 3\n\nWhen x ∈ [1, 2):\n\nx y\n1 2(1) - 3 = -1\n2 2(2) - 3 = 1\n\nThe corresponding graph is described as follows:", null, "Important notes\n\n• If a linear function must be in the form f(x) = mx+b, then the graph of this function will be a line.\n• When the slope of the linear function f(x) = mx+b is 0, the linear function will be a horizontal line, and this function will be known as the constant function.\n• In a linear function f(x) = ax+b, the domain and range will be R. Whereas for a constant function f(x) = b, the range will be {b}.\n• We can use these linear functions in linear programming to show the objective function.\n• There is no inverse in a constant function because this function is not one to one.\n• If the slopes of the two linear functions are equal, then both functions will be parallel.\n• If the product of slopes of two linear functions is -1, then both the functions will be perpendicular.\nThe linear function fails the test of a vertical line. That's why the vertical line is not a linear function.\n\n### Feedback", null, "", null, "", null, "" ]
[ null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics.png", null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics2.png", null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics3.png", null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics4.png", null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics5.png", null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics6.png", null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics7.png", null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics8.png", null, "https://static.javatpoint.com/tutorial/dms/images/linear-function-in-discrete-mathematics9.png", null, "https://www.javatpoint.com/images/facebook32.png", null, "https://www.javatpoint.com/images/twitter32.png", null, "https://www.javatpoint.com/images/pinterest32.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89296025,"math_prob":0.99826235,"size":8709,"snap":"2022-40-2023-06","text_gpt3_token_len":2291,"char_repetition_ratio":0.21091327,"word_repetition_ratio":0.07596439,"special_character_ratio":0.27098405,"punctuation_ratio":0.11088296,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99994993,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-04T14:38:09Z\",\"WARC-Record-ID\":\"<urn:uuid:699facf8-fd1f-4eb8-ab51-cef77f9eb120>\",\"Content-Length\":\"68220\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cff6f162-ed28-4144-93b4-406482e55f95>\",\"WARC-Concurrent-To\":\"<urn:uuid:1d46e540-e95d-4d96-96eb-41f7c785db11>\",\"WARC-IP-Address\":\"172.67.211.76\",\"WARC-Target-URI\":\"https://www.javatpoint.com/linear-function-in-discrete-mathematics\",\"WARC-Payload-Digest\":\"sha1:3KSCNZV4DCAILMMMHD7GGRQK4DTDOULL\",\"WARC-Block-Digest\":\"sha1:BWBDCHDEF5KSZJ46JBRUX6C5TC52WCGE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500140.36_warc_CC-MAIN-20230204142302-20230204172302-00790.warc.gz\"}"}
https://lapmos.com/details/operators-types-of-operators-in-python-programming
[ "## Description\n\nOperator is a symbol that tells the computer to perform the mathematical and logical operation in Python Programming.\n\n## Types of Operators:\n\nPython programming language has supports the following operators.\n\n• Arithmetic Operators\n• Comparison / Relational Operators\n• Logical Operators\n• Assignment Operators\n• Bitwise Operators\n• Membership Operators\n• Identity Operators\n\n## Arithmetic Operators in Python Programming\n\nLet's Assume that variable 'a' holds 5 and variable 'b' holds 2, then\n\nOperator Description Example\nAddition (+) Adds values on either side of the operator. a + b = 7\nSubtraction (-) Subtracts right hand operand from left hand operand. a - b = 3\nMutliplication (*) Multiplies values on either side of the operator.\n\na * b = 10\n\nDivision (/) Divides one operator to another operator. a / b = 2.5\nModulus (%) remainder of a divided by b. a % b = 1\nExponent (**) Performs expontial (power) calculation on operators. a**b = 25\n// Floor Division - operands where the result is the quotient in which the digits after the decimal point are removed. a//b = 2\n\n## Relation Operators in Python Programming\n\nThe Relational Operator are used to compare the values between variables. Relational Operators tabel below...\n\nOperator Description Example\n== If the both values are equal, then condition is true. (a==b) is not true\n!= If the both values are not equal, then condition becomes true. (a!=b) is true.\n> Greater Than ( if the left operand is greater than the right operand, then condition becomes true.) (a > b) is true.\n< Less Than ( if the left operand is less than the right operand, then condition becomes true.) (a<b) is true.\n<= Less than or Equal to (a <= b ) is not true.\n>= Greater than or Equal to (a >= b) is true.\n\n## Assignment Operators in Python Programming.\n\nThe assignment operator is represented by the equal sign(=). The variable appearing on the left side of = sign and it is assignment the value appearing on the right side of this sign.\n\nOperator Expression Example\n= a = a + b a = 7\n+= a += b a = a + b = 7\n-= a -= b a = a - b = 3\n/= a /= b a = a / b = 2.5\n%=  a %= b a = a % b = 1\n*= a *= b  a = a * b = 10\n**= a **=b  a = a**b = 25\n//= a //= b a = a//b = 2\n\n## Logical Operator in Python Programming.\n\nThe Logical Operator is used for when we want to check the condition and for making the decisons in Programs.\n\nOperators Description Example\nand Logical AND If the both operands are true then condition becomes true. (a and b) is true.\nor Logical OR If any of the two operands are non-zero then condition becomes true. (a or b) is true.\nnot Logical NOT Used to reverse the logical state of its operand. not(a and b) is false\n\n## Bitwise Operator in Python Programming.\n\nThe Bitwise Operator is special operators which are used for manipulation of the data at bit level. These operator are used for testing the bits, or shifting them right or left. Bitwise operators many not be applied to float or double.\n\nOperator Meaning\n& bitwise AND\n| bitwise OR\n^ bitwise exclusive OR\n<< shift left\n>> shift right\n\n## Python Membership Operators.\n\nPython's membership operators test for membership in a sequence, such as strings, lists, or tuples. The are two mebership operators...\n\nOperator Description Example\nin Evalutes to true if it finds a variable in the specified sequence and false otherwise. a in b, here in results in a 1 if x is a member of sequence y.\nnot in Evaluates to true if it does not finds a variable in the specified sequence and false otherwise. a not in y, here not in results in 1 if a is not a member of sequence b.\n\n## Python Identity Operators.\n\nOperator Description Example\nis Evaluates to true if the variables on either side of the operator point to the same object and false otherwise. a is b, here is results false.\nis not Evaluates to false if the variables on either side of the operator point to the same object and true otherwise. a is not b, here is not results is true.\n\n## All About of String in Python Programming language\n\nIn Python It is called a string which is inside single or double quotation marks. We can write multiline string inside three single or double quotation mark.\n\n## List and Tuple in Python Programming\n\nList is a kind of data structure in Python which is mutable, changeable, ordered sequence. Tuples are used to store multiple items in a single variable.\n\n## Dictionary In Python | Method Of Dictionary\n\nDictionary is used to store data values in Key: Value pairs. A dictionary is a collection which is ordered, Changeable and do not allow duplicates.\n\n## Implement of All Method of String in Python Programming language\n\nImplementation of all methods of string in python. How to implement of method on string.\n\n## Operators based Exercise 1 in Python Programming language.\n\nAll operators used for better understanding the python operators.\n\n## Sets in Python | Perform Set methods\n\nA Set is an unordered collection data type which does not contain duplicates elements. A set is iterable and mutable data type." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8273025,"math_prob":0.9709173,"size":5069,"snap":"2022-40-2023-06","text_gpt3_token_len":1280,"char_repetition_ratio":0.15478776,"word_repetition_ratio":0.079822615,"special_character_ratio":0.25567174,"punctuation_ratio":0.09170306,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99605817,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-26T17:00:16Z\",\"WARC-Record-ID\":\"<urn:uuid:c73dfb3e-1a19-40c0-8cea-a7e82c54ff05>\",\"Content-Length\":\"55279\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:47d2ef35-abf8-4842-af5c-aa1e0bc5382a>\",\"WARC-Concurrent-To\":\"<urn:uuid:4afe9128-b28e-4292-8191-c50007a2dc4e>\",\"WARC-IP-Address\":\"217.21.87.171\",\"WARC-Target-URI\":\"https://lapmos.com/details/operators-types-of-operators-in-python-programming\",\"WARC-Payload-Digest\":\"sha1:XK3UAZNUXDRRYBXFOKFKMVWCUK5AAFKN\",\"WARC-Block-Digest\":\"sha1:HQT5K5CZLYTA4O5Y5WECFXWOAQ5FLIBC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334912.28_warc_CC-MAIN-20220926144455-20220926174455-00465.warc.gz\"}"}
https://mathoverflow.net/questions/132538/when-is-the-support-of-a-radon-measure-separable
[ "When is the support of a Radon measure separable?\n\nLet $X$ be a topological space, equipped with its Borel $\\sigma$-algebra $\\mathcal B(X)$, and let $\\mathbb P$ be a Radon probability measure on $(X, \\mathcal B(X))$. Recall that the support of the measure $\\mathbb P$ is the smallest closed set of full measure.\n\nIs the support necessarily separable? If so, why? If not, what is a counterexample?\n\n• What about Haar measure on a compact, non-separable group? (By the way, don't you mean \"smallest closed set with full measure\"?). – jbc Jun 1 '13 at 23:02\n• Good, concise answer, and thanks for the pointer on the typo. Thanks, @jbc. – Tom LaGatta Jun 3 '13 at 3:08\n\nLet $I$ be a set of cardinality larger than the continuum. Then the product topology $[0,1]^{I}$ is compact but not separable. Give the interval $[0,1]$ the Lebesgue measure, then give $[0,1]^{I}$ the product measure $\\mu$. If $U$ is a non-empty open subset of $[0,1]^{I}$, then $U$ contains a basic open set $\\prod_{i\\in I}U_{i}$ where $|\\{i\\in I|U_{i}\\neq[0,1]\\}|$ is finite. Therefore $0<\\mu(\\prod_{i\\in I}U_{i})\\leq \\mu(U)$. Said differently, if $C$ is a closed subset of $[0,1]^{I}$ with $\\mu(C)=1$, then $C=[0,1]^{I}$.\nIf you replace $[0,1]$ with the circle $S$, then $S^{I}$ is a compact non-separable group which does not have separable support as jbc mentioned.\n• A priori, $\\mu$ is only defined on the product $\\sigma$-algebra on $[0,1]^I$, which is strictly smaller than the Borel $\\sigma$-algebra. How do we extend $\\mu$ to a Borel measure? And once this is done, how do we see that the measure is Radon? – Nate Eldredge Jun 2 '13 at 12:37\n• The reason I suggested using a group was to avoid such questions, since in this situation you can use the existence theorem for Haar measure (which, by the way, has a very short and transparent proof in the case of a compact group, using the weak star compactness of the dual ball of $C(K)$). A particularly simple solution to the OP is then provided by a large cardinal product of the two-point group. – jbc Jun 2 '13 at 13:50\n• The product $\\sigma$-algebra on $[0,1]^{I}$ contains every Baire set, so since $[0,1]^{I}$ is compact we can extend this Baire measure to a Radon measure on the Borel $\\sigma$-algebra in a unique way. – Joseph Van Name Jun 2 '13 at 17:13" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86494166,"math_prob":0.9995465,"size":344,"snap":"2019-43-2019-47","text_gpt3_token_len":95,"char_repetition_ratio":0.13235295,"word_repetition_ratio":0.0,"special_character_ratio":0.2616279,"punctuation_ratio":0.14285715,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99985695,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-18T07:56:33Z\",\"WARC-Record-ID\":\"<urn:uuid:2c3b4bc0-11ab-4246-a771-f37f78d91fa8>\",\"Content-Length\":\"123130\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3915d6fa-14d5-465c-9341-245ef3bca687>\",\"WARC-Concurrent-To\":\"<urn:uuid:59002717-627b-4460-beb7-b0e18e96a0cc>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://mathoverflow.net/questions/132538/when-is-the-support-of-a-radon-measure-separable\",\"WARC-Payload-Digest\":\"sha1:CY35WDYCRKEIQSSK6TQEKWNVTWDF3SWT\",\"WARC-Block-Digest\":\"sha1:VIW5BCJ3GCDCERWEWOULZOE4T6LZBA4H\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986677964.40_warc_CC-MAIN-20191018055014-20191018082514-00518.warc.gz\"}"}
http://www.basicsofelectricalengineering.com/2017/08/current-divider-example-3-finding-value.html
[ "# Basics of Electrical Engineering\n\nLearn the basics of Electrical Engineering.\n\nA current source of 100 mA powers two parallel resistors, the first resistor is of 30 Ω and it receives 60 mA current, Find the value of the second resistor.\nSolution: R_1 dissipates the 60 mA, the remaining 40 mA current will pass through R_2.\n\nFrom the Ohm's law, the voltage across 30-ohm resistor is 1.8 V.\n\nR_1 and R_2 join in parallel and both have the same voltage across them.\n\nV_R_2 = 1.8 V,\n\nUsing the Ohm's law R2 = V_R2/I_R2 = 1.8 V / 40 mA\n\nR2 = 45 ohm\n\nSo 45 ohm is the right answer." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86981654,"math_prob":0.9882351,"size":562,"snap":"2019-51-2020-05","text_gpt3_token_len":184,"char_repetition_ratio":0.13978495,"word_repetition_ratio":0.12612613,"special_character_ratio":0.33274022,"punctuation_ratio":0.12307692,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9991654,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-27T00:02:18Z\",\"WARC-Record-ID\":\"<urn:uuid:adfbe698-a47e-45e8-917a-affdf6480e52>\",\"Content-Length\":\"117416\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a22c6cdd-a6c8-4016-a1f7-fe22b472b1a3>\",\"WARC-Concurrent-To\":\"<urn:uuid:301b38dd-e1ca-4de6-98d8-c57b5cfb0991>\",\"WARC-IP-Address\":\"172.217.7.243\",\"WARC-Target-URI\":\"http://www.basicsofelectricalengineering.com/2017/08/current-divider-example-3-finding-value.html\",\"WARC-Payload-Digest\":\"sha1:WZEFBUL5VWEA2XA7UPJ2XTIJDVYNSP3P\",\"WARC-Block-Digest\":\"sha1:QFGINN4HWXQ4OSZSZDE6GOVLZJR4FOTM\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251694071.63_warc_CC-MAIN-20200126230255-20200127020255-00530.warc.gz\"}"}
http://intusoft.com/nlhtm/nl72.htm
[ "", null, "Newsletter List", null, "Newsletter Issue #72, Dec 2003\n\n# SPICE Numerical Methods, Part 1 Convergence Methods\n\nIt’s been some time since we devoted a newsletter to modeling and convergence issues. Over the years, we have learned more about how to make good models and have also added and improved IsSpice options. The information shown here follows closely the seminar presentation at the Power Systems World on November 3, 2003.\n\nUnderstanding what’s under the hood in your software tools has been dismissed in the quest for simple user paradigms. But your software is performing mathematical tasks that, as an engineer, you’ve been trained to understand. You’ll get the most out of our IsSpice simulation engine by combining your knowledge and experience with an understanding of how the simulator works - especially if you want to make models for other engineers to use.\n\n In This Issue 1 6 Unique Solution Sidebar 6 9 Spice Options for Transient Simulation Control 12 Transient Initialization 14 Making Models Behavioral Models\n\nSPICE is basically an equation solver. The equations are set up according to Kirchhoff’s Current Law, KCL. The KCL matrix is modified to include the current through voltage sources and state variables used in the XSPICE model extensions. For linear time invariant circuits, the equation matrix has a unique solution (See the Unique Solution Sidebar). Non-linear circuits and operations involving integration require inserting a Norton equivalent circuit with the large signal current summed into the matrix’s right hand side, RHS, and the small signal conductance summed into the matrix.\n\nThis summation process is referred to as the matrix stamp of a SPICE model. Interestingly, each model sums its contributions without the knowledge of what the other models are doing. Figure 1 illustrates the matrix stamp for a diode. When the diode anode is node K and its cathode is node L, then the K row and column and the L row and column have the small signal conductance summed into their matrix positions as shown. The large signal current is summed with appropriate signs into the RHS.", null, "Figure 1. Diode linearized circuit and its matrix stamp.\n\nSPICE must iterate this solution to solve non-linear circuit equations. The simulator doesn’t know if the circuit is linear so that it will iterate linear circuit equations as well. Certain linear circuit equations may fail to converge if the RHS vector is not a constant. Remember, the basic KCL rule is that the sum of the currents at a node is constant. If it’s a variable, then there is no guarantee of convergence.\n\nBy way of example, consider the circuit and its modified nodal admittance, MNA, matrix shown in Figure 2. This circuit model is used to describe a transformer. Current is transformed from the left or input side to the right or output side. Voltage is transformed in the opposite direction. These equations force the output power to equal the input power. The model is useful for any power conserving operation. In the third equation, the current at B4 is .5 * IR1. It must remain on the RHS because IR1 is not a matrix variable. For the circuit configuration shown, v2 grows for each iteration as shown below:\n\n Iteration v2 IR1 1 0 10k 2 250k -2.499e+007 3 -6.2475e+008 6.2475e+010\n\nClearly, the solution is not converging; v2 is alternating sign and its magnitude is growing rapidly to infinity. If the input and output of the model were reversed, then the solution would have converged.", null, "Figure 2. An equation matrix example incorrectly using the current through a resistor.\n\nNow consider the circuit shown in Figure 3. The input current is sensed through a voltage source instead of a resistor. The current through the voltage source is a matrix variable. The SPICE3 arbitrary source or B-element saves the variables and their derivatives and uses that information to move any RHS components using those variables back over to the matrix during the load operation as shown in the figure. With this seemingly minor change in the model, the circuit has been made to converge without the need for any iterations. The lesson learned here is to make B-element equations that only use matrix variables. That isn’t to say that you can’t write equations with variable RHS values; however, it’s unwise to rely on the solution iterations to converge.", null, "Figure 3. A properly formed model allows the B-element to move the current from the RHS into the matrix.\n\nIn order to handle non-linear algebraic equations, SPICE simulators perform what is known as Newton-Raphson iteration. The linearized matrix; for example, one using a diode as shown in Figure 1, is solved and a new operating point and its small signal equivalent admittance is found. The process is repeated until a stable solution is found. Figure 4 shows a test circuit using a diode and Figure 5 shows how the equation is iterated to form a stable solution. It seems pretty reasonable to model a diode voltage as a function of current – that’s what designers usually do to estimate an operating point because a Silicon diodes forward drop ranges from .6 to .7 volts for very large range of current.", null, "Figure 4. A diode test circuit, the operating point converges in 5 iterations.", null, "Figure 5. Newton-Raphson iterations converge rapidly to solve for the operating point\n\nHowever, early on, the problem of finding a stable solution for this circuit used the equations formulated with current as a function of voltage as shown in Figure 6. You can see from inspection that the initial trial would place nearly 5 volts across the diode resulting in 8.348e+069 amps. The next iteration would produce nearly the same result and it would take forever to walk the solution back to the correct answer. The funny thing is that SPICE3 quickly sees the convergence failure and tries some interesting tricks to make even this ill conditioned equation work.", null, "Figure 6. Using a B-element with current as a function of voltage requires 194 iterations to converge\n\nWhen the DC iteration limit, ITL1, is exceeded (it defaults to 100 iterations). Then the simulator tries a neat trick called Gmin Stepping and finally it tries Source Stepping. Before attempting a matrix solution, SPICE preorders the matrix by reordering its rows and columns to get large values along the matrix diagonal. If the only values in the matrix were on the diagonal, the solution can be written by inspection and is trivial. By the same argument, if the values on the matrix diagonal are very much larger than the off-diagonal values, then a solution should be readily achieved. That’s the idea behind Gmin Stepping. Gmin is a SPICE option representing the smallest possible conductance. SPICE3 begins by setting the number of steps to 10, then computes the diagonal offset as Gmin*10^numSteps. For the default Gmin=1e-12, the initial offset if .01. That corresponds to a 100 ohm resistor to ground on the diagonal nodes. If convergence fails on the first step, then the simulator signals Gmin Step failed (you might want to increase the numGminSteps or increase Gmin). Intusoft has made several modifications to these algorithms to improve their performance. You can see that a 100 ohm resistor across the diode initializes much closer to the correct solution for our example. The offset is gradually removed and if on its final removal, the circuit converges, the job is done. If not SPICE3 tries source stepping. All voltage and current sources are set to zero and stepped up to their final values using the number of steps specified using ITL6. If you set ITL1=50 for this case, then Gmin Stepping fails and the simulator will go on to use source stepping. Source stepping will walk the solution up the I-V curve from V=0 and will also converge. As you see, IsSpice works pretty hard to make even poorly constructed models converge. When you build your own models, you need to keep the accounts option turned on (.OPTIONS acct) and keep an eye on the operating point iterations. Most modern SPICE simulators employ variations of the described operating point convergence methods; however, the different vendors have fine tuned the algorithms and hold these methods as trade secrets.\n\nBefore continuing to discuss IsSpice options, it’s worth comparing the performance of the built-in diode with its behavioral counterpart shown in Figure 7. Running this simulation and checking the number of iterations, we find the solution converges in 9 iterations. That’s about twice as many iterations needed by the built in SPICE diode. The SPICE diode model is more complete (it include the temperature effects of IO, noise, …). Even so, the added complexity comes with built-in convergence aids that are hard to beat with behavioral models. We’ll visit this topic in more detail later on.", null, "Figure 7. Diode modeled using a B-element voltage source converges in 9 iterations.\n\nTOP\n\n Unique Solution Sidebar\n\nAn interesting property of the linear matrix solution arises for the AC analysis. It turns out that the solution does not diverge if the circuit is unstable in the time domain. The feedback equation\n\nG = A/(1+A*H) has the same answer as A—> infinity or A—> -infinity! - A result that allows you to analyze unstable circuits for gain and phase margins. Moreover, you can insert high gain amplifiers nearly anywhere in a circuit to force the “amplifier” input node voltage or branch current to null. You can use that technique, called null injection, to isolate a section of circuitry while a control loop is closed. Using various combinations of null injection, you can solve for A, AH, H and G in the feedback equation. This technique has been expanded to become the General Feedback Theorem, by Dr. R.D. Middlebrook .\n\n R.D.Middlebrook, “The GFT: A General Yet Practical Feedback Theorem,” to be published.\n\n Spice Options for Operating Point Control\n\nThe following are the key options that will aid in making your DC operating point converge.\n\n1. GMIN: Sets the minimum conductance (default is 1e-12), see previous discussion with respect to its use in Gmin Stepping. It is also used within various models to eliminated divide by zero errors. Typically, divisions have Gmin added to the numerator and the denominator as follows: A/B —> (A+Gmin)/(B+Gmin). This approach yields an answer for B=0 and both A and B zero. The odds of B = -Gmin are greater than 1 in 2^48 = 2.8e+014 because the 64 bit floating-point mantissa is 48 bits long. On the other hand, the odds of having a zero value is extremely high because many variables are initialized to zero. For your B-element equations, you can use Gmin as a parameter or go ahead and hard wire a reasonable value, for example 1u, into your divisions.\n\n2. RELTOL (default=.001), ABSTOL(default=1e-12), VNTOL(default=1e-6) are used after each Newton-Raphson iteration to decide on whether or not each node voltage or branch current is converged. If val is the value just iterated and prev is the previous value, the following logic is applied:\n\na. Voltage: tol = abs(val)*RELTOL+VNTOL\nb. Current: tol = abs(val)*RELTOL+ABSTOL\nc. If abs(prev-val) > tol return(NONCONV)\n\nThese equations appear to be reasonable for a circuit that’s working normally; however, SPICE can reach some very extreme values. As abs(val)—> infinity, the tolerance gets very large and absurd values may appear to converge. You may encounter this condition when attempting to float a section of circuitry. The floating circuit node voltages become independent of SPICE ground. The DC offset can get so large that a matrix solution becomes impossible. The solution is to not float circuitry. You may wish to use a parameterized resistor between the 2 circuit grounds to see the effect on the floating voltage vs. resistor value. Many models operate in the 1 to 10 volt range making VNTOL in the range of 10u to 100u a reasonable choice. Similarly branch currents in the 1 to 10ma range would suggest ABSTOL in the range of 1 to 10n. RELTOL is frequently set to .01. The ABSTOL and VNTOL setting apply to every node voltage and branch current so that you should scale models in a similar range. If you need to maintain accuracy for very small numbers; for example, when time delay is a variable, then you should scale your model to compute the time delay in microseconds or milliseconds as the case may be. Alternatively you can use normalizing B-elements to multiply the voltage or current such that the result is in the proper range. These tolerances are also applied when calculating the local truncation error, LTE, for time step control.\n\n3. RSHUNT(default not used): The RSHUNT value is connected from every node to ground. This is useful in tracking down singular matrix problems that occur when ideal capacitors are connected in series. Without resistors, there is no unique solution for series capacitors. RSHUNT can also be used to converge problem circuits in order to explore problem areas. Making RSHUNT small enough should make almost anything converge, the example in Figure 2 can be made to converge by setting RSHUNT to 1m. RSHUNT should be considered a debugging tool because its use could introduce errors in other models that use high impedance circuitry such as integrators or charge amplifiers.\n\n4. ITL1(default=100): The DC iteration limit. For complex circuits you may need to increase ITL1 up to 1000. Beyond that, you are likely to experience chaotic behavior and converge by chance. Reducing ITL1 can move more quickly to source stepping.\n\n5. ITL6(default = 10): The number or steps used in source stepping. You may need to set this as high as 1000 for complex circuits. You might want to use .NODESET described later to get convergence to occur during the initial Newton-Raphson operating point iteration.\n\n6. AUTOTOL(default not used): This is another debugging tool. It causes a table of VNTOL and ABSTOL values to be setup for each node voltage and branch current. Whenever a non-convergent situation arises, the table value is multiplied by abs(AUTOTOL). That process will rapidly eliminate the troublesome nodes. If AUTOTOL is negative, the activity is reported in the “.out” file. Examining the report may help isolate convergence problems.\n\n7. .NODESET: This is not part of the .options commands; however, its use is important in steering the initial operating point solution to one of several stable solutions. Figure 8 illustrates how this works for a bi-stable circuit. In our previous newsletter, NL71-pg13, we showed how to add an additional non-linearity to eliminate the low voltage operating point. If the .NODESET works, it provides a simpler, more elegant solution.", null, "Figure 8. use .NODESET=100 for the operating point shown and .NODESET=0 for the low voltage operating point\n\n Spice Options for Transient Simulation Control\n\n1. METHOD: Selects Gear or Trapezoidal integration. Gear works best for power electronics or other circuits that use inductors; especially when the inductor current is switched rapidly. SPICE diodes with reverse recovery will snap off and cause numerical artifacts if Trapezoidal integration is used as shown by Figure 9.\n\n2. MAXORD(default=2): Selects the integration order for Gear", null, "", null, "Figure 9. PWM Voltage, Vsw, converges rapidly using Gear integration\n\n3. TRTOL(default=7): Transient error tolerance. The factor by which SPICE overestimates local truncation error, LTE. LTE is the estimate of integration error. Each component that uses the SPICE implicit integration method computes the time step required to achieve the desired accuracy. The smallest time step from these calculations is used for the next time step. If the required time step is less than the current time step or if the Newton-Raphson solution doesn’t converge or if the VSECTOL condition isn’t met, the time step is scaled back. Increasing TRTOL will increase the time step. This parameter was empirically selected to give the best performance over a wide range of circuits. It shouldn’t be changed. TRTOL is also used to make the VSECTOL options have hysteresis.\n\n4. ITL4(default=10): Sets the lower transient iteration limit. This may need to be increased up to 100 for complex circuits. If this must be set higher to achieve convergence, then you may be experiencing chaotic behavior and small changes in initial conditions could cause non-convergence.\n\n5. CHGTOL(default = 1e-14): Sets the maximum charge error, only used in the LTE calculation.\n\n6. VSECTOL(default off): If VSECTOL is turned on, the value represents the maximum volt-second error for any node voltage. Node voltages for the next time step are predicted based on their history. The next time step begins with the predicted values. If the product of the time step and the absolute value of the difference between the iterated value and the predicted value is greater than VSECTOL, then the time step is scaled back. TRTOL is used to provide hysteresis in that decision. The time step won’t be increased until the VSECTOL computed time step is TRTOL times greater than the current time step. This option is necessary to get fast rise times from behavioral switching as illustrated by Figure 10 and 11. For the case shown, 278 time points were required to achieve the 10nsec resolution. Without VSECTOL, the maximum time step would have to be reduced to 10nsec, requiring 5e6 time points, which lengthen the simulation by a factor of 17986! The circuit shown in Figure 10 is a hysteresis switch that can be used to model under voltage lockout, UVLO. The VSECTOL option will cause the IsSpice4 simulator to backtrack; that is, reverse time and back up to just before the switching event occurs as shown in Figure 11. An R-C network is needed because the hysteresis is time-directionally sensitive; without the R-C network, the switch point can be incorrect.", null, "", null, "Figure 10. A Behavioral hysteresis comparator shown switching with default SPICE options has a rise time equal to the SPICE time step when passing the switching threshold", null, "Figure 11. The same simulation as Figure 10, except VSECTOL=50n made the vref signal switch from 0 to 5 volts in less than 10nsec.\n\n7. BYPASS(default = ON): Bypasses computation of model parameters when the input voltage and currents haven’t changed very much. This speeds the simulation but can’t be used when relying on VSECTOL because large voltage and current changes may take place when rejecting time points and scaling back the time step. Turn BYPASS off when using VSECTOL.\n\n8. RAMPTIME(default off): When set, voltage and current sources will be ramped from 0 to their specified value in RAMPTIME seconds. B-elements aren’t ramped so you can make some node voltages and branch currents non-zero. You can ramp B-elements by multiplying their output with a constant V element. This can help things like oscillators and hysteresis circuits initialize; however, the overall simulation time may be lengthened while you wait to get to steady-state. Using .NODESET is a better choice.\n\n8. NOOPITER(default off): Skips the op calculation and goes directly to GMIN stepping\n\n9. MINSTEP(default off): removes saved data points closer together than MINSTEP. This options reduces memory requirements for lengthy simulations; however, aliasing of data can occur.\n\n10. MINBREAK(default=off): Breakpoints will not be set to less than this value. Breakpoints are used by various models; for example, V and I sources will set a breakpoint at the end of RAMPTIME and transmission lines will set breakpoints when a change in the propagated signal reaches the terminals. This option is most frequently used to reduce transmission line computational overhead.\n\n11. TMAX(default off): the fourth term in the .TRAN statement can be optionally set to override the SPICE automatic time step algorithm. Frequently used in SPICE2 and SPICE3 simulators for switching power supplies. It can cause substantial increase in simulation time and memory. See use of VSECTOL to eliminate the use of this option.\n\nTOP\n\n Transient Initialization\n\nOrdinarily, the initial operating point for a transient simulation uses the DC operating point calculation. There are circuits for which this technique doesn’t work. SPICE2 and SPICE3 can direct the simulator to use initial conditions by using the UIC keyword in the .TRAN statement. When invoked, the circuit is initialized using the IC= keyword in various models and .IC v(node)=value statement. UIC works for circuits that don’t employ subcircuit models. When a subcircuit is used, the internal IC’s are used and may not correspond to the initial conditions of your external circuit. For example a positive op-amp output voltage may cause current to flow in an inductor. If you initialize the inductor current, then you must also figure out how to initialize the op-amp properly or else you might have the inductor current flowing into an open circuit. Needless to say, this is a very difficult task because you don’t know much about the internals of vendor-supplied models. Moreover, many state variables are private to models, for example diode charge, so that you can’t initialize everything. Here’s a SPICE3 script that you can use to extract the initial conditions after a transient simulation has run to steady state:\n\n * script to extract the final value from a transient simulation * remove everything except the node voltages set colwidth=1 nv = nextvector(null) while nv <> null len = length(nv) - 1 if len > 1 printtext -n \".IC \" printname nv printtext -n \"=\" printval nv[len] printtext end nv = nextvector(nv) end\n\nJust paste it into the IsSpice script window and press the DoScript button. You must remove all of the instance current and power values since they can’t be initialized using UIC. Then paste the remaining into the User Statements window of the Simulation Setup dialog. For currents, you need to find the parts and fill in the IC=value.\n\nThe most successful method for initializing complex circuits is to use switches that apply initial conditions at time = 0, and then remove the IC’s when time > 0. Like the old analog computers used to do. Figure 12 shows how it works for a simple R-L-C circuit. The IC’s were purposely set a little off to get something to look at. If you use the above script to find the IC’s, the peak error is under 7 micro-volts.", null, "Figure 12. Transient initialization without UIC.\n\nThe advantage of this technique is that SPICE will figure out the initial conditions for control circuits, so you only have to worry about the main reactive components.\n\n Making Models Behavioral Models\n\nBehavioral modeling is the single most important element added to SPICE3. These B-elements allow you to introduce both linear and nonlinear models using algebraic equations. Before SPICE3 solves these equations, it removes the variable from the RHS and places them in the matrix according to the derivatives of the expression. As long as you use matrix variables (Node voltage and Voltage source branch currents) the order in which the equations are solved doesn’t matter. With SPICE3, you can pour milk into your glass BEFORE getting the glass out of the cabinet! Intusoft has added capabilities to the original SPICE3 B-elements\n\nIntusoft B-element extensions\n\nIf-Then-Else\n\nv=v(in) < 10 ? v(in) : 0; c/c++ style\nv=MIN(v(in),10); Fortran/PSpice style\n\nBoolean\n\nv=(v(in) & v(uvlo)) | v(fault)\nwhere & | ! ^ are AND, OR, NOT and XOR respectively\nLONE=5, LZERO=0, LTHRESH=2.5 are default options.\n\nSimulation Variables that can be used in expressions\n\nTIME; simulation time in transient analysis, 0 in AC or DC\nFREQ; simulation frequency in AC analysis, 0 in op or TRAN\nTEMP; circuit temperature\n\nNew elements that support expressions\n\nR=<expression>\nC=<expression>\nL=<expression>\nExample:\nR=TIME < 10u ? {OPEN} : {SHORT}\n\nStandard B-element Operations\n\nMath\n\n+ - * / ^ %\n\nTrigonometric\n\nsin, asin, sinh, asinh cos, acos, cosh, acosh tan, atan,tanh, atanh\n\nTransindental\n\nexp, expl, log, lnpwr, pwrs, min, max, sgn, stp, abs, ceil, floor, int, frac, mod2, sync, mag, phs, real, imag, rand, randc\n\nBehavioral Models – Limitations\n\nThere are some less than obvious limitations in using B-element expressions. We’ll explore these by example in the next newsletter.\n\nWe want to thank everyone who visited our booth at this year’s Power Systems World Conference. You made it an incredibly successful show for us, notably with the interest in our 8.x.10 Build 2093 ICAP/4 simulation software announced at the show, plus our collaboration with ON Semiconductor for power supply design. We look forward to some exciting product announcements for next year.\n\nOur special half-day hands-on workshop on “Simulating and Modeling for Power Electronic Design” was a great success. All workshop attendees received a Microsoft Optical Mouse, and \"Switch-Mode Power Supply SPICE Cookbook\" authored by Christophe P. Basso. Again, thanks and we look forward to seeing you in 2004.\n\n Power Systems World Convention DRAWING WINNERS! ICAP/4Rx Power Deluxe Sofware Winner Peter Czyl - Consultant, Long Beach CA Switch-Mode Power Supply SPICE Cookbook Winners Iradj Vokhshoori - Pyramis Corp., Torrance CA Yuga Tummala - Stryker Medical, Kalamazoo MI" ]
[ null, "http://intusoft.com/nlpics/logoredsm3.gif", null, "http://intusoft.com/nlpics/nlhead.gif", null, "http://intusoft.com/nlpics/72/figure1.gif", null, "http://intusoft.com/nlpics/72/figure2.gif", null, "http://intusoft.com/nlpics/72/figure3.gif", null, "http://intusoft.com/nlpics/72/figure4.gif", null, "http://intusoft.com/nlpics/72/figure5.gif", null, "http://intusoft.com/nlpics/72/figure6.gif", null, "http://intusoft.com/nlpics/72/figure7.gif", null, "http://intusoft.com/nlpics/72/figure8.gif", null, "http://intusoft.com/nlpics/72/figure9a.gif", null, "http://intusoft.com/nlpics/72/figure9b.gif", null, "http://intusoft.com/nlpics/72/figure10a.gif", null, "http://intusoft.com/nlpics/72/figure10b.gif", null, "http://intusoft.com/nlpics/72/figure11.gif", null, "http://intusoft.com/nlpics/72/figure12.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8936306,"math_prob":0.96566886,"size":23304,"snap":"2020-10-2020-16","text_gpt3_token_len":5027,"char_repetition_ratio":0.13995709,"word_repetition_ratio":0.0041841003,"special_character_ratio":0.20112427,"punctuation_ratio":0.09908046,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98240775,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32],"im_url_duplicate_count":[null,null,null,null,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-16T21:29:18Z\",\"WARC-Record-ID\":\"<urn:uuid:7e57e5ea-f7c7-43ef-b380-8396dbf98ccf>\",\"Content-Length\":\"50172\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b1928f2c-ac21-49c7-936a-623aeb1f0c00>\",\"WARC-Concurrent-To\":\"<urn:uuid:e192dbb8-ce7f-424c-a045-c636c99d4506>\",\"WARC-IP-Address\":\"192.237.165.239\",\"WARC-Target-URI\":\"http://intusoft.com/nlhtm/nl72.htm\",\"WARC-Payload-Digest\":\"sha1:GOFQPIOMWCP7I7Z5TQAEGF2RMDVZWNCW\",\"WARC-Block-Digest\":\"sha1:G544ARUMJT4CU3DK7KLWSCIWSSZMFIGL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875141430.58_warc_CC-MAIN-20200216211424-20200217001424-00019.warc.gz\"}"}
https://www.colorhexa.com/207fc8
[ "# #207fc8 Color Information\n\nIn a RGB color space, hex #207fc8 is composed of 12.5% red, 49.8% green and 78.4% blue. Whereas in a CMYK color space, it is composed of 84% cyan, 36.5% magenta, 0% yellow and 21.6% black. It has a hue angle of 206.1 degrees, a saturation of 72.4% and a lightness of 45.5%. #207fc8 color hex could be obtained by blending #40feff with #000091. Closest websafe color is: #3366cc.\n\n• R 13\n• G 50\n• B 78\nRGB color chart\n• C 84\n• M 37\n• Y 0\n• K 22\nCMYK color chart\n\n#207fc8 color description : Strong blue.\n\n# #207fc8 Color Conversion\n\nThe hexadecimal color #207fc8 has RGB values of R:32, G:127, B:200 and CMYK values of C:0.84, M:0.37, Y:0, K:0.22. Its decimal value is 2129864.\n\nHex triplet RGB Decimal 207fc8 `#207fc8` 32, 127, 200 `rgb(32,127,200)` 12.5, 49.8, 78.4 `rgb(12.5%,49.8%,78.4%)` 84, 37, 0, 22 206.1°, 72.4, 45.5 `hsl(206.1,72.4%,45.5%)` 206.1°, 84, 78.4 3366cc `#3366cc`\nCIE-LAB 51.444, -0.379, -45.332 18.608, 19.654, 57.453 0.194, 0.205, 19.654 51.444, 45.334, 269.521 51.444, -29.841, -69.689 44.333, -2.662, -45.803 00100000, 01111111, 11001000\n\n# Color Schemes with #207fc8\n\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n• #c86920\n``#c86920` `rgb(200,105,32)``\nComplementary Color\n• #20c8bd\n``#20c8bd` `rgb(32,200,189)``\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n• #202bc8\n``#202bc8` `rgb(32,43,200)``\nAnalogous Color\n• #c8bd20\n``#c8bd20` `rgb(200,189,32)``\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n• #c8202b\n``#c8202b` `rgb(200,32,43)``\nSplit Complementary Color\n• #7fc820\n``#7fc820` `rgb(127,200,32)``\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n• #c8207f\n``#c8207f` `rgb(200,32,127)``\n• #20c869\n``#20c869` `rgb(32,200,105)``\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n• #c8207f\n``#c8207f` `rgb(200,32,127)``\n• #c86920\n``#c86920` `rgb(200,105,32)``\n• #155586\n``#155586` `rgb(21,85,134)``\n• #19639c\n``#19639c` `rgb(25,99,156)``\n• #1c71b2\n``#1c71b2` `rgb(28,113,178)``\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n• #258ddc\n``#258ddc` `rgb(37,141,220)``\n• #3b98e0\n``#3b98e0` `rgb(59,152,224)``\n• #51a4e3\n``#51a4e3` `rgb(81,164,227)``\nMonochromatic Color\n\n# Alternatives to #207fc8\n\nBelow, you can see some colors close to #207fc8. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #20a9c8\n``#20a9c8` `rgb(32,169,200)``\n• #209bc8\n``#209bc8` `rgb(32,155,200)``\n• #208dc8\n``#208dc8` `rgb(32,141,200)``\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n• #2071c8\n``#2071c8` `rgb(32,113,200)``\n• #2063c8\n``#2063c8` `rgb(32,99,200)``\n• #2055c8\n``#2055c8` `rgb(32,85,200)``\nSimilar Colors\n\n# #207fc8 Preview\n\nThis text has a font color of #207fc8.\n\n``<span style=\"color:#207fc8;\">Text here</span>``\n#207fc8 background color\n\nThis paragraph has a background color of #207fc8.\n\n``<p style=\"background-color:#207fc8;\">Content here</p>``\n#207fc8 border color\n\nThis element has a border color of #207fc8.\n\n``<div style=\"border:1px solid #207fc8;\">Content here</div>``\nCSS codes\n``.text {color:#207fc8;}``\n``.background {background-color:#207fc8;}``\n``.border {border:1px solid #207fc8;}``\n\n# Shades and Tints of #207fc8\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #02090e is the darkest color, while #fcfdff is the lightest one.\n\n• #02090e\n``#02090e` `rgb(2,9,14)``\n• #05141f\n``#05141f` `rgb(5,20,31)``\n• #081e30\n``#081e30` `rgb(8,30,48)``\n• #0a2941\n``#0a2941` `rgb(10,41,65)``\n• #0d3452\n``#0d3452` `rgb(13,52,82)``\n• #103f63\n``#103f63` `rgb(16,63,99)``\n• #124973\n``#124973` `rgb(18,73,115)``\n• #155484\n``#155484` `rgb(21,84,132)``\n• #185f95\n``#185f95` `rgb(24,95,149)``\n• #1b6aa6\n``#1b6aa6` `rgb(27,106,166)``\n• #1d74b7\n``#1d74b7` `rgb(29,116,183)``\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n``#238ad9` `rgb(35,138,217)``\n• #3193de\n``#3193de` `rgb(49,147,222)``\n• #429ce1\n``#429ce1` `rgb(66,156,225)``\n• #53a5e3\n``#53a5e3` `rgb(83,165,227)``\n• #64aee6\n``#64aee6` `rgb(100,174,230)``\n• #75b6e9\n``#75b6e9` `rgb(117,182,233)``\n• #86bfec\n``#86bfec` `rgb(134,191,236)``\n• #97c8ee\n``#97c8ee` `rgb(151,200,238)``\n• #a8d1f1\n``#a8d1f1` `rgb(168,209,241)``\n• #b8daf4\n``#b8daf4` `rgb(184,218,244)``\n• #c9e3f6\n``#c9e3f6` `rgb(201,227,246)``\n• #daecf9\n``#daecf9` `rgb(218,236,249)``\n• #ebf5fc\n``#ebf5fc` `rgb(235,245,252)``\n• #fcfdff\n``#fcfdff` `rgb(252,253,255)``\nTint Color Variation\n\n# Tones of #207fc8\n\nA tone is produced by adding gray to any pure hue. In this case, #707478 is the less saturated color, while #0583e3 is the most saturated one.\n\n• #707478\n``#707478` `rgb(112,116,120)``\n• #677681\n``#677681` `rgb(103,118,129)``\n• #5e778a\n``#5e778a` `rgb(94,119,138)``\n• #567892\n``#567892` `rgb(86,120,146)``\n• #4d799b\n``#4d799b` `rgb(77,121,155)``\n• #447aa4\n``#447aa4` `rgb(68,122,164)``\n``#3b7bad` `rgb(59,123,173)``\n• #327db6\n``#327db6` `rgb(50,125,182)``\n• #297ebf\n``#297ebf` `rgb(41,126,191)``\n• #207fc8\n``#207fc8` `rgb(32,127,200)``\n• #1780d1\n``#1780d1` `rgb(23,128,209)``\n• #0e81da\n``#0e81da` `rgb(14,129,218)``\n• #0583e3\n``#0583e3` `rgb(5,131,227)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #207fc8 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.56505936,"math_prob":0.55812854,"size":3712,"snap":"2020-10-2020-16","text_gpt3_token_len":1631,"char_repetition_ratio":0.12108953,"word_repetition_ratio":0.011111111,"special_character_ratio":0.56088364,"punctuation_ratio":0.23692992,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98711467,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-18T16:24:44Z\",\"WARC-Record-ID\":\"<urn:uuid:47043481-1821-46c1-9f64-547ee296d110>\",\"Content-Length\":\"36312\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2aa4af2c-8521-40e8-aef7-d08ff7d31f07>\",\"WARC-Concurrent-To\":\"<urn:uuid:99f80f12-ee9c-49fc-9733-f0575c915cc4>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/207fc8\",\"WARC-Payload-Digest\":\"sha1:T3ODBJIWQDMAKYS7X4JUY7DJ37437WMK\",\"WARC-Block-Digest\":\"sha1:4YF7IWRH3S3ENKNRTZTYI2A4HMTS6GA6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875143784.14_warc_CC-MAIN-20200218150621-20200218180621-00364.warc.gz\"}"}
https://www.php.net/manual/zh/ds-sequence.sum.php
[ "PHP 7.4.0RC2 Released!\n\n# Ds\\Sequence::sum\n\n(PECL ds >= 1.0.0)\n\nDs\\Sequence::sumReturns the sum of all values in the sequence\n\n### 说明\n\nabstract public Ds\\Sequence::sum ( void ) : number\n\nReturns the sum of all values in the sequence.\n\nNote:\n\nArrays and objects are considered equal to zero when calculating the sum.\n\n### 返回值\n\nThe sum of all the values in the sequence as either a float or int depending on the values in the sequence.\n\n### 范例\n\nExample #1 Ds\\Sequence::sum() integer example\n\n``` <?php\\$sequence = new \\Ds\\Vector([1, 2, 3]);var_dump(\\$sequence->sum());?> ```\n\n```int(6)\n```\n\nExample #2 Ds\\Sequence::sum() float example\n\n``` <?php\\$sequence = new \\Ds\\Vector([1, 2.5, 3]);var_dump(\\$sequence->sum());?> ```\n\n```float(6.5)\n```\nThere are no user contributed notes for this page.", null, "" ]
[ null, "https://www.php.net/images/to-top@2x.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5007019,"math_prob":0.9802271,"size":613,"snap":"2019-35-2019-39","text_gpt3_token_len":195,"char_repetition_ratio":0.18062398,"word_repetition_ratio":0.13636364,"special_character_ratio":0.3115824,"punctuation_ratio":0.1969697,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99661034,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-22T11:54:42Z\",\"WARC-Record-ID\":\"<urn:uuid:fc35786d-7198-4994-b766-4b138489a0e7>\",\"Content-Length\":\"24966\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:627eef42-b01e-4bd3-95ab-4d4d4bc499bc>\",\"WARC-Concurrent-To\":\"<urn:uuid:bcb9dea7-5f33-443a-8800-8470c121a258>\",\"WARC-IP-Address\":\"185.85.0.29\",\"WARC-Target-URI\":\"https://www.php.net/manual/zh/ds-sequence.sum.php\",\"WARC-Payload-Digest\":\"sha1:V5AUK537VDPWYZUZ6RCTQMXQZLKI6Q2K\",\"WARC-Block-Digest\":\"sha1:NVTL3VB3XMVMDKHHGSQXBHF2QQVPJAJC\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514575513.97_warc_CC-MAIN-20190922114839-20190922140839-00047.warc.gz\"}"}
https://monkeymama.savingadvice.com/2010/05/
[ "User Real IP - 34.236.191.104\n```Array\n(\n => Array\n(\n => 182.68.68.92\n)\n\n => Array\n(\n => 101.0.41.201\n)\n\n => Array\n(\n => 43.225.98.123\n)\n\n => Array\n(\n => 2.58.194.139\n)\n\n => Array\n(\n => 46.119.197.104\n)\n\n => Array\n(\n => 45.249.8.93\n)\n\n => Array\n(\n => 103.12.135.72\n)\n\n => Array\n(\n => 157.35.243.216\n)\n\n => Array\n(\n => 209.107.214.176\n)\n\n => Array\n(\n => 5.181.233.166\n)\n\n => Array\n(\n => 106.201.10.100\n)\n\n => Array\n(\n => 36.90.55.39\n)\n\n => Array\n(\n => 119.154.138.47\n)\n\n => Array\n(\n => 51.91.31.157\n)\n\n => Array\n(\n => 182.182.65.216\n)\n\n => Array\n(\n => 157.35.252.63\n)\n\n => Array\n(\n => 14.142.34.163\n)\n\n => Array\n(\n => 178.62.43.135\n)\n\n => Array\n(\n => 43.248.152.148\n)\n\n => Array\n(\n => 222.252.104.114\n)\n\n => Array\n(\n => 209.107.214.168\n)\n\n => Array\n(\n => 103.99.199.250\n)\n\n => Array\n(\n => 178.62.72.160\n)\n\n => Array\n(\n => 27.6.1.170\n)\n\n => Array\n(\n => 182.69.249.219\n)\n\n => Array\n(\n => 110.93.228.86\n)\n\n => Array\n(\n => 72.255.1.98\n)\n\n => Array\n(\n => 182.73.111.98\n)\n\n => Array\n(\n => 45.116.117.11\n)\n\n => Array\n(\n => 122.15.78.189\n)\n\n => Array\n(\n => 14.167.188.234\n)\n\n => Array\n(\n => 223.190.4.202\n)\n\n => Array\n(\n => 202.173.125.19\n)\n\n => Array\n(\n => 103.255.5.32\n)\n\n => Array\n(\n => 39.37.145.103\n)\n\n => Array\n(\n => 140.213.26.249\n)\n\n => Array\n(\n => 45.118.166.85\n)\n\n => Array\n(\n => 102.166.138.255\n)\n\n => Array\n(\n => 77.111.246.234\n)\n\n => Array\n(\n => 45.63.6.196\n)\n\n => Array\n(\n => 103.250.147.115\n)\n\n => Array\n(\n => 223.185.30.99\n)\n\n => Array\n(\n => 103.122.168.108\n)\n\n => Array\n(\n => 123.136.203.21\n)\n\n => Array\n(\n => 171.229.243.63\n)\n\n => Array\n(\n => 153.149.98.149\n)\n\n => Array\n(\n => 223.238.93.15\n)\n\n => Array\n(\n => 178.62.113.166\n)\n\n => Array\n(\n => 101.162.0.153\n)\n\n => Array\n(\n => 121.200.62.114\n)\n\n => Array\n(\n => 14.248.77.252\n)\n\n => Array\n(\n => 95.142.117.29\n)\n\n => Array\n(\n => 150.129.60.107\n)\n\n => Array\n(\n => 94.205.243.22\n)\n\n => Array\n(\n => 115.42.71.143\n)\n\n => Array\n(\n => 117.217.195.59\n)\n\n => Array\n(\n => 182.77.112.56\n)\n\n => Array\n(\n => 182.77.112.108\n)\n\n => Array\n(\n => 41.80.69.10\n)\n\n => Array\n(\n => 117.5.222.121\n)\n\n => Array\n(\n => 103.11.0.38\n)\n\n => Array\n(\n => 202.173.127.140\n)\n\n => Array\n(\n => 49.249.249.50\n)\n\n => Array\n(\n => 116.72.198.211\n)\n\n => Array\n(\n => 223.230.54.53\n)\n\n => Array\n(\n => 102.69.228.74\n)\n\n => Array\n(\n => 39.37.251.89\n)\n\n => Array\n(\n => 39.53.246.141\n)\n\n => Array\n(\n => 39.57.182.72\n)\n\n => Array\n(\n => 209.58.130.210\n)\n\n => Array\n(\n => 104.131.75.86\n)\n\n => Array\n(\n => 106.212.131.255\n)\n\n => Array\n(\n => 106.212.132.127\n)\n\n => Array\n(\n => 223.190.4.60\n)\n\n => Array\n(\n => 103.252.116.252\n)\n\n => Array\n(\n => 103.76.55.182\n)\n\n => Array\n(\n => 45.118.166.70\n)\n\n => Array\n(\n => 103.93.174.215\n)\n\n => Array\n(\n => 5.62.62.142\n)\n\n => Array\n(\n => 182.179.158.156\n)\n\n => Array\n(\n => 39.57.255.12\n)\n\n => Array\n(\n => 39.37.178.37\n)\n\n => Array\n(\n => 182.180.165.211\n)\n\n => Array\n(\n => 119.153.135.17\n)\n\n => Array\n(\n => 72.255.15.244\n)\n\n => Array\n(\n => 139.180.166.181\n)\n\n => Array\n(\n => 70.119.147.111\n)\n\n => Array\n(\n => 106.210.40.83\n)\n\n => Array\n(\n => 14.190.70.91\n)\n\n => Array\n(\n => 202.125.156.82\n)\n\n => Array\n(\n => 115.42.68.38\n)\n\n => Array\n(\n => 102.167.13.108\n)\n\n => Array\n(\n => 117.217.192.130\n)\n\n => Array\n(\n => 205.185.223.156\n)\n\n => Array\n(\n => 171.224.180.29\n)\n\n => Array\n(\n => 45.127.45.68\n)\n\n => Array\n(\n => 195.206.183.232\n)\n\n => Array\n(\n => 49.32.52.115\n)\n\n => Array\n(\n => 49.207.49.223\n)\n\n => Array\n(\n => 45.63.29.61\n)\n\n => Array\n(\n => 103.245.193.214\n)\n\n => Array\n(\n => 39.40.236.69\n)\n\n => Array\n(\n => 62.80.162.111\n)\n\n => Array\n(\n => 45.116.232.56\n)\n\n => Array\n(\n => 45.118.166.91\n)\n\n => Array\n(\n => 180.92.230.234\n)\n\n => Array\n(\n => 157.40.57.160\n)\n\n => Array\n(\n => 110.38.38.130\n)\n\n => Array\n(\n => 72.255.57.183\n)\n\n => Array\n(\n => 182.68.81.85\n)\n\n => Array\n(\n => 39.57.202.122\n)\n\n => Array\n(\n => 119.152.154.36\n)\n\n => Array\n(\n => 5.62.62.141\n)\n\n => Array\n(\n => 119.155.54.232\n)\n\n => Array\n(\n => 39.37.141.22\n)\n\n => Array\n(\n => 183.87.12.225\n)\n\n => Array\n(\n => 107.170.127.117\n)\n\n => Array\n(\n => 125.63.124.49\n)\n\n => Array\n(\n => 39.42.191.3\n)\n\n => Array\n(\n => 116.74.24.72\n)\n\n => Array\n(\n => 46.101.89.227\n)\n\n => Array\n(\n => 202.173.125.247\n)\n\n => Array\n(\n => 39.42.184.254\n)\n\n => Array\n(\n => 115.186.165.132\n)\n\n => Array\n(\n => 39.57.206.126\n)\n\n => Array\n(\n => 103.245.13.145\n)\n\n => Array\n(\n => 202.175.246.43\n)\n\n => Array\n(\n => 192.140.152.150\n)\n\n => Array\n(\n => 202.88.250.103\n)\n\n => Array\n(\n => 103.248.94.207\n)\n\n => Array\n(\n => 77.73.66.101\n)\n\n => Array\n(\n => 104.131.66.8\n)\n\n => Array\n(\n => 113.186.161.97\n)\n\n => Array\n(\n => 222.254.5.7\n)\n\n => Array\n(\n => 223.233.67.247\n)\n\n => Array\n(\n => 171.249.116.146\n)\n\n => Array\n(\n => 47.30.209.71\n)\n\n => Array\n(\n => 202.134.13.130\n)\n\n => Array\n(\n => 27.6.135.7\n)\n\n => Array\n(\n => 107.170.186.79\n)\n\n => Array\n(\n => 103.212.89.171\n)\n\n => Array\n(\n => 117.197.9.77\n)\n\n => Array\n(\n => 122.176.206.233\n)\n\n => Array\n(\n => 192.227.253.222\n)\n\n => Array\n(\n => 182.188.224.119\n)\n\n => Array\n(\n => 14.248.70.74\n)\n\n => Array\n(\n => 42.118.219.169\n)\n\n => Array\n(\n => 110.39.146.170\n)\n\n => Array\n(\n => 119.160.66.143\n)\n\n => Array\n(\n => 103.248.95.130\n)\n\n => Array\n(\n => 27.63.152.208\n)\n\n => Array\n(\n => 49.207.114.96\n)\n\n => Array\n(\n => 102.166.23.214\n)\n\n => Array\n(\n => 175.107.254.73\n)\n\n => Array\n(\n => 103.10.227.214\n)\n\n => Array\n(\n => 202.143.115.89\n)\n\n => Array\n(\n => 110.93.227.187\n)\n\n => Array\n(\n => 103.140.31.60\n)\n\n => Array\n(\n => 110.37.231.46\n)\n\n => Array\n(\n => 39.36.99.238\n)\n\n => Array\n(\n => 157.37.140.26\n)\n\n => Array\n(\n => 43.246.202.226\n)\n\n => Array\n(\n => 137.97.8.143\n)\n\n => Array\n(\n => 182.65.52.242\n)\n\n => Array\n(\n => 115.42.69.62\n)\n\n => Array\n(\n => 14.143.254.58\n)\n\n => Array\n(\n => 223.179.143.236\n)\n\n => Array\n(\n => 223.179.143.249\n)\n\n => Array\n(\n => 103.143.7.54\n)\n\n => Array\n(\n => 223.179.139.106\n)\n\n => Array\n(\n => 39.40.219.90\n)\n\n => Array\n(\n => 45.115.141.231\n)\n\n => Array\n(\n => 120.29.100.33\n)\n\n => Array\n(\n => 112.196.132.5\n)\n\n => Array\n(\n => 202.163.123.153\n)\n\n => Array\n(\n => 5.62.58.146\n)\n\n => Array\n(\n => 39.53.216.113\n)\n\n => Array\n(\n => 42.111.160.73\n)\n\n => Array\n(\n => 107.182.231.213\n)\n\n => Array\n(\n => 119.82.94.120\n)\n\n => Array\n(\n => 178.62.34.82\n)\n\n => Array\n(\n => 203.122.6.18\n)\n\n => Array\n(\n => 157.42.38.251\n)\n\n => Array\n(\n => 45.112.68.222\n)\n\n => Array\n(\n => 49.206.212.122\n)\n\n => Array\n(\n => 104.236.70.228\n)\n\n => Array\n(\n => 42.111.34.243\n)\n\n => Array\n(\n => 84.241.19.186\n)\n\n => Array\n(\n => 89.187.180.207\n)\n\n => Array\n(\n => 104.243.212.118\n)\n\n => Array\n(\n => 104.236.55.136\n)\n\n => Array\n(\n => 106.201.16.163\n)\n\n => Array\n(\n => 46.101.40.25\n)\n\n => Array\n(\n => 45.118.166.94\n)\n\n => Array\n(\n => 49.36.128.102\n)\n\n => Array\n(\n => 14.142.193.58\n)\n\n => Array\n(\n => 212.79.124.176\n)\n\n => Array\n(\n => 45.32.191.194\n)\n\n => Array\n(\n => 105.112.107.46\n)\n\n => Array\n(\n => 106.201.14.8\n)\n\n => Array\n(\n => 110.93.240.65\n)\n\n => Array\n(\n => 27.96.95.177\n)\n\n => Array\n(\n => 45.41.134.35\n)\n\n => Array\n(\n => 180.151.13.110\n)\n\n => Array\n(\n => 101.53.242.89\n)\n\n => Array\n(\n => 115.186.3.110\n)\n\n => Array\n(\n => 171.49.185.242\n)\n\n => Array\n(\n => 115.42.70.24\n)\n\n => Array\n(\n => 45.128.188.43\n)\n\n => Array\n(\n => 103.140.129.63\n)\n\n => Array\n(\n => 101.50.113.147\n)\n\n => Array\n(\n => 103.66.73.30\n)\n\n => Array\n(\n => 117.247.193.169\n)\n\n => Array\n(\n => 120.29.100.94\n)\n\n => Array\n(\n => 42.109.154.39\n)\n\n => Array\n(\n => 122.173.155.150\n)\n\n => Array\n(\n => 45.115.104.53\n)\n\n => Array\n(\n => 116.74.29.84\n)\n\n => Array\n(\n => 101.50.125.34\n)\n\n => Array\n(\n => 45.118.166.80\n)\n\n => Array\n(\n => 91.236.184.27\n)\n\n => Array\n(\n => 113.167.185.120\n)\n\n => Array\n(\n => 27.97.66.222\n)\n\n => Array\n(\n => 43.247.41.117\n)\n\n => Array\n(\n => 23.229.16.227\n)\n\n => Array\n(\n => 14.248.79.209\n)\n\n => Array\n(\n => 117.5.194.26\n)\n\n => Array\n(\n => 117.217.205.41\n)\n\n => Array\n(\n => 114.79.169.99\n)\n\n => Array\n(\n => 103.55.60.97\n)\n\n => Array\n(\n => 182.75.89.210\n)\n\n => Array\n(\n => 77.73.66.109\n)\n\n => Array\n(\n => 182.77.126.139\n)\n\n => Array\n(\n => 14.248.77.166\n)\n\n => Array\n(\n => 157.35.224.133\n)\n\n => Array\n(\n => 183.83.38.27\n)\n\n => Array\n(\n => 182.68.4.77\n)\n\n => Array\n(\n => 122.177.130.234\n)\n\n => Array\n(\n => 103.24.99.99\n)\n\n => Array\n(\n => 103.91.127.66\n)\n\n => Array\n(\n => 41.90.34.240\n)\n\n => Array\n(\n => 49.205.77.102\n)\n\n => Array\n(\n => 103.248.94.142\n)\n\n => Array\n(\n => 104.143.92.170\n)\n\n => Array\n(\n => 219.91.157.114\n)\n\n => Array\n(\n => 223.190.88.22\n)\n\n => Array\n(\n => 223.190.86.232\n)\n\n => Array\n(\n => 39.41.172.80\n)\n\n => Array\n(\n => 124.107.206.5\n)\n\n => Array\n(\n => 139.167.180.224\n)\n\n => Array\n(\n => 93.76.64.248\n)\n\n => Array\n(\n => 65.216.227.119\n)\n\n => Array\n(\n => 223.190.119.141\n)\n\n => Array\n(\n => 110.93.237.179\n)\n\n => Array\n(\n => 41.90.7.85\n)\n\n => Array\n(\n => 103.100.6.26\n)\n\n => Array\n(\n => 104.140.83.13\n)\n\n => Array\n(\n => 223.190.119.133\n)\n\n => Array\n(\n => 119.152.150.87\n)\n\n => Array\n(\n => 103.125.130.147\n)\n\n => Array\n(\n => 27.6.5.52\n)\n\n => Array\n(\n => 103.98.188.26\n)\n\n => Array\n(\n => 39.35.121.81\n)\n\n => Array\n(\n => 74.119.146.182\n)\n\n => Array\n(\n => 5.181.233.162\n)\n\n => Array\n(\n => 157.39.18.60\n)\n\n => Array\n(\n => 1.187.252.25\n)\n\n => Array\n(\n => 39.42.145.59\n)\n\n => Array\n(\n => 39.35.39.198\n)\n\n => Array\n(\n => 49.36.128.214\n)\n\n => Array\n(\n => 182.190.20.56\n)\n\n => Array\n(\n => 122.180.249.189\n)\n\n => Array\n(\n => 117.217.203.107\n)\n\n => Array\n(\n => 103.70.82.241\n)\n\n => Array\n(\n => 45.118.166.68\n)\n\n => Array\n(\n => 122.180.168.39\n)\n\n => Array\n(\n => 149.28.67.254\n)\n\n => Array\n(\n => 223.233.73.8\n)\n\n => Array\n(\n => 122.167.140.0\n)\n\n => Array\n(\n => 95.158.51.55\n)\n\n => Array\n(\n => 27.96.95.134\n)\n\n => Array\n(\n => 49.206.214.53\n)\n\n => Array\n(\n => 212.103.49.92\n)\n\n => Array\n(\n => 122.177.115.101\n)\n\n => Array\n(\n => 171.50.187.124\n)\n\n => Array\n(\n => 122.164.55.107\n)\n\n => Array\n(\n => 98.114.217.204\n)\n\n => Array\n(\n => 106.215.10.54\n)\n\n => Array\n(\n => 115.42.68.28\n)\n\n => Array\n(\n => 104.194.220.87\n)\n\n => Array\n(\n => 103.137.84.170\n)\n\n => Array\n(\n => 61.16.142.110\n)\n\n => Array\n(\n => 212.103.49.85\n)\n\n => Array\n(\n => 39.53.248.162\n)\n\n => Array\n(\n => 203.122.40.214\n)\n\n => Array\n(\n => 117.217.198.72\n)\n\n => Array\n(\n => 115.186.191.203\n)\n\n => Array\n(\n => 120.29.100.199\n)\n\n => Array\n(\n => 45.151.237.24\n)\n\n => Array\n(\n => 223.190.125.232\n)\n\n => Array\n(\n => 41.80.151.17\n)\n\n => Array\n(\n => 23.111.188.5\n)\n\n => Array\n(\n => 223.190.125.216\n)\n\n => Array\n(\n => 103.217.133.119\n)\n\n => Array\n(\n => 103.198.173.132\n)\n\n => Array\n(\n => 47.31.155.89\n)\n\n => Array\n(\n => 223.190.20.253\n)\n\n => Array\n(\n => 104.131.92.125\n)\n\n => Array\n(\n => 223.190.19.152\n)\n\n => Array\n(\n => 103.245.193.191\n)\n\n => Array\n(\n => 106.215.58.255\n)\n\n => Array\n(\n => 119.82.83.238\n)\n\n => Array\n(\n => 106.212.128.138\n)\n\n => Array\n(\n => 139.167.237.36\n)\n\n => Array\n(\n => 222.124.40.250\n)\n\n => Array\n(\n => 134.56.185.169\n)\n\n => Array\n(\n => 54.255.226.31\n)\n\n => Array\n(\n => 137.97.162.31\n)\n\n => Array\n(\n => 95.185.21.191\n)\n\n => Array\n(\n => 171.61.168.151\n)\n\n => Array\n(\n => 137.97.184.4\n)\n\n => Array\n(\n => 106.203.151.202\n)\n\n => Array\n(\n => 39.37.137.0\n)\n\n => Array\n(\n => 45.118.166.66\n)\n\n => Array\n(\n => 14.248.105.100\n)\n\n => Array\n(\n => 106.215.61.185\n)\n\n => Array\n(\n => 202.83.57.179\n)\n\n => Array\n(\n => 89.187.182.176\n)\n\n => Array\n(\n => 49.249.232.198\n)\n\n => Array\n(\n => 132.154.95.236\n)\n\n => Array\n(\n => 223.233.83.230\n)\n\n => Array\n(\n => 183.83.153.14\n)\n\n => Array\n(\n => 125.63.72.210\n)\n\n => Array\n(\n => 207.174.202.11\n)\n\n => Array\n(\n => 119.95.88.59\n)\n\n => Array\n(\n => 122.170.14.150\n)\n\n => Array\n(\n => 45.118.166.75\n)\n\n => Array\n(\n => 103.12.135.37\n)\n\n => Array\n(\n => 49.207.120.225\n)\n\n => Array\n(\n => 182.64.195.207\n)\n\n => Array\n(\n => 103.99.37.16\n)\n\n => Array\n(\n => 46.150.104.221\n)\n\n => Array\n(\n => 104.236.195.147\n)\n\n => Array\n(\n => 103.104.192.43\n)\n\n => Array\n(\n => 24.242.159.118\n)\n\n => Array\n(\n => 39.42.179.143\n)\n\n => Array\n(\n => 111.93.58.131\n)\n\n => Array\n(\n => 193.176.84.127\n)\n\n => Array\n(\n => 209.58.142.218\n)\n\n => Array\n(\n => 69.243.152.129\n)\n\n => Array\n(\n => 117.97.131.249\n)\n\n => Array\n(\n => 103.230.180.89\n)\n\n => Array\n(\n => 106.212.170.192\n)\n\n => Array\n(\n => 171.224.180.95\n)\n\n => Array\n(\n => 158.222.11.87\n)\n\n => Array\n(\n => 119.155.60.246\n)\n\n => Array\n(\n => 41.90.43.129\n)\n\n => Array\n(\n => 185.183.104.170\n)\n\n => Array\n(\n => 14.248.67.65\n)\n\n => Array\n(\n => 117.217.205.82\n)\n\n => Array\n(\n => 111.88.7.209\n)\n\n => Array\n(\n => 49.36.132.244\n)\n\n => Array\n(\n => 171.48.40.2\n)\n\n => Array\n(\n => 119.81.105.2\n)\n\n => Array\n(\n => 49.36.128.114\n)\n\n => Array\n(\n => 213.200.31.93\n)\n\n => Array\n(\n => 2.50.15.110\n)\n\n => Array\n(\n => 120.29.104.67\n)\n\n => Array\n(\n => 223.225.32.221\n)\n\n => Array\n(\n => 14.248.67.195\n)\n\n => Array\n(\n => 119.155.36.13\n)\n\n => Array\n(\n => 101.50.95.104\n)\n\n => Array\n(\n => 104.236.205.233\n)\n\n => Array\n(\n => 122.164.36.150\n)\n\n => Array\n(\n => 157.45.93.209\n)\n\n => Array\n(\n => 182.77.118.100\n)\n\n => Array\n(\n => 182.74.134.218\n)\n\n => Array\n(\n => 183.82.128.146\n)\n\n => Array\n(\n => 112.196.170.234\n)\n\n => Array\n(\n => 122.173.230.178\n)\n\n => Array\n(\n => 122.164.71.199\n)\n\n => Array\n(\n => 51.79.19.31\n)\n\n => Array\n(\n => 58.65.222.20\n)\n\n => Array\n(\n => 103.27.203.97\n)\n\n => Array\n(\n => 111.88.7.242\n)\n\n => Array\n(\n => 14.171.232.77\n)\n\n => Array\n(\n => 46.101.22.182\n)\n\n => Array\n(\n => 103.94.219.19\n)\n\n => Array\n(\n => 139.190.83.30\n)\n\n => Array\n(\n => 223.190.27.184\n)\n\n => Array\n(\n => 182.185.183.34\n)\n\n => Array\n(\n => 91.74.181.242\n)\n\n => Array\n(\n => 222.252.107.14\n)\n\n => Array\n(\n => 137.97.8.28\n)\n\n => Array\n(\n => 46.101.16.229\n)\n\n => Array\n(\n => 122.53.254.229\n)\n\n => Array\n(\n => 106.201.17.180\n)\n\n => Array\n(\n => 123.24.170.129\n)\n\n => Array\n(\n => 182.185.180.79\n)\n\n => Array\n(\n => 223.190.17.4\n)\n\n => Array\n(\n => 213.108.105.1\n)\n\n => Array\n(\n => 171.22.76.9\n)\n\n => Array\n(\n => 202.66.178.164\n)\n\n => Array\n(\n => 178.62.97.171\n)\n\n => Array\n(\n => 167.179.110.209\n)\n\n => Array\n(\n => 223.230.147.172\n)\n\n => Array\n(\n => 76.218.195.160\n)\n\n => Array\n(\n => 14.189.186.178\n)\n\n => Array\n(\n => 157.41.45.143\n)\n\n => Array\n(\n => 223.238.22.53\n)\n\n => Array\n(\n => 111.88.7.244\n)\n\n => Array\n(\n => 5.62.57.19\n)\n\n => Array\n(\n => 106.201.25.216\n)\n\n => Array\n(\n => 117.217.205.33\n)\n\n => Array\n(\n => 111.88.7.215\n)\n\n => Array\n(\n => 106.201.13.77\n)\n\n => Array\n(\n => 50.7.93.29\n)\n\n => Array\n(\n => 123.201.70.112\n)\n\n => Array\n(\n => 39.42.108.226\n)\n\n => Array\n(\n => 27.5.198.29\n)\n\n => Array\n(\n => 223.238.85.187\n)\n\n => Array\n(\n => 171.49.176.32\n)\n\n => Array\n(\n => 14.248.79.242\n)\n\n => Array\n(\n => 46.219.211.183\n)\n\n => Array\n(\n => 185.244.212.251\n)\n\n => Array\n(\n => 14.102.84.126\n)\n\n => Array\n(\n => 106.212.191.52\n)\n\n => Array\n(\n => 154.72.153.203\n)\n\n => Array\n(\n => 14.175.82.64\n)\n\n => Array\n(\n => 141.105.139.131\n)\n\n => Array\n(\n => 182.156.103.98\n)\n\n => Array\n(\n => 117.217.204.75\n)\n\n => Array\n(\n => 104.140.83.115\n)\n\n => Array\n(\n => 119.152.62.8\n)\n\n => Array\n(\n => 45.125.247.94\n)\n\n => Array\n(\n => 137.97.37.252\n)\n\n => Array\n(\n => 117.217.204.73\n)\n\n => Array\n(\n => 14.248.79.133\n)\n\n => Array\n(\n => 39.37.152.52\n)\n\n => Array\n(\n => 103.55.60.54\n)\n\n => Array\n(\n => 102.166.183.88\n)\n\n => Array\n(\n => 5.62.60.162\n)\n\n => Array\n(\n => 5.62.60.163\n)\n\n => Array\n(\n => 160.202.38.131\n)\n\n => Array\n(\n => 106.215.20.253\n)\n\n => Array\n(\n => 39.37.160.54\n)\n\n => Array\n(\n => 119.152.59.186\n)\n\n => Array\n(\n => 183.82.0.164\n)\n\n => Array\n(\n => 41.90.54.87\n)\n\n => Array\n(\n => 157.36.85.158\n)\n\n => Array\n(\n => 110.37.229.162\n)\n\n => Array\n(\n => 203.99.180.148\n)\n\n => Array\n(\n => 117.97.132.91\n)\n\n => Array\n(\n => 171.61.147.105\n)\n\n => Array\n(\n => 14.98.147.214\n)\n\n => Array\n(\n => 209.234.253.191\n)\n\n => Array\n(\n => 92.38.148.60\n)\n\n => Array\n(\n => 178.128.104.139\n)\n\n => Array\n(\n => 212.154.0.176\n)\n\n => Array\n(\n => 103.41.24.141\n)\n\n => Array\n(\n => 2.58.194.132\n)\n\n => Array\n(\n => 180.190.78.169\n)\n\n => Array\n(\n => 106.215.45.182\n)\n\n => Array\n(\n => 125.63.100.222\n)\n\n => Array\n(\n => 110.54.247.17\n)\n\n => Array\n(\n => 103.26.85.105\n)\n\n => Array\n(\n => 39.42.147.3\n)\n\n => Array\n(\n => 137.97.51.41\n)\n\n => Array\n(\n => 71.202.72.27\n)\n\n => Array\n(\n => 119.155.35.10\n)\n\n => Array\n(\n => 202.47.43.120\n)\n\n => Array\n(\n => 183.83.64.101\n)\n\n => Array\n(\n => 182.68.106.141\n)\n\n => Array\n(\n => 171.61.187.87\n)\n\n => Array\n(\n => 178.162.198.118\n)\n\n => Array\n(\n => 115.97.151.218\n)\n\n => Array\n(\n => 196.207.184.210\n)\n\n => Array\n(\n => 198.16.70.51\n)\n\n => Array\n(\n => 41.60.237.33\n)\n\n => Array\n(\n => 47.11.86.26\n)\n\n => Array\n(\n => 117.217.201.183\n)\n\n => Array\n(\n => 203.192.241.79\n)\n\n => Array\n(\n => 122.165.119.85\n)\n\n => Array\n(\n => 23.227.142.218\n)\n\n => Array\n(\n => 178.128.104.221\n)\n\n => Array\n(\n => 14.192.54.163\n)\n\n => Array\n(\n => 139.5.253.218\n)\n\n => Array\n(\n => 117.230.140.127\n)\n\n => Array\n(\n => 195.114.149.199\n)\n\n => Array\n(\n => 14.239.180.220\n)\n\n => Array\n(\n => 103.62.155.94\n)\n\n => Array\n(\n => 118.71.97.14\n)\n\n => Array\n(\n => 137.97.55.163\n)\n\n => Array\n(\n => 202.47.49.198\n)\n\n => Array\n(\n => 171.61.177.85\n)\n\n => Array\n(\n => 137.97.190.224\n)\n\n => Array\n(\n => 117.230.34.142\n)\n\n => Array\n(\n => 103.41.32.5\n)\n\n => Array\n(\n => 203.90.82.237\n)\n\n => Array\n(\n => 125.63.124.238\n)\n\n => Array\n(\n => 103.232.128.78\n)\n\n => Array\n(\n => 106.197.14.227\n)\n\n => Array\n(\n => 81.17.242.244\n)\n\n => Array\n(\n => 81.19.210.179\n)\n\n => Array\n(\n => 103.134.94.98\n)\n\n => Array\n(\n => 110.38.0.86\n)\n\n => Array\n(\n => 103.10.224.195\n)\n\n => Array\n(\n => 45.118.166.89\n)\n\n => Array\n(\n => 115.186.186.68\n)\n\n => Array\n(\n => 138.197.129.237\n)\n\n => Array\n(\n => 14.247.162.52\n)\n\n => Array\n(\n => 103.255.4.5\n)\n\n => Array\n(\n => 14.167.188.254\n)\n\n => Array\n(\n => 5.62.59.54\n)\n\n => Array\n(\n => 27.122.14.80\n)\n\n => Array\n(\n => 39.53.240.21\n)\n\n => Array\n(\n => 39.53.241.243\n)\n\n => Array\n(\n => 117.230.130.161\n)\n\n => Array\n(\n => 118.71.191.149\n)\n\n => Array\n(\n => 5.188.95.54\n)\n\n => Array\n(\n => 66.45.250.27\n)\n\n => Array\n(\n => 106.215.6.175\n)\n\n => Array\n(\n => 27.122.14.86\n)\n\n => Array\n(\n => 103.255.4.51\n)\n\n => Array\n(\n => 101.50.93.119\n)\n\n => Array\n(\n => 137.97.183.51\n)\n\n => Array\n(\n => 117.217.204.185\n)\n\n => Array\n(\n => 95.104.106.82\n)\n\n => Array\n(\n => 5.62.56.211\n)\n\n => Array\n(\n => 103.104.181.214\n)\n\n => Array\n(\n => 36.72.214.243\n)\n\n => Array\n(\n => 5.62.62.219\n)\n\n => Array\n(\n => 110.36.202.4\n)\n\n => Array\n(\n => 103.255.4.253\n)\n\n => Array\n(\n => 110.172.138.61\n)\n\n => Array\n(\n => 159.203.24.195\n)\n\n => Array\n(\n => 13.229.88.42\n)\n\n => Array\n(\n => 59.153.235.20\n)\n\n => Array\n(\n => 171.236.169.32\n)\n\n => Array\n(\n => 14.231.85.206\n)\n\n => Array\n(\n => 119.152.54.103\n)\n\n => Array\n(\n => 103.80.117.202\n)\n\n => Array\n(\n => 223.179.157.75\n)\n\n => Array\n(\n => 122.173.68.249\n)\n\n => Array\n(\n => 188.163.72.113\n)\n\n => Array\n(\n => 119.155.20.164\n)\n\n => Array\n(\n => 103.121.43.68\n)\n\n => Array\n(\n => 5.62.58.6\n)\n\n => Array\n(\n => 203.122.40.154\n)\n\n => Array\n(\n => 222.254.96.203\n)\n\n => Array\n(\n => 103.83.148.167\n)\n\n => Array\n(\n => 103.87.251.226\n)\n\n => Array\n(\n => 123.24.129.24\n)\n\n => Array\n(\n => 137.97.83.8\n)\n\n => Array\n(\n => 223.225.33.132\n)\n\n => Array\n(\n => 128.76.175.190\n)\n\n => Array\n(\n => 195.85.219.32\n)\n\n => Array\n(\n => 139.167.102.93\n)\n\n => Array\n(\n => 49.15.198.253\n)\n\n => Array\n(\n => 45.152.183.172\n)\n\n => Array\n(\n => 42.106.180.136\n)\n\n => Array\n(\n => 95.142.120.9\n)\n\n => Array\n(\n => 139.167.236.4\n)\n\n => Array\n(\n => 159.65.72.167\n)\n\n => Array\n(\n => 49.15.89.2\n)\n\n => Array\n(\n => 42.201.161.195\n)\n\n => Array\n(\n => 27.97.210.38\n)\n\n => Array\n(\n => 171.241.45.19\n)\n\n => Array\n(\n => 42.108.2.18\n)\n\n => Array\n(\n => 171.236.40.68\n)\n\n => Array\n(\n => 110.93.82.102\n)\n\n => Array\n(\n => 43.225.24.186\n)\n\n => Array\n(\n => 117.230.189.119\n)\n\n => Array\n(\n => 124.123.147.187\n)\n\n => Array\n(\n => 216.151.184.250\n)\n\n => Array\n(\n => 49.15.133.16\n)\n\n => Array\n(\n => 49.15.220.74\n)\n\n => Array\n(\n => 157.37.221.246\n)\n\n => Array\n(\n => 176.124.233.112\n)\n\n => Array\n(\n => 118.71.167.40\n)\n\n => Array\n(\n => 182.185.213.161\n)\n\n => Array\n(\n => 47.31.79.248\n)\n\n => Array\n(\n => 223.179.238.192\n)\n\n => Array\n(\n => 79.110.128.219\n)\n\n => Array\n(\n => 106.210.42.111\n)\n\n => Array\n(\n => 47.247.214.229\n)\n\n => Array\n(\n => 193.0.220.108\n)\n\n => Array\n(\n => 1.39.206.254\n)\n\n => Array\n(\n => 123.201.77.38\n)\n\n => Array\n(\n => 115.178.207.21\n)\n\n => Array\n(\n => 37.111.202.92\n)\n\n => Array\n(\n => 49.14.179.243\n)\n\n => Array\n(\n => 117.230.145.171\n)\n\n => Array\n(\n => 171.229.242.96\n)\n\n => Array\n(\n => 27.59.174.209\n)\n\n => Array\n(\n => 1.38.202.211\n)\n\n => Array\n(\n => 157.37.128.46\n)\n\n => Array\n(\n => 49.15.94.80\n)\n\n => Array\n(\n => 123.25.46.147\n)\n\n => Array\n(\n => 117.230.170.185\n)\n\n => Array\n(\n => 5.62.16.19\n)\n\n => Array\n(\n => 103.18.22.25\n)\n\n => Array\n(\n => 103.46.200.132\n)\n\n => Array\n(\n => 27.97.165.126\n)\n\n => Array\n(\n => 117.230.54.241\n)\n\n => Array\n(\n => 27.97.209.76\n)\n\n => Array\n(\n => 47.31.182.109\n)\n\n => Array\n(\n => 47.30.223.221\n)\n\n => Array\n(\n => 103.31.94.82\n)\n\n => Array\n(\n => 103.211.14.45\n)\n\n => Array\n(\n => 171.49.233.58\n)\n\n => Array\n(\n => 65.49.126.95\n)\n\n => Array\n(\n => 69.255.101.170\n)\n\n => Array\n(\n => 27.56.224.67\n)\n\n => Array\n(\n => 117.230.146.86\n)\n\n => Array\n(\n => 27.59.154.52\n)\n\n => Array\n(\n => 132.154.114.10\n)\n\n => Array\n(\n => 182.186.77.60\n)\n\n => Array\n(\n => 117.230.136.74\n)\n\n => Array\n(\n => 43.251.94.253\n)\n\n => Array\n(\n => 103.79.168.225\n)\n\n => Array\n(\n => 117.230.56.51\n)\n\n => Array\n(\n => 27.97.187.45\n)\n\n => Array\n(\n => 137.97.190.61\n)\n\n => Array\n(\n => 193.0.220.26\n)\n\n => Array\n(\n => 49.36.137.62\n)\n\n => Array\n(\n => 47.30.189.248\n)\n\n => Array\n(\n => 109.169.23.84\n)\n\n => Array\n(\n => 111.119.185.46\n)\n\n => Array\n(\n => 103.83.148.246\n)\n\n => Array\n(\n => 157.32.119.138\n)\n\n => Array\n(\n => 5.62.41.53\n)\n\n => Array\n(\n => 47.8.243.236\n)\n\n => Array\n(\n => 112.79.158.69\n)\n\n => Array\n(\n => 180.92.148.218\n)\n\n => Array\n(\n => 157.36.162.154\n)\n\n => Array\n(\n => 39.46.114.47\n)\n\n => Array\n(\n => 117.230.173.250\n)\n\n => Array\n(\n => 117.230.155.188\n)\n\n => Array\n(\n => 193.0.220.17\n)\n\n => Array\n(\n => 117.230.171.166\n)\n\n => Array\n(\n => 49.34.59.228\n)\n\n => Array\n(\n => 111.88.197.247\n)\n\n => Array\n(\n => 47.31.156.112\n)\n\n => Array\n(\n => 137.97.64.180\n)\n\n => Array\n(\n => 14.244.227.18\n)\n\n => Array\n(\n => 113.167.158.8\n)\n\n => Array\n(\n => 39.37.175.189\n)\n\n => Array\n(\n => 139.167.211.8\n)\n\n => Array\n(\n => 73.120.85.235\n)\n\n => Array\n(\n => 104.236.195.72\n)\n\n => Array\n(\n => 27.97.190.71\n)\n\n => Array\n(\n => 79.46.170.222\n)\n\n => Array\n(\n => 102.185.244.207\n)\n\n => Array\n(\n => 37.111.136.30\n)\n\n => Array\n(\n => 50.7.93.28\n)\n\n => Array\n(\n => 110.54.251.43\n)\n\n => Array\n(\n => 49.36.143.40\n)\n\n => Array\n(\n => 103.130.112.185\n)\n\n => Array\n(\n => 37.111.139.202\n)\n\n => Array\n(\n => 49.36.139.108\n)\n\n => Array\n(\n => 37.111.136.179\n)\n\n => Array\n(\n => 123.17.165.77\n)\n\n => Array\n(\n => 49.207.143.206\n)\n\n => Array\n(\n => 39.53.80.149\n)\n\n => Array\n(\n => 223.188.71.214\n)\n\n => Array\n(\n => 1.39.222.233\n)\n\n => Array\n(\n => 117.230.9.85\n)\n\n => Array\n(\n => 103.251.245.216\n)\n\n => Array\n(\n => 122.169.133.145\n)\n\n => Array\n(\n => 43.250.165.57\n)\n\n => Array\n(\n => 39.44.13.235\n)\n\n => Array\n(\n => 157.47.181.2\n)\n\n => Array\n(\n => 27.56.203.50\n)\n\n => Array\n(\n => 191.96.97.58\n)\n\n => Array\n(\n => 111.88.107.172\n)\n\n => Array\n(\n => 113.193.198.136\n)\n\n => Array\n(\n => 117.230.172.175\n)\n\n => Array\n(\n => 191.96.182.239\n)\n\n => Array\n(\n => 2.58.46.28\n)\n\n => Array\n(\n => 183.83.253.87\n)\n\n => Array\n(\n => 49.15.139.242\n)\n\n => Array\n(\n => 42.107.220.236\n)\n\n => Array\n(\n => 14.192.53.196\n)\n\n => Array\n(\n => 42.119.212.202\n)\n\n => Array\n(\n => 192.158.234.45\n)\n\n => Array\n(\n => 49.149.102.192\n)\n\n => Array\n(\n => 47.8.170.17\n)\n\n => Array\n(\n => 117.197.13.247\n)\n\n => Array\n(\n => 116.74.34.44\n)\n\n => Array\n(\n => 103.79.249.163\n)\n\n => Array\n(\n => 182.189.95.70\n)\n\n => Array\n(\n => 137.59.218.118\n)\n\n => Array\n(\n => 103.79.170.243\n)\n\n => Array\n(\n => 39.40.54.25\n)\n\n => Array\n(\n => 119.155.40.170\n)\n\n => Array\n(\n => 1.39.212.157\n)\n\n => Array\n(\n => 70.127.59.89\n)\n\n => Array\n(\n => 14.171.22.58\n)\n\n => Array\n(\n => 194.44.167.141\n)\n\n => Array\n(\n => 111.88.179.154\n)\n\n => Array\n(\n => 117.230.140.232\n)\n\n => Array\n(\n => 137.97.96.128\n)\n\n => Array\n(\n => 198.16.66.123\n)\n\n => Array\n(\n => 106.198.44.193\n)\n\n => Array\n(\n => 119.153.45.75\n)\n\n => Array\n(\n => 49.15.242.208\n)\n\n => Array\n(\n => 119.155.241.20\n)\n\n => Array\n(\n => 106.223.109.155\n)\n\n => Array\n(\n => 119.160.119.245\n)\n\n => Array\n(\n => 106.215.81.160\n)\n\n => Array\n(\n => 1.39.192.211\n)\n\n => Array\n(\n => 223.230.35.208\n)\n\n => Array\n(\n => 39.59.4.158\n)\n\n => Array\n(\n => 43.231.57.234\n)\n\n => Array\n(\n => 60.254.78.193\n)\n\n => Array\n(\n => 122.170.224.87\n)\n\n => Array\n(\n => 117.230.22.141\n)\n\n => Array\n(\n => 119.152.107.211\n)\n\n => Array\n(\n => 103.87.192.206\n)\n\n => Array\n(\n => 39.45.244.47\n)\n\n => Array\n(\n => 50.72.141.94\n)\n\n => Array\n(\n => 39.40.6.128\n)\n\n => Array\n(\n => 39.45.180.186\n)\n\n => Array\n(\n => 49.207.131.233\n)\n\n => Array\n(\n => 139.59.69.142\n)\n\n => Array\n(\n => 111.119.187.29\n)\n\n => Array\n(\n => 119.153.40.69\n)\n\n => Array\n(\n => 49.36.133.64\n)\n\n => Array\n(\n => 103.255.4.249\n)\n\n => Array\n(\n => 198.144.154.15\n)\n\n => Array\n(\n => 1.22.46.172\n)\n\n => Array\n(\n => 103.255.5.46\n)\n\n => Array\n(\n => 27.56.195.188\n)\n\n => Array\n(\n => 203.101.167.53\n)\n\n => Array\n(\n => 117.230.62.195\n)\n\n => Array\n(\n => 103.240.194.186\n)\n\n => Array\n(\n => 107.170.166.118\n)\n\n => Array\n(\n => 101.53.245.80\n)\n\n => Array\n(\n => 157.43.13.208\n)\n\n => Array\n(\n => 137.97.100.77\n)\n\n => Array\n(\n => 47.31.150.208\n)\n\n => Array\n(\n => 137.59.222.65\n)\n\n => Array\n(\n => 103.85.127.250\n)\n\n => Array\n(\n => 103.214.119.32\n)\n\n => Array\n(\n => 182.255.49.52\n)\n\n => Array\n(\n => 103.75.247.72\n)\n\n => Array\n(\n => 103.85.125.250\n)\n\n => Array\n(\n => 183.83.253.167\n)\n\n => Array\n(\n => 1.39.222.111\n)\n\n => Array\n(\n => 111.119.185.9\n)\n\n => Array\n(\n => 111.119.187.10\n)\n\n => Array\n(\n => 39.37.147.144\n)\n\n => Array\n(\n => 103.200.198.183\n)\n\n => Array\n(\n => 1.39.222.18\n)\n\n => Array\n(\n => 198.8.80.103\n)\n\n => Array\n(\n => 42.108.1.243\n)\n\n => Array\n(\n => 111.119.187.16\n)\n\n => Array\n(\n => 39.40.241.8\n)\n\n => Array\n(\n => 122.169.150.158\n)\n\n => Array\n(\n => 39.40.215.119\n)\n\n => Array\n(\n => 103.255.5.77\n)\n\n => Array\n(\n => 157.38.108.196\n)\n\n => Array\n(\n => 103.255.4.67\n)\n\n => Array\n(\n => 5.62.60.62\n)\n\n => Array\n(\n => 39.37.146.202\n)\n\n => Array\n(\n => 110.138.6.221\n)\n\n => Array\n(\n => 49.36.143.88\n)\n\n => Array\n(\n => 37.1.215.39\n)\n\n => Array\n(\n => 27.106.59.190\n)\n\n => Array\n(\n => 139.167.139.41\n)\n\n => Array\n(\n => 114.142.166.179\n)\n\n => Array\n(\n => 223.225.240.112\n)\n\n => Array\n(\n => 103.255.5.36\n)\n\n => Array\n(\n => 175.136.1.48\n)\n\n => Array\n(\n => 103.82.80.166\n)\n\n => Array\n(\n => 182.185.196.126\n)\n\n => Array\n(\n => 157.43.45.76\n)\n\n => Array\n(\n => 119.152.132.49\n)\n\n => Array\n(\n => 5.62.62.162\n)\n\n => Array\n(\n => 103.255.4.39\n)\n\n => Array\n(\n => 202.5.144.153\n)\n\n => Array\n(\n => 1.39.223.210\n)\n\n => Array\n(\n => 92.38.176.154\n)\n\n => Array\n(\n => 117.230.186.142\n)\n\n => Array\n(\n => 183.83.39.123\n)\n\n => Array\n(\n => 182.185.156.76\n)\n\n => Array\n(\n => 104.236.74.212\n)\n\n => Array\n(\n => 107.170.145.187\n)\n\n => Array\n(\n => 117.102.7.98\n)\n\n => Array\n(\n => 137.59.220.0\n)\n\n => Array\n(\n => 157.47.222.14\n)\n\n => Array\n(\n => 47.15.206.82\n)\n\n => Array\n(\n => 117.230.159.99\n)\n\n => Array\n(\n => 117.230.175.151\n)\n\n => Array\n(\n => 157.50.97.18\n)\n\n => Array\n(\n => 117.230.47.164\n)\n\n => Array\n(\n => 77.111.244.34\n)\n\n => Array\n(\n => 139.167.189.131\n)\n\n => Array\n(\n => 1.39.204.103\n)\n\n => Array\n(\n => 117.230.58.0\n)\n\n => Array\n(\n => 182.185.226.66\n)\n\n => Array\n(\n => 115.42.70.119\n)\n\n => Array\n(\n => 171.48.114.134\n)\n\n => Array\n(\n => 144.34.218.75\n)\n\n => Array\n(\n => 199.58.164.135\n)\n\n => Array\n(\n => 101.53.228.151\n)\n\n => Array\n(\n => 117.230.50.57\n)\n\n => Array\n(\n => 223.225.138.84\n)\n\n => Array\n(\n => 110.225.67.65\n)\n\n => Array\n(\n => 47.15.200.39\n)\n\n => Array\n(\n => 39.42.20.127\n)\n\n => Array\n(\n => 117.97.241.81\n)\n\n => Array\n(\n => 111.119.185.11\n)\n\n => Array\n(\n => 103.100.5.94\n)\n\n => Array\n(\n => 103.25.137.69\n)\n\n => Array\n(\n => 47.15.197.159\n)\n\n => Array\n(\n => 223.188.176.122\n)\n\n => Array\n(\n => 27.4.175.80\n)\n\n => Array\n(\n => 181.215.43.82\n)\n\n => Array\n(\n => 27.56.228.157\n)\n\n => Array\n(\n => 117.230.19.19\n)\n\n => Array\n(\n => 47.15.208.71\n)\n\n => Array\n(\n => 119.155.21.176\n)\n\n => Array\n(\n => 47.15.234.202\n)\n\n => Array\n(\n => 117.230.144.135\n)\n\n => Array\n(\n => 112.79.139.199\n)\n\n => Array\n(\n => 116.75.246.41\n)\n\n => Array\n(\n => 117.230.177.126\n)\n\n => Array\n(\n => 212.103.48.134\n)\n\n => Array\n(\n => 102.69.228.78\n)\n\n => Array\n(\n => 117.230.37.118\n)\n\n => Array\n(\n => 175.143.61.75\n)\n\n => Array\n(\n => 139.167.56.138\n)\n\n => Array\n(\n => 58.145.189.250\n)\n\n => Array\n(\n => 103.255.5.65\n)\n\n => Array\n(\n => 39.37.153.182\n)\n\n => Array\n(\n => 157.43.85.106\n)\n\n => Array\n(\n => 185.209.178.77\n)\n\n => Array\n(\n => 1.39.212.45\n)\n\n => Array\n(\n => 103.72.7.16\n)\n\n => Array\n(\n => 117.97.185.244\n)\n\n => Array\n(\n => 117.230.59.106\n)\n\n => Array\n(\n => 137.97.121.103\n)\n\n => Array\n(\n => 103.82.123.215\n)\n\n => Array\n(\n => 103.68.217.248\n)\n\n => Array\n(\n => 157.39.27.175\n)\n\n => Array\n(\n => 47.31.100.249\n)\n\n => Array\n(\n => 14.171.232.139\n)\n\n => Array\n(\n => 103.31.93.208\n)\n\n => Array\n(\n => 117.230.56.77\n)\n\n => Array\n(\n => 124.182.25.124\n)\n\n => Array\n(\n => 106.66.191.242\n)\n\n => Array\n(\n => 175.107.237.25\n)\n\n => Array\n(\n => 119.155.1.27\n)\n\n => Array\n(\n => 72.255.6.24\n)\n\n => Array\n(\n => 192.140.152.223\n)\n\n => Array\n(\n => 212.103.48.136\n)\n\n => Array\n(\n => 39.45.134.56\n)\n\n => Array\n(\n => 139.167.173.30\n)\n\n => Array\n(\n => 117.230.63.87\n)\n\n => Array\n(\n => 182.189.95.203\n)\n\n => Array\n(\n => 49.204.183.248\n)\n\n => Array\n(\n => 47.31.125.188\n)\n\n => Array\n(\n => 103.252.171.13\n)\n\n => Array\n(\n => 112.198.74.36\n)\n\n => Array\n(\n => 27.109.113.152\n)\n\n => Array\n(\n => 42.112.233.44\n)\n\n => Array\n(\n => 47.31.68.193\n)\n\n => Array\n(\n => 103.252.171.134\n)\n\n => Array\n(\n => 77.123.32.114\n)\n\n => Array\n(\n => 1.38.189.66\n)\n\n => Array\n(\n => 39.37.181.108\n)\n\n => Array\n(\n => 42.106.44.61\n)\n\n => Array\n(\n => 157.36.8.39\n)\n\n => Array\n(\n => 223.238.41.53\n)\n\n => Array\n(\n => 202.89.77.10\n)\n\n => Array\n(\n => 117.230.150.68\n)\n\n => Array\n(\n => 175.176.87.60\n)\n\n => Array\n(\n => 137.97.117.87\n)\n\n => Array\n(\n => 132.154.123.11\n)\n\n => Array\n(\n => 45.113.124.141\n)\n\n => Array\n(\n => 103.87.56.203\n)\n\n => Array\n(\n => 159.89.171.156\n)\n\n => Array\n(\n => 119.155.53.88\n)\n\n => Array\n(\n => 222.252.107.215\n)\n\n => Array\n(\n => 132.154.75.238\n)\n\n => Array\n(\n => 122.183.41.168\n)\n\n => Array\n(\n => 42.106.254.158\n)\n\n => Array\n(\n => 103.252.171.37\n)\n\n => Array\n(\n => 202.59.13.180\n)\n\n => Array\n(\n => 37.111.139.137\n)\n\n => Array\n(\n => 39.42.93.25\n)\n\n => Array\n(\n => 118.70.177.156\n)\n\n => Array\n(\n => 117.230.148.64\n)\n\n => Array\n(\n => 39.42.15.194\n)\n\n => Array\n(\n => 137.97.176.86\n)\n\n => Array\n(\n => 106.210.102.113\n)\n\n => Array\n(\n => 39.59.84.236\n)\n\n => Array\n(\n => 49.206.187.177\n)\n\n => Array\n(\n => 117.230.133.11\n)\n\n => Array\n(\n => 42.106.253.173\n)\n\n => Array\n(\n => 178.62.102.23\n)\n\n => Array\n(\n => 111.92.76.175\n)\n\n => Array\n(\n => 132.154.86.45\n)\n\n => Array\n(\n => 117.230.128.39\n)\n\n => Array\n(\n => 117.230.53.165\n)\n\n => Array\n(\n => 49.37.200.171\n)\n\n => Array\n(\n => 104.236.213.230\n)\n\n => Array\n(\n => 103.140.30.81\n)\n\n => Array\n(\n => 59.103.104.117\n)\n\n => Array\n(\n => 65.49.126.79\n)\n\n => Array\n(\n => 202.59.12.251\n)\n\n => Array\n(\n => 37.111.136.17\n)\n\n => Array\n(\n => 163.53.85.67\n)\n\n => Array\n(\n => 123.16.240.73\n)\n\n => Array\n(\n => 103.211.14.183\n)\n\n => Array\n(\n => 103.248.93.211\n)\n\n => Array\n(\n => 116.74.59.127\n)\n\n => Array\n(\n => 137.97.169.254\n)\n\n => Array\n(\n => 113.177.79.100\n)\n\n => Array\n(\n => 74.82.60.187\n)\n\n => Array\n(\n => 117.230.157.66\n)\n\n => Array\n(\n => 169.149.194.241\n)\n\n => Array\n(\n => 117.230.156.11\n)\n\n => Array\n(\n => 202.59.12.157\n)\n\n => Array\n(\n => 42.106.181.25\n)\n\n => Array\n(\n => 202.59.13.78\n)\n\n => Array\n(\n => 39.37.153.32\n)\n\n => Array\n(\n => 177.188.216.175\n)\n\n => Array\n(\n => 222.252.53.165\n)\n\n => Array\n(\n => 37.139.23.89\n)\n\n => Array\n(\n => 117.230.139.150\n)\n\n => Array\n(\n => 104.131.176.234\n)\n\n => Array\n(\n => 42.106.181.117\n)\n\n => Array\n(\n => 117.230.180.94\n)\n\n => Array\n(\n => 180.190.171.5\n)\n\n => Array\n(\n => 150.129.165.185\n)\n\n => Array\n(\n => 51.15.0.150\n)\n\n => Array\n(\n => 42.111.4.84\n)\n\n => Array\n(\n => 74.82.60.116\n)\n\n => Array\n(\n => 137.97.121.165\n)\n\n => Array\n(\n => 64.62.187.194\n)\n\n => Array\n(\n => 137.97.106.162\n)\n\n => Array\n(\n => 137.97.92.46\n)\n\n => Array\n(\n => 137.97.170.25\n)\n\n => Array\n(\n => 103.104.192.100\n)\n\n => Array\n(\n => 185.246.211.34\n)\n\n => Array\n(\n => 119.160.96.78\n)\n\n => Array\n(\n => 212.103.48.152\n)\n\n => Array\n(\n => 183.83.153.90\n)\n\n => Array\n(\n => 117.248.150.41\n)\n\n => Array\n(\n => 185.240.246.180\n)\n\n => Array\n(\n => 162.253.131.125\n)\n\n => Array\n(\n => 117.230.153.217\n)\n\n => Array\n(\n => 117.230.169.1\n)\n\n => Array\n(\n => 49.15.138.247\n)\n\n => Array\n(\n => 117.230.37.110\n)\n\n => Array\n(\n => 14.167.188.75\n)\n\n => Array\n(\n => 169.149.239.93\n)\n\n => Array\n(\n => 103.216.176.91\n)\n\n => Array\n(\n => 117.230.12.126\n)\n\n => Array\n(\n => 184.75.209.110\n)\n\n => Array\n(\n => 117.230.6.60\n)\n\n => Array\n(\n => 117.230.135.132\n)\n\n => Array\n(\n => 31.179.29.109\n)\n\n => Array\n(\n => 74.121.188.186\n)\n\n => Array\n(\n => 117.230.35.5\n)\n\n => Array\n(\n => 111.92.74.239\n)\n\n => Array\n(\n => 104.245.144.236\n)\n\n => Array\n(\n => 39.50.22.100\n)\n\n => Array\n(\n => 47.31.190.23\n)\n\n => Array\n(\n => 157.44.73.187\n)\n\n => Array\n(\n => 117.230.8.91\n)\n\n => Array\n(\n => 157.32.18.2\n)\n\n => Array\n(\n => 111.119.187.43\n)\n\n => Array\n(\n => 203.101.185.246\n)\n\n => Array\n(\n => 5.62.34.22\n)\n\n => Array\n(\n => 122.8.143.76\n)\n\n => Array\n(\n => 115.186.2.187\n)\n\n => Array\n(\n => 202.142.110.89\n)\n\n => Array\n(\n => 157.50.61.254\n)\n\n => Array\n(\n => 223.182.211.185\n)\n\n => Array\n(\n => 103.85.125.210\n)\n\n => Array\n(\n => 103.217.133.147\n)\n\n => Array\n(\n => 103.60.196.217\n)\n\n => Array\n(\n => 157.44.238.6\n)\n\n => Array\n(\n => 117.196.225.68\n)\n\n => Array\n(\n => 104.254.92.52\n)\n\n => Array\n(\n => 39.42.46.72\n)\n\n => Array\n(\n => 221.132.119.36\n)\n\n => Array\n(\n => 111.92.77.47\n)\n\n => Array\n(\n => 223.225.19.152\n)\n\n => Array\n(\n => 159.89.121.217\n)\n\n => Array\n(\n => 39.53.221.205\n)\n\n => Array\n(\n => 193.34.217.28\n)\n\n => Array\n(\n => 139.167.206.36\n)\n\n => Array\n(\n => 96.40.10.7\n)\n\n => Array\n(\n => 124.29.198.123\n)\n\n => Array\n(\n => 117.196.226.1\n)\n\n => Array\n(\n => 106.200.85.135\n)\n\n => Array\n(\n => 106.223.180.28\n)\n\n => Array\n(\n => 103.49.232.110\n)\n\n => Array\n(\n => 139.167.208.50\n)\n\n => Array\n(\n => 139.167.201.102\n)\n\n => Array\n(\n => 14.244.224.237\n)\n\n => Array\n(\n => 103.140.31.187\n)\n\n => Array\n(\n => 49.36.134.136\n)\n\n => Array\n(\n => 160.16.61.75\n)\n\n => Array\n(\n => 103.18.22.228\n)\n\n => Array\n(\n => 47.9.74.121\n)\n\n => Array\n(\n => 47.30.216.159\n)\n\n => Array\n(\n => 117.248.150.78\n)\n\n => Array\n(\n => 5.62.34.17\n)\n\n => Array\n(\n => 139.167.247.181\n)\n\n => Array\n(\n => 193.176.84.29\n)\n\n => Array\n(\n => 103.195.201.121\n)\n\n => Array\n(\n => 89.187.175.115\n)\n\n => Array\n(\n => 137.97.81.251\n)\n\n => Array\n(\n => 157.51.147.62\n)\n\n => Array\n(\n => 103.104.192.42\n)\n\n => Array\n(\n => 14.171.235.26\n)\n\n => Array\n(\n => 178.62.89.121\n)\n\n => Array\n(\n => 119.155.4.164\n)\n\n => Array\n(\n => 43.250.241.89\n)\n\n => Array\n(\n => 103.31.100.80\n)\n\n => Array\n(\n => 119.155.7.44\n)\n\n => Array\n(\n => 106.200.73.114\n)\n\n => Array\n(\n => 77.111.246.18\n)\n\n => Array\n(\n => 157.39.99.247\n)\n\n => Array\n(\n => 103.77.42.132\n)\n\n => Array\n(\n => 74.115.214.133\n)\n\n => Array\n(\n => 117.230.49.224\n)\n\n => Array\n(\n => 39.50.108.238\n)\n\n => Array\n(\n => 47.30.221.45\n)\n\n => Array\n(\n => 95.133.164.235\n)\n\n => Array\n(\n => 212.103.48.141\n)\n\n => Array\n(\n => 104.194.218.147\n)\n\n => Array\n(\n => 106.200.88.241\n)\n\n => Array\n(\n => 182.189.212.211\n)\n\n => Array\n(\n => 39.50.142.129\n)\n\n => Array\n(\n => 77.234.43.133\n)\n\n => Array\n(\n => 49.15.192.58\n)\n\n => Array\n(\n => 119.153.37.55\n)\n\n => Array\n(\n => 27.56.156.128\n)\n\n => Array\n(\n => 168.211.4.33\n)\n\n => Array\n(\n => 203.81.236.239\n)\n\n => Array\n(\n => 157.51.149.61\n)\n\n => Array\n(\n => 117.230.45.255\n)\n\n => Array\n(\n => 39.42.106.169\n)\n\n => Array\n(\n => 27.71.89.76\n)\n\n => Array\n(\n => 123.27.109.167\n)\n\n => Array\n(\n => 106.202.21.91\n)\n\n => Array\n(\n => 103.85.125.206\n)\n\n => Array\n(\n => 122.173.250.229\n)\n\n => Array\n(\n => 106.210.102.77\n)\n\n => Array\n(\n => 134.209.47.156\n)\n\n => Array\n(\n => 45.127.232.12\n)\n\n => Array\n(\n => 45.134.224.11\n)\n\n => Array\n(\n => 27.71.89.122\n)\n\n => Array\n(\n => 157.38.105.117\n)\n\n => Array\n(\n => 191.96.73.215\n)\n\n => Array\n(\n => 171.241.92.31\n)\n\n => Array\n(\n => 49.149.104.235\n)\n\n => Array\n(\n => 104.229.247.252\n)\n\n => Array\n(\n => 111.92.78.42\n)\n\n => Array\n(\n => 47.31.88.183\n)\n\n => Array\n(\n => 171.61.203.234\n)\n\n => Array\n(\n => 183.83.226.192\n)\n\n => Array\n(\n => 119.157.107.45\n)\n\n => Array\n(\n => 91.202.163.205\n)\n\n => Array\n(\n => 157.43.62.108\n)\n\n => Array\n(\n => 182.68.248.92\n)\n\n => Array\n(\n => 157.32.251.234\n)\n\n => Array\n(\n => 110.225.196.188\n)\n\n => Array\n(\n => 27.71.89.98\n)\n\n => Array\n(\n => 175.176.87.3\n)\n\n => Array\n(\n => 103.55.90.208\n)\n\n => Array\n(\n => 47.31.41.163\n)\n\n => Array\n(\n => 223.182.195.5\n)\n\n => Array\n(\n => 122.52.101.166\n)\n\n => Array\n(\n => 103.207.82.154\n)\n\n => Array\n(\n => 171.224.178.84\n)\n\n => Array\n(\n => 110.225.235.187\n)\n\n => Array\n(\n => 119.160.97.248\n)\n\n => Array\n(\n => 116.90.101.121\n)\n\n => Array\n(\n => 182.255.48.154\n)\n\n => Array\n(\n => 180.149.221.140\n)\n\n => Array\n(\n => 194.44.79.13\n)\n\n => Array\n(\n => 47.247.18.3\n)\n\n => Array\n(\n => 27.56.242.95\n)\n\n => Array\n(\n => 41.60.236.83\n)\n\n => Array\n(\n => 122.164.162.7\n)\n\n => Array\n(\n => 71.136.154.5\n)\n\n => Array\n(\n => 132.154.119.122\n)\n\n => Array\n(\n => 110.225.80.135\n)\n\n => Array\n(\n => 84.17.61.143\n)\n\n => Array\n(\n => 119.160.102.244\n)\n\n => Array\n(\n => 47.31.27.44\n)\n\n => Array\n(\n => 27.71.89.160\n)\n\n => Array\n(\n => 107.175.38.101\n)\n\n => Array\n(\n => 195.211.150.152\n)\n\n => Array\n(\n => 157.35.250.255\n)\n\n => Array\n(\n => 111.119.187.53\n)\n\n => Array\n(\n => 119.152.97.213\n)\n\n => Array\n(\n => 180.92.143.145\n)\n\n => Array\n(\n => 72.255.61.46\n)\n\n => Array\n(\n => 47.8.183.6\n)\n\n => Array\n(\n => 92.38.148.53\n)\n\n => Array\n(\n => 122.173.194.72\n)\n\n => Array\n(\n => 183.83.226.97\n)\n\n => Array\n(\n => 122.173.73.231\n)\n\n => Array\n(\n => 119.160.101.101\n)\n\n => Array\n(\n => 93.177.75.174\n)\n\n => Array\n(\n => 115.97.196.70\n)\n\n => Array\n(\n => 111.119.187.35\n)\n\n => Array\n(\n => 103.226.226.154\n)\n\n => Array\n(\n => 103.244.172.73\n)\n\n => Array\n(\n => 119.155.61.222\n)\n\n => Array\n(\n => 157.37.184.92\n)\n\n => Array\n(\n => 119.160.103.204\n)\n\n => Array\n(\n => 175.176.87.21\n)\n\n => Array\n(\n => 185.51.228.246\n)\n\n => Array\n(\n => 103.250.164.255\n)\n\n => Array\n(\n => 122.181.194.16\n)\n\n => Array\n(\n => 157.37.230.232\n)\n\n => Array\n(\n => 103.105.236.6\n)\n\n => Array\n(\n => 111.88.128.174\n)\n\n => Array\n(\n => 37.111.139.82\n)\n\n => Array\n(\n => 39.34.133.52\n)\n\n => Array\n(\n => 113.177.79.80\n)\n\n => Array\n(\n => 180.183.71.184\n)\n\n => Array\n(\n => 116.72.218.255\n)\n\n => Array\n(\n => 119.160.117.26\n)\n\n => Array\n(\n => 158.222.0.252\n)\n\n => Array\n(\n => 23.227.142.146\n)\n\n => Array\n(\n => 122.162.152.152\n)\n\n => Array\n(\n => 103.255.149.106\n)\n\n => Array\n(\n => 104.236.53.155\n)\n\n => Array\n(\n => 119.160.119.155\n)\n\n => Array\n(\n => 175.107.214.244\n)\n\n => Array\n(\n => 102.7.116.7\n)\n\n => Array\n(\n => 111.88.91.132\n)\n\n => Array\n(\n => 119.157.248.108\n)\n\n => Array\n(\n => 222.252.36.107\n)\n\n => Array\n(\n => 157.46.209.227\n)\n\n => Array\n(\n => 39.40.54.1\n)\n\n => Array\n(\n => 223.225.19.254\n)\n\n => Array\n(\n => 154.72.150.8\n)\n\n => Array\n(\n => 107.181.177.130\n)\n\n => Array\n(\n => 101.50.75.31\n)\n\n => Array\n(\n => 84.17.58.69\n)\n\n => Array\n(\n => 178.62.5.157\n)\n\n => Array\n(\n => 112.206.175.147\n)\n\n => Array\n(\n => 137.97.113.137\n)\n\n => Array\n(\n => 103.53.44.154\n)\n\n => Array\n(\n => 180.92.143.129\n)\n\n => Array\n(\n => 14.231.223.7\n)\n\n => Array\n(\n => 167.88.63.201\n)\n\n => Array\n(\n => 103.140.204.8\n)\n\n => Array\n(\n => 221.121.135.108\n)\n\n => Array\n(\n => 119.160.97.129\n)\n\n => Array\n(\n => 27.5.168.249\n)\n\n => Array\n(\n => 119.160.102.191\n)\n\n => Array\n(\n => 122.162.219.12\n)\n\n => Array\n(\n => 157.50.141.122\n)\n\n => Array\n(\n => 43.245.8.17\n)\n\n => Array\n(\n => 113.181.198.179\n)\n\n => Array\n(\n => 47.30.221.59\n)\n\n => Array\n(\n => 110.38.29.246\n)\n\n => Array\n(\n => 14.192.140.199\n)\n\n => Array\n(\n => 24.68.10.106\n)\n\n => Array\n(\n => 47.30.209.179\n)\n\n => Array\n(\n => 106.223.123.21\n)\n\n => Array\n(\n => 103.224.48.30\n)\n\n => Array\n(\n => 104.131.19.173\n)\n\n => Array\n(\n => 119.157.100.206\n)\n\n => Array\n(\n => 103.10.226.73\n)\n\n => Array\n(\n => 162.208.51.163\n)\n\n => Array\n(\n => 47.30.221.227\n)\n\n => Array\n(\n => 119.160.116.210\n)\n\n => Array\n(\n => 198.16.78.43\n)\n\n => Array\n(\n => 39.44.201.151\n)\n\n => Array\n(\n => 71.63.181.84\n)\n\n => Array\n(\n => 14.142.192.218\n)\n\n => Array\n(\n => 39.34.147.178\n)\n\n => Array\n(\n => 111.92.75.25\n)\n\n => Array\n(\n => 45.135.239.58\n)\n\n => Array\n(\n => 14.232.235.1\n)\n\n => Array\n(\n => 49.144.100.155\n)\n\n => Array\n(\n => 62.182.99.33\n)\n\n => Array\n(\n => 104.243.212.187\n)\n\n => Array\n(\n => 59.97.132.214\n)\n\n => Array\n(\n => 47.9.15.179\n)\n\n => Array\n(\n => 39.44.103.186\n)\n\n => Array\n(\n => 183.83.241.132\n)\n\n => Array\n(\n => 103.41.24.180\n)\n\n => Array\n(\n => 104.238.46.39\n)\n\n => Array\n(\n => 103.79.170.78\n)\n\n => Array\n(\n => 59.103.138.81\n)\n\n => Array\n(\n => 106.198.191.146\n)\n\n => Array\n(\n => 106.198.255.122\n)\n\n => Array\n(\n => 47.31.46.37\n)\n\n => Array\n(\n => 109.169.23.76\n)\n\n => Array\n(\n => 103.143.7.55\n)\n\n => Array\n(\n => 49.207.114.52\n)\n\n => Array\n(\n => 198.54.106.250\n)\n\n => Array\n(\n => 39.50.64.18\n)\n\n => Array\n(\n => 222.252.48.132\n)\n\n => Array\n(\n => 42.201.186.53\n)\n\n => Array\n(\n => 115.97.198.95\n)\n\n => Array\n(\n => 93.76.134.244\n)\n\n => Array\n(\n => 122.173.15.189\n)\n\n => Array\n(\n => 39.62.38.29\n)\n\n => Array\n(\n => 103.201.145.254\n)\n\n => Array\n(\n => 111.119.187.23\n)\n\n => Array\n(\n => 157.50.66.33\n)\n\n => Array\n(\n => 157.49.68.163\n)\n\n => Array\n(\n => 103.85.125.215\n)\n\n => Array\n(\n => 103.255.4.16\n)\n\n => Array\n(\n => 223.181.246.206\n)\n\n => Array\n(\n => 39.40.109.226\n)\n\n => Array\n(\n => 43.225.70.157\n)\n\n => Array\n(\n => 103.211.18.168\n)\n\n => Array\n(\n => 137.59.221.60\n)\n\n => Array\n(\n => 103.81.214.63\n)\n\n => Array\n(\n => 39.35.163.2\n)\n\n => Array\n(\n => 106.205.124.39\n)\n\n => Array\n(\n => 209.99.165.216\n)\n\n => Array\n(\n => 103.75.247.187\n)\n\n => Array\n(\n => 157.46.217.41\n)\n\n => Array\n(\n => 75.186.73.80\n)\n\n => Array\n(\n => 212.103.48.153\n)\n\n => Array\n(\n => 47.31.61.167\n)\n\n => Array\n(\n => 119.152.145.131\n)\n\n => Array\n(\n => 171.76.177.244\n)\n\n => Array\n(\n => 103.135.78.50\n)\n\n => Array\n(\n => 103.79.170.75\n)\n\n => Array\n(\n => 105.160.22.74\n)\n\n => Array\n(\n => 47.31.20.153\n)\n\n => Array\n(\n => 42.107.204.65\n)\n\n => Array\n(\n => 49.207.131.35\n)\n\n => Array\n(\n => 92.38.148.61\n)\n\n => Array\n(\n => 183.83.255.206\n)\n\n => Array\n(\n => 107.181.177.131\n)\n\n => Array\n(\n => 39.40.220.157\n)\n\n => Array\n(\n => 39.41.133.176\n)\n\n => Array\n(\n => 103.81.214.61\n)\n\n => Array\n(\n => 223.235.108.46\n)\n\n => Array\n(\n => 171.241.52.118\n)\n\n => Array\n(\n => 39.57.138.47\n)\n\n => Array\n(\n => 106.204.196.172\n)\n\n => Array\n(\n => 39.53.228.40\n)\n\n => Array\n(\n => 185.242.5.99\n)\n\n => Array\n(\n => 103.255.5.96\n)\n\n => Array\n(\n => 157.46.212.120\n)\n\n => Array\n(\n => 107.181.177.138\n)\n\n => Array\n(\n => 47.30.193.65\n)\n\n => Array\n(\n => 39.37.178.33\n)\n\n => Array\n(\n => 157.46.173.29\n)\n\n => Array\n(\n => 39.57.238.211\n)\n\n => Array\n(\n => 157.37.245.113\n)\n\n => Array\n(\n => 47.30.201.138\n)\n\n => Array\n(\n => 106.204.193.108\n)\n\n => Array\n(\n => 212.103.50.212\n)\n\n => Array\n(\n => 58.65.221.187\n)\n\n => Array\n(\n => 178.62.92.29\n)\n\n => Array\n(\n => 111.92.77.166\n)\n\n => Array\n(\n => 47.30.223.158\n)\n\n => Array\n(\n => 103.224.54.83\n)\n\n => Array\n(\n => 119.153.43.22\n)\n\n => Array\n(\n => 223.181.126.251\n)\n\n => Array\n(\n => 39.42.175.202\n)\n\n => Array\n(\n => 103.224.54.190\n)\n\n => Array\n(\n => 49.36.141.210\n)\n\n => Array\n(\n => 5.62.63.218\n)\n\n => Array\n(\n => 39.59.9.18\n)\n\n => Array\n(\n => 111.88.86.45\n)\n\n => Array\n(\n => 178.54.139.5\n)\n\n => Array\n(\n => 116.68.105.241\n)\n\n => Array\n(\n => 119.160.96.187\n)\n\n => Array\n(\n => 182.189.192.103\n)\n\n => Array\n(\n => 119.160.96.143\n)\n\n => Array\n(\n => 110.225.89.98\n)\n\n => Array\n(\n => 169.149.195.134\n)\n\n => Array\n(\n => 103.238.104.54\n)\n\n => Array\n(\n => 47.30.208.142\n)\n\n => Array\n(\n => 157.46.179.209\n)\n\n => Array\n(\n => 223.235.38.119\n)\n\n => Array\n(\n => 42.106.180.165\n)\n\n => Array\n(\n => 154.122.240.239\n)\n\n => Array\n(\n => 106.223.104.191\n)\n\n => Array\n(\n => 111.93.110.218\n)\n\n => Array\n(\n => 182.183.161.171\n)\n\n => Array\n(\n => 157.44.184.211\n)\n\n => Array\n(\n => 157.50.185.193\n)\n\n => Array\n(\n => 117.230.19.194\n)\n\n => Array\n(\n => 162.243.246.160\n)\n\n => Array\n(\n => 106.223.143.53\n)\n\n => Array\n(\n => 39.59.41.15\n)\n\n => Array\n(\n => 106.210.65.42\n)\n\n => Array\n(\n => 180.243.144.208\n)\n\n => Array\n(\n => 116.68.105.22\n)\n\n => Array\n(\n => 115.42.70.46\n)\n\n => Array\n(\n => 99.72.192.148\n)\n\n => Array\n(\n => 182.183.182.48\n)\n\n => Array\n(\n => 171.48.58.97\n)\n\n => Array\n(\n => 37.120.131.188\n)\n\n => Array\n(\n => 117.99.167.177\n)\n\n => Array\n(\n => 111.92.76.210\n)\n\n => Array\n(\n => 14.192.144.245\n)\n\n => Array\n(\n => 169.149.242.87\n)\n\n => Array\n(\n => 47.30.198.149\n)\n\n => Array\n(\n => 59.103.57.140\n)\n\n => Array\n(\n => 117.230.161.168\n)\n\n => Array\n(\n => 110.225.88.173\n)\n\n => Array\n(\n => 169.149.246.95\n)\n\n => Array\n(\n => 42.106.180.52\n)\n\n => Array\n(\n => 14.231.160.157\n)\n\n => Array\n(\n => 123.27.109.47\n)\n\n => Array\n(\n => 157.46.130.54\n)\n\n => Array\n(\n => 39.42.73.194\n)\n\n => Array\n(\n => 117.230.18.147\n)\n\n => Array\n(\n => 27.59.231.98\n)\n\n => Array\n(\n => 125.209.78.227\n)\n\n => Array\n(\n => 157.34.80.145\n)\n\n => Array\n(\n => 42.201.251.86\n)\n\n => Array\n(\n => 117.230.129.158\n)\n\n => Array\n(\n => 103.82.80.103\n)\n\n => Array\n(\n => 47.9.171.228\n)\n\n => Array\n(\n => 117.230.24.92\n)\n\n => Array\n(\n => 103.129.143.119\n)\n\n => Array\n(\n => 39.40.213.45\n)\n\n => Array\n(\n => 178.92.188.214\n)\n\n => Array\n(\n => 110.235.232.191\n)\n\n => Array\n(\n => 5.62.34.18\n)\n\n => Array\n(\n => 47.30.212.134\n)\n\n => Array\n(\n => 157.42.34.196\n)\n\n => Array\n(\n => 157.32.169.9\n)\n\n => Array\n(\n => 103.255.4.11\n)\n\n => Array\n(\n => 117.230.13.69\n)\n\n => Array\n(\n => 117.230.58.97\n)\n\n => Array\n(\n => 92.52.138.39\n)\n\n => Array\n(\n => 221.132.119.63\n)\n\n => Array\n(\n => 117.97.167.188\n)\n\n => Array\n(\n => 119.153.56.58\n)\n\n => Array\n(\n => 105.50.22.150\n)\n\n => Array\n(\n => 115.42.68.126\n)\n\n => Array\n(\n => 182.189.223.159\n)\n\n => Array\n(\n => 39.59.36.90\n)\n\n => Array\n(\n => 111.92.76.114\n)\n\n => Array\n(\n => 157.47.226.163\n)\n\n => Array\n(\n => 202.47.44.37\n)\n\n => Array\n(\n => 106.51.234.172\n)\n\n => Array\n(\n => 103.101.88.166\n)\n\n => Array\n(\n => 27.6.246.146\n)\n\n => Array\n(\n => 103.255.5.83\n)\n\n => Array\n(\n => 103.98.210.185\n)\n\n => Array\n(\n => 122.173.114.134\n)\n\n => Array\n(\n => 122.173.77.248\n)\n\n => Array\n(\n => 5.62.41.172\n)\n\n => Array\n(\n => 180.178.181.17\n)\n\n => Array\n(\n => 37.120.133.224\n)\n\n => Array\n(\n => 45.131.5.156\n)\n\n => Array\n(\n => 110.39.100.110\n)\n\n => Array\n(\n => 176.110.38.185\n)\n\n => Array\n(\n => 36.255.41.64\n)\n\n => Array\n(\n => 103.104.192.15\n)\n\n => Array\n(\n => 43.245.131.195\n)\n\n => Array\n(\n => 14.248.111.185\n)\n\n => Array\n(\n => 122.173.217.133\n)\n\n => Array\n(\n => 106.223.90.245\n)\n\n => Array\n(\n => 119.153.56.80\n)\n\n => Array\n(\n => 103.7.60.172\n)\n\n => Array\n(\n => 157.46.184.233\n)\n\n => Array\n(\n => 182.190.31.95\n)\n\n => Array\n(\n => 109.87.189.122\n)\n\n => Array\n(\n => 91.74.25.100\n)\n\n => Array\n(\n => 182.185.224.144\n)\n\n => Array\n(\n => 106.223.91.221\n)\n\n => Array\n(\n => 182.190.223.40\n)\n\n => Array\n(\n => 2.58.194.134\n)\n\n => Array\n(\n => 196.246.225.236\n)\n\n => Array\n(\n => 106.223.90.173\n)\n\n => Array\n(\n => 23.239.16.54\n)\n\n => Array\n(\n => 157.46.65.225\n)\n\n => Array\n(\n => 115.186.130.14\n)\n\n => Array\n(\n => 103.85.125.157\n)\n\n => Array\n(\n => 14.248.103.6\n)\n\n => Array\n(\n => 123.24.169.247\n)\n\n => Array\n(\n => 103.130.108.153\n)\n\n => Array\n(\n => 115.42.67.21\n)\n\n => Array\n(\n => 202.166.171.190\n)\n\n => Array\n(\n => 39.37.169.104\n)\n\n => Array\n(\n => 103.82.80.59\n)\n\n => Array\n(\n => 175.107.208.58\n)\n\n => Array\n(\n => 203.192.238.247\n)\n\n => Array\n(\n => 103.217.178.150\n)\n\n => Array\n(\n => 103.66.214.173\n)\n\n => Array\n(\n => 110.93.236.174\n)\n\n => Array\n(\n => 143.189.242.64\n)\n\n => Array\n(\n => 77.111.245.12\n)\n\n => Array\n(\n => 145.239.2.231\n)\n\n => Array\n(\n => 115.186.190.38\n)\n\n => Array\n(\n => 109.169.23.67\n)\n\n => Array\n(\n => 198.16.70.29\n)\n\n => Array\n(\n => 111.92.76.186\n)\n\n => Array\n(\n => 115.42.69.34\n)\n\n => Array\n(\n => 73.61.100.95\n)\n\n => Array\n(\n => 103.129.142.31\n)\n\n => Array\n(\n => 103.255.5.53\n)\n\n => Array\n(\n => 103.76.55.2\n)\n\n => Array\n(\n => 47.9.141.138\n)\n\n => Array\n(\n => 103.55.89.234\n)\n\n => Array\n(\n => 103.223.13.53\n)\n\n => Array\n(\n => 175.158.50.203\n)\n\n => Array\n(\n => 103.255.5.90\n)\n\n => Array\n(\n => 106.223.100.138\n)\n\n => Array\n(\n => 39.37.143.193\n)\n\n => Array\n(\n => 206.189.133.131\n)\n\n => Array\n(\n => 43.224.0.233\n)\n\n => Array\n(\n => 115.186.132.106\n)\n\n => Array\n(\n => 31.43.21.159\n)\n\n => Array\n(\n => 119.155.56.131\n)\n\n => Array\n(\n => 103.82.80.138\n)\n\n => Array\n(\n => 24.87.128.119\n)\n\n => Array\n(\n => 106.210.103.163\n)\n\n => Array\n(\n => 103.82.80.90\n)\n\n => Array\n(\n => 157.46.186.45\n)\n\n => Array\n(\n => 157.44.155.238\n)\n\n => Array\n(\n => 103.119.199.2\n)\n\n => Array\n(\n => 27.97.169.205\n)\n\n => Array\n(\n => 157.46.174.89\n)\n\n => Array\n(\n => 43.250.58.220\n)\n\n => Array\n(\n => 76.189.186.64\n)\n\n => Array\n(\n => 103.255.5.57\n)\n\n => Array\n(\n => 171.61.196.136\n)\n\n => Array\n(\n => 202.47.40.88\n)\n\n => Array\n(\n => 97.118.94.116\n)\n\n => Array\n(\n => 157.44.124.157\n)\n\n => Array\n(\n => 95.142.120.13\n)\n\n => Array\n(\n => 42.201.229.151\n)\n\n => Array\n(\n => 157.46.178.95\n)\n\n => Array\n(\n => 169.149.215.192\n)\n\n => Array\n(\n => 42.111.19.48\n)\n\n => Array\n(\n => 1.38.52.18\n)\n\n => Array\n(\n => 145.239.91.241\n)\n\n => Array\n(\n => 47.31.78.191\n)\n\n => Array\n(\n => 103.77.42.60\n)\n\n => Array\n(\n => 157.46.107.144\n)\n\n => Array\n(\n => 157.46.125.124\n)\n\n => Array\n(\n => 110.225.218.108\n)\n\n => Array\n(\n => 106.51.77.185\n)\n\n => Array\n(\n => 123.24.161.207\n)\n\n => Array\n(\n => 106.210.108.22\n)\n\n => Array\n(\n => 42.111.10.14\n)\n\n => Array\n(\n => 223.29.231.175\n)\n\n => Array\n(\n => 27.56.152.132\n)\n\n => Array\n(\n => 119.155.31.100\n)\n\n => Array\n(\n => 122.173.172.127\n)\n\n => Array\n(\n => 103.77.42.64\n)\n\n => Array\n(\n => 157.44.164.106\n)\n\n => Array\n(\n => 14.181.53.38\n)\n\n => Array\n(\n => 115.42.67.64\n)\n\n => Array\n(\n => 47.31.33.140\n)\n\n => Array\n(\n => 103.15.60.234\n)\n\n => Array\n(\n => 182.64.219.181\n)\n\n => Array\n(\n => 103.44.51.6\n)\n\n => Array\n(\n => 116.74.25.157\n)\n\n => Array\n(\n => 116.71.2.128\n)\n\n => Array\n(\n => 157.32.185.239\n)\n\n => Array\n(\n => 47.31.25.79\n)\n\n => Array\n(\n => 178.62.85.75\n)\n\n => Array\n(\n => 180.178.190.39\n)\n\n => Array\n(\n => 39.48.52.179\n)\n\n => Array\n(\n => 106.193.11.240\n)\n\n => Array\n(\n => 103.82.80.226\n)\n\n => Array\n(\n => 49.206.126.30\n)\n\n => Array\n(\n => 157.245.191.173\n)\n\n => Array\n(\n => 49.205.84.237\n)\n\n => Array\n(\n => 47.8.181.232\n)\n\n => Array\n(\n => 182.66.2.92\n)\n\n => Array\n(\n => 49.34.137.220\n)\n\n => Array\n(\n => 209.205.217.125\n)\n\n => Array\n(\n => 192.64.5.73\n)\n\n => Array\n(\n => 27.63.166.108\n)\n\n => Array\n(\n => 120.29.96.211\n)\n\n => Array\n(\n => 182.186.112.135\n)\n\n => Array\n(\n => 45.118.165.151\n)\n\n => Array\n(\n => 47.8.228.12\n)\n\n => Array\n(\n => 106.215.3.162\n)\n\n => Array\n(\n => 111.92.72.66\n)\n\n => Array\n(\n => 169.145.2.9\n)\n\n => Array\n(\n => 106.207.205.100\n)\n\n => Array\n(\n => 223.181.8.12\n)\n\n => Array\n(\n => 157.48.149.78\n)\n\n => Array\n(\n => 103.206.138.116\n)\n\n => Array\n(\n => 39.53.119.22\n)\n\n => Array\n(\n => 157.33.232.106\n)\n\n => Array\n(\n => 49.37.205.139\n)\n\n => Array\n(\n => 115.42.68.3\n)\n\n => Array\n(\n => 93.72.182.251\n)\n\n => Array\n(\n => 202.142.166.22\n)\n\n => Array\n(\n => 157.119.81.111\n)\n\n => Array\n(\n => 182.186.116.155\n)\n\n => Array\n(\n => 157.37.171.37\n)\n\n => Array\n(\n => 117.206.164.48\n)\n\n => Array\n(\n => 49.36.52.63\n)\n\n => Array\n(\n => 203.175.72.112\n)\n\n => Array\n(\n => 171.61.132.193\n)\n\n => Array\n(\n => 111.119.187.44\n)\n\n => Array\n(\n => 39.37.165.216\n)\n\n => Array\n(\n => 103.86.109.58\n)\n\n => Array\n(\n => 39.59.2.86\n)\n\n => Array\n(\n => 111.119.187.28\n)\n\n => Array\n(\n => 106.201.9.10\n)\n\n => Array\n(\n => 49.35.25.106\n)\n\n => Array\n(\n => 157.49.239.103\n)\n\n => Array\n(\n => 157.49.237.198\n)\n\n => Array\n(\n => 14.248.64.121\n)\n\n => Array\n(\n => 117.102.7.214\n)\n\n => Array\n(\n => 120.29.91.246\n)\n\n => Array\n(\n => 103.7.79.41\n)\n\n => Array\n(\n => 132.154.99.209\n)\n\n => Array\n(\n => 212.36.27.245\n)\n\n => Array\n(\n => 157.44.154.9\n)\n\n => Array\n(\n => 47.31.56.44\n)\n\n => Array\n(\n => 192.142.199.136\n)\n\n => Array\n(\n => 171.61.159.49\n)\n\n => Array\n(\n => 119.160.116.151\n)\n\n => Array\n(\n => 103.98.63.39\n)\n\n => Array\n(\n => 41.60.233.216\n)\n\n => Array\n(\n => 49.36.75.212\n)\n\n => Array\n(\n => 223.188.60.20\n)\n\n => Array\n(\n => 103.98.63.50\n)\n\n => Array\n(\n => 178.162.198.21\n)\n\n => Array\n(\n => 157.46.209.35\n)\n\n => Array\n(\n => 119.155.32.151\n)\n\n => Array\n(\n => 102.185.58.161\n)\n\n => Array\n(\n => 59.96.89.231\n)\n\n => Array\n(\n => 119.155.255.198\n)\n\n => Array\n(\n => 42.107.204.57\n)\n\n => Array\n(\n => 42.106.181.74\n)\n\n => Array\n(\n => 157.46.219.186\n)\n\n => Array\n(\n => 115.42.71.49\n)\n\n => Array\n(\n => 157.46.209.131\n)\n\n => Array\n(\n => 220.81.15.94\n)\n\n => Array\n(\n => 111.119.187.24\n)\n\n => Array\n(\n => 49.37.195.185\n)\n\n => Array\n(\n => 42.106.181.85\n)\n\n => Array\n(\n => 43.249.225.134\n)\n\n => Array\n(\n => 117.206.165.151\n)\n\n => Array\n(\n => 119.153.48.250\n)\n\n => Array\n(\n => 27.4.172.162\n)\n\n => Array\n(\n => 117.20.29.51\n)\n\n => Array\n(\n => 103.98.63.135\n)\n\n => Array\n(\n => 117.7.218.229\n)\n\n => Array\n(\n => 157.49.233.105\n)\n\n => Array\n(\n => 39.53.151.199\n)\n\n => Array\n(\n => 101.255.118.33\n)\n\n => Array\n(\n => 41.141.246.9\n)\n\n => Array\n(\n => 221.132.113.78\n)\n\n => Array\n(\n => 119.160.116.202\n)\n\n => Array\n(\n => 117.237.193.244\n)\n\n => Array\n(\n => 157.41.110.145\n)\n\n => Array\n(\n => 103.98.63.5\n)\n\n => Array\n(\n => 103.125.129.58\n)\n\n => Array\n(\n => 183.83.254.66\n)\n\n => Array\n(\n => 45.135.236.160\n)\n\n => Array\n(\n => 198.199.87.124\n)\n\n => Array\n(\n => 193.176.86.41\n)\n\n => Array\n(\n => 115.97.142.98\n)\n\n => Array\n(\n => 222.252.38.198\n)\n\n => Array\n(\n => 110.93.237.49\n)\n\n => Array\n(\n => 103.224.48.122\n)\n\n => Array\n(\n => 110.38.28.130\n)\n\n => Array\n(\n => 106.211.238.154\n)\n\n => Array\n(\n => 111.88.41.73\n)\n\n => Array\n(\n => 119.155.13.143\n)\n\n => Array\n(\n => 103.213.111.60\n)\n\n => Array\n(\n => 202.0.103.42\n)\n\n => Array\n(\n => 157.48.144.33\n)\n\n => Array\n(\n => 111.119.187.62\n)\n\n => Array\n(\n => 103.87.212.71\n)\n\n => Array\n(\n => 157.37.177.20\n)\n\n => Array\n(\n => 223.233.71.92\n)\n\n => Array\n(\n => 116.213.32.107\n)\n\n => Array\n(\n => 104.248.173.151\n)\n\n => Array\n(\n => 14.181.102.222\n)\n\n => Array\n(\n => 103.10.224.252\n)\n\n => Array\n(\n => 175.158.50.57\n)\n\n => Array\n(\n => 165.22.122.199\n)\n\n => Array\n(\n => 23.106.56.12\n)\n\n => Array\n(\n => 203.122.10.146\n)\n\n => Array\n(\n => 37.111.136.138\n)\n\n => Array\n(\n => 103.87.193.66\n)\n\n => Array\n(\n => 39.59.122.246\n)\n\n => Array\n(\n => 111.119.183.63\n)\n\n => Array\n(\n => 157.46.72.102\n)\n\n => Array\n(\n => 185.132.133.82\n)\n\n => Array\n(\n => 118.103.230.148\n)\n\n => Array\n(\n => 5.62.39.45\n)\n\n => Array\n(\n => 119.152.144.134\n)\n\n => Array\n(\n => 172.105.117.102\n)\n\n => Array\n(\n => 122.254.70.212\n)\n\n => Array\n(\n => 102.185.128.97\n)\n\n => Array\n(\n => 182.69.249.11\n)\n\n => Array\n(\n => 105.163.134.167\n)\n\n => Array\n(\n => 111.119.187.38\n)\n\n => Array\n(\n => 103.46.195.93\n)\n\n => Array\n(\n => 106.204.161.156\n)\n\n => Array\n(\n => 122.176.2.175\n)\n\n => Array\n(\n => 117.99.162.31\n)\n\n => Array\n(\n => 106.212.241.242\n)\n\n => Array\n(\n => 42.107.196.149\n)\n\n => Array\n(\n => 212.90.60.57\n)\n\n => Array\n(\n => 175.107.237.12\n)\n\n => Array\n(\n => 157.46.119.152\n)\n\n => Array\n(\n => 157.34.81.12\n)\n\n => Array\n(\n => 162.243.1.22\n)\n\n => Array\n(\n => 110.37.222.178\n)\n\n => Array\n(\n => 103.46.195.68\n)\n\n => Array\n(\n => 119.160.116.81\n)\n\n => Array\n(\n => 138.197.131.28\n)\n\n => Array\n(\n => 103.88.218.124\n)\n\n => Array\n(\n => 192.241.172.113\n)\n\n => Array\n(\n => 110.39.174.106\n)\n\n => Array\n(\n => 111.88.48.17\n)\n\n => Array\n(\n => 42.108.160.218\n)\n\n => Array\n(\n => 117.102.0.16\n)\n\n => Array\n(\n => 157.46.125.235\n)\n\n => Array\n(\n => 14.190.242.251\n)\n\n => Array\n(\n => 47.31.184.64\n)\n\n => Array\n(\n => 49.205.84.157\n)\n\n => Array\n(\n => 122.162.115.247\n)\n\n => Array\n(\n => 41.202.219.74\n)\n\n => Array\n(\n => 106.215.9.67\n)\n\n => Array\n(\n => 103.87.56.208\n)\n\n => Array\n(\n => 103.46.194.147\n)\n\n => Array\n(\n => 116.90.98.81\n)\n\n => Array\n(\n => 115.42.71.213\n)\n\n => Array\n(\n => 39.49.35.192\n)\n\n => Array\n(\n => 41.202.219.65\n)\n\n => Array\n(\n => 131.212.249.93\n)\n\n => Array\n(\n => 49.205.16.251\n)\n\n => Array\n(\n => 39.34.147.250\n)\n\n => Array\n(\n => 183.83.210.185\n)\n\n => Array\n(\n => 49.37.194.215\n)\n\n => Array\n(\n => 103.46.194.108\n)\n\n => Array\n(\n => 89.36.219.233\n)\n\n => Array\n(\n => 119.152.105.178\n)\n\n => Array\n(\n => 202.47.45.125\n)\n\n => Array\n(\n => 156.146.59.27\n)\n\n => Array\n(\n => 132.154.21.156\n)\n\n => Array\n(\n => 157.44.35.31\n)\n\n => Array\n(\n => 41.80.118.124\n)\n\n => Array\n(\n => 47.31.159.198\n)\n\n => Array\n(\n => 103.209.223.140\n)\n\n => Array\n(\n => 157.46.130.138\n)\n\n => Array\n(\n => 49.37.199.246\n)\n\n => Array\n(\n => 111.88.242.10\n)\n\n => Array\n(\n => 43.241.145.110\n)\n\n => Array\n(\n => 124.153.16.30\n)\n\n => Array\n(\n => 27.5.22.173\n)\n\n => Array\n(\n => 111.88.191.173\n)\n\n => Array\n(\n => 41.60.236.200\n)\n\n => Array\n(\n => 115.42.67.146\n)\n\n => Array\n(\n => 150.242.173.7\n)\n\n => Array\n(\n => 14.248.71.23\n)\n\n => Array\n(\n => 111.119.187.4\n)\n\n => Array\n(\n => 124.29.212.118\n)\n\n => Array\n(\n => 51.68.205.163\n)\n\n => Array\n(\n => 182.184.107.63\n)\n\n => Array\n(\n => 106.211.253.87\n)\n\n => Array\n(\n => 223.190.89.5\n)\n\n => Array\n(\n => 183.83.212.63\n)\n\n => Array\n(\n => 129.205.113.227\n)\n\n => Array\n(\n => 106.210.40.141\n)\n\n => Array\n(\n => 91.202.163.169\n)\n\n => Array\n(\n => 76.105.191.89\n)\n\n => Array\n(\n => 171.51.244.160\n)\n\n => Array\n(\n => 37.139.188.92\n)\n\n => Array\n(\n => 23.106.56.37\n)\n\n => Array\n(\n => 157.44.175.180\n)\n\n => Array\n(\n => 122.2.122.97\n)\n\n => Array\n(\n => 103.87.192.194\n)\n\n => Array\n(\n => 192.154.253.6\n)\n\n => Array\n(\n => 77.243.191.19\n)\n\n => Array\n(\n => 122.254.70.46\n)\n\n => Array\n(\n => 154.76.233.73\n)\n\n => Array\n(\n => 195.181.167.150\n)\n\n => Array\n(\n => 209.209.228.5\n)\n\n => Array\n(\n => 203.192.212.115\n)\n\n => Array\n(\n => 221.132.118.179\n)\n\n => Array\n(\n => 117.208.210.204\n)\n\n => Array\n(\n => 120.29.90.126\n)\n\n => Array\n(\n => 36.77.239.190\n)\n\n => Array\n(\n => 157.37.137.127\n)\n\n => Array\n(\n => 39.40.243.6\n)\n\n => Array\n(\n => 182.182.41.201\n)\n\n => Array\n(\n => 39.59.32.46\n)\n\n => Array\n(\n => 111.119.183.36\n)\n\n => Array\n(\n => 103.83.147.61\n)\n\n => Array\n(\n => 103.82.80.85\n)\n\n => Array\n(\n => 103.46.194.161\n)\n\n => Array\n(\n => 101.50.105.38\n)\n\n => Array\n(\n => 111.119.183.58\n)\n\n => Array\n(\n => 47.9.234.51\n)\n\n => Array\n(\n => 120.29.86.157\n)\n\n => Array\n(\n => 175.158.50.70\n)\n\n => Array\n(\n => 112.196.163.235\n)\n\n => Array\n(\n => 139.167.161.85\n)\n\n => Array\n(\n => 106.207.39.181\n)\n\n => Array\n(\n => 103.77.42.159\n)\n\n => Array\n(\n => 185.56.138.220\n)\n\n => Array\n(\n => 119.155.33.205\n)\n\n => Array\n(\n => 157.42.117.124\n)\n\n => Array\n(\n => 103.117.202.202\n)\n\n => Array\n(\n => 220.253.101.109\n)\n\n => Array\n(\n => 49.37.7.247\n)\n\n => Array\n(\n => 119.160.65.27\n)\n\n => Array\n(\n => 114.122.21.151\n)\n\n => Array\n(\n => 157.44.141.83\n)\n\n => Array\n(\n => 103.131.9.7\n)\n\n => Array\n(\n => 125.99.222.21\n)\n\n => Array\n(\n => 103.238.104.206\n)\n\n => Array\n(\n => 110.93.227.100\n)\n\n => Array\n(\n => 49.14.119.114\n)\n\n => Array\n(\n => 115.186.189.82\n)\n\n => Array\n(\n => 106.201.194.2\n)\n\n => Array\n(\n => 106.204.227.28\n)\n\n => Array\n(\n => 47.31.206.13\n)\n\n => Array\n(\n => 39.42.144.109\n)\n\n => Array\n(\n => 14.253.254.90\n)\n\n => Array\n(\n => 157.44.142.118\n)\n\n => Array\n(\n => 192.142.176.21\n)\n\n => Array\n(\n => 103.217.178.225\n)\n\n => Array\n(\n => 106.78.78.16\n)\n\n => Array\n(\n => 167.71.63.184\n)\n\n => Array\n(\n => 207.244.71.82\n)\n\n => Array\n(\n => 71.105.25.145\n)\n\n => Array\n(\n => 39.51.250.30\n)\n\n => Array\n(\n => 157.41.120.160\n)\n\n => Array\n(\n => 39.37.137.81\n)\n\n => Array\n(\n => 41.80.237.27\n)\n\n => Array\n(\n => 111.119.187.50\n)\n\n => Array\n(\n => 49.145.224.252\n)\n\n => Array\n(\n => 106.197.28.106\n)\n\n => Array\n(\n => 103.217.178.240\n)\n\n => Array\n(\n => 27.97.182.237\n)\n\n => Array\n(\n => 106.211.253.72\n)\n\n => Array\n(\n => 119.152.154.172\n)\n\n => Array\n(\n => 103.255.151.148\n)\n\n => Array\n(\n => 154.157.80.12\n)\n\n => Array\n(\n => 156.146.59.28\n)\n\n => Array\n(\n => 171.61.211.64\n)\n\n => Array\n(\n => 27.76.59.22\n)\n\n => Array\n(\n => 167.99.92.124\n)\n\n => Array\n(\n => 132.154.94.51\n)\n\n => Array\n(\n => 111.119.183.38\n)\n\n => Array\n(\n => 115.42.70.169\n)\n\n => Array\n(\n => 109.169.23.83\n)\n\n => Array\n(\n => 157.46.213.64\n)\n\n => Array\n(\n => 39.37.179.171\n)\n\n => Array\n(\n => 14.232.233.32\n)\n\n => Array\n(\n => 157.49.226.13\n)\n\n => Array\n(\n => 185.209.178.78\n)\n\n => Array\n(\n => 222.252.46.230\n)\n\n => Array\n(\n => 139.5.255.168\n)\n\n => Array\n(\n => 202.8.118.12\n)\n\n => Array\n(\n => 39.53.205.63\n)\n\n => Array\n(\n => 157.37.167.227\n)\n\n => Array\n(\n => 157.49.237.121\n)\n\n => Array\n(\n => 208.89.99.6\n)\n\n => Array\n(\n => 111.119.187.33\n)\n\n => Array\n(\n => 39.37.132.101\n)\n\n => Array\n(\n => 72.255.61.15\n)\n\n => Array\n(\n => 157.41.69.126\n)\n\n => Array\n(\n => 27.6.193.15\n)\n\n => Array\n(\n => 157.41.104.8\n)\n\n => Array\n(\n => 157.41.97.162\n)\n\n => Array\n(\n => 95.136.91.67\n)\n\n => Array\n(\n => 110.93.209.138\n)\n\n => Array\n(\n => 119.152.154.82\n)\n\n => Array\n(\n => 111.88.239.223\n)\n\n => Array\n(\n => 157.230.62.100\n)\n\n => Array\n(\n => 37.111.136.167\n)\n\n => Array\n(\n => 139.167.162.65\n)\n\n => Array\n(\n => 120.29.72.72\n)\n\n => Array\n(\n => 39.42.169.69\n)\n\n => Array\n(\n => 157.49.247.12\n)\n\n => Array\n(\n => 43.231.58.221\n)\n\n => Array\n(\n => 111.88.229.18\n)\n\n => Array\n(\n => 171.79.185.198\n)\n\n => Array\n(\n => 169.149.193.102\n)\n\n => Array\n(\n => 207.244.89.162\n)\n\n => Array\n(\n => 27.4.217.129\n)\n\n => Array\n(\n => 91.236.184.12\n)\n\n => Array\n(\n => 14.192.154.150\n)\n\n => Array\n(\n => 167.172.55.253\n)\n\n => Array\n(\n => 103.77.42.192\n)\n\n => Array\n(\n => 39.59.122.140\n)\n\n => Array\n(\n => 41.80.84.46\n)\n\n => Array\n(\n => 202.47.52.115\n)\n\n => Array\n(\n => 222.252.43.47\n)\n\n => Array\n(\n => 119.155.37.250\n)\n\n => Array\n(\n => 157.41.18.88\n)\n\n => Array\n(\n => 39.42.8.59\n)\n\n => Array\n(\n => 39.45.162.110\n)\n\n => Array\n(\n => 111.88.237.25\n)\n\n => Array\n(\n => 103.76.211.168\n)\n\n => Array\n(\n => 178.137.114.165\n)\n\n => Array\n(\n => 43.225.74.146\n)\n\n => Array\n(\n => 157.42.25.26\n)\n\n => Array\n(\n => 137.59.146.63\n)\n\n => Array\n(\n => 119.160.117.190\n)\n\n => Array\n(\n => 1.186.181.133\n)\n\n => Array\n(\n => 39.42.145.94\n)\n\n => Array\n(\n => 203.175.73.96\n)\n\n => Array\n(\n => 39.37.160.14\n)\n\n => Array\n(\n => 157.39.123.250\n)\n\n => Array\n(\n => 95.135.57.82\n)\n\n => Array\n(\n => 162.210.194.35\n)\n\n => Array\n(\n => 39.42.153.135\n)\n\n => Array\n(\n => 118.103.230.106\n)\n\n => Array\n(\n => 108.61.39.115\n)\n\n => Array\n(\n => 102.7.108.45\n)\n\n => Array\n(\n => 183.83.138.134\n)\n\n => Array\n(\n => 115.186.70.223\n)\n\n => Array\n(\n => 157.34.17.139\n)\n\n => Array\n(\n => 122.166.158.231\n)\n\n => Array\n(\n => 43.227.135.90\n)\n\n => Array\n(\n => 182.68.46.180\n)\n\n => Array\n(\n => 223.225.28.138\n)\n\n => Array\n(\n => 103.77.42.220\n)\n\n => Array\n(\n => 192.241.219.13\n)\n\n => Array\n(\n => 103.82.80.113\n)\n\n => Array\n(\n => 42.111.243.151\n)\n\n => Array\n(\n => 171.79.189.247\n)\n\n => Array\n(\n => 157.32.132.102\n)\n\n => Array\n(\n => 103.130.105.243\n)\n\n => Array\n(\n => 117.223.98.120\n)\n\n => Array\n(\n => 106.215.197.187\n)\n\n => Array\n(\n => 182.190.194.179\n)\n\n => Array\n(\n => 223.225.29.42\n)\n\n => Array\n(\n => 117.222.94.151\n)\n\n => Array\n(\n => 182.185.199.104\n)\n\n => Array\n(\n => 49.36.145.77\n)\n\n => Array\n(\n => 103.82.80.73\n)\n\n => Array\n(\n => 103.77.16.13\n)\n\n => Array\n(\n => 221.132.118.86\n)\n\n => Array\n(\n => 202.47.45.77\n)\n\n => Array\n(\n => 202.8.118.116\n)\n\n => Array\n(\n => 42.106.180.185\n)\n\n => Array\n(\n => 203.122.8.234\n)\n\n => Array\n(\n => 88.230.104.245\n)\n\n => Array\n(\n => 103.131.9.33\n)\n\n => Array\n(\n => 117.207.209.60\n)\n\n => Array\n(\n => 42.111.253.227\n)\n\n => Array\n(\n => 23.106.56.54\n)\n\n => Array\n(\n => 122.178.143.181\n)\n\n => Array\n(\n => 111.88.180.5\n)\n\n => Array\n(\n => 174.55.224.161\n)\n\n => Array\n(\n => 49.205.87.100\n)\n\n => Array\n(\n => 49.34.183.118\n)\n\n => Array\n(\n => 124.155.255.154\n)\n\n => Array\n(\n => 106.212.135.200\n)\n\n => Array\n(\n => 139.99.159.11\n)\n\n => Array\n(\n => 45.135.229.8\n)\n\n => Array\n(\n => 88.230.106.85\n)\n\n => Array\n(\n => 91.153.145.221\n)\n\n => Array\n(\n => 103.95.83.33\n)\n\n => Array\n(\n => 122.178.116.76\n)\n\n => Array\n(\n => 103.135.78.14\n)\n\n => Array\n(\n => 111.88.233.206\n)\n\n => Array\n(\n => 192.140.153.210\n)\n\n => Array\n(\n => 202.8.118.69\n)\n\n => Array\n(\n => 103.83.130.81\n)\n\n => Array\n(\n => 182.190.213.143\n)\n\n => Array\n(\n => 198.16.74.204\n)\n\n => Array\n(\n => 101.128.117.248\n)\n\n => Array\n(\n => 103.108.5.147\n)\n\n => Array\n(\n => 157.32.130.158\n)\n\n => Array\n(\n => 103.244.172.93\n)\n\n => Array\n(\n => 47.30.140.126\n)\n\n => Array\n(\n => 223.188.40.124\n)\n\n => Array\n(\n => 157.44.191.102\n)\n\n => Array\n(\n => 41.60.237.62\n)\n\n => Array\n(\n => 47.31.228.161\n)\n\n => Array\n(\n => 137.59.217.188\n)\n\n => Array\n(\n => 39.53.220.237\n)\n\n => Array\n(\n => 45.127.45.199\n)\n\n => Array\n(\n => 14.190.71.19\n)\n\n => Array\n(\n => 47.18.205.54\n)\n\n => Array\n(\n => 110.93.240.11\n)\n\n => Array\n(\n => 134.209.29.111\n)\n\n => Array\n(\n => 49.36.175.104\n)\n\n => Array\n(\n => 203.192.230.61\n)\n\n => Array\n(\n => 176.10.125.115\n)\n\n => Array\n(\n => 182.18.206.17\n)\n\n => Array\n(\n => 103.87.194.102\n)\n\n => Array\n(\n => 171.79.123.106\n)\n\n => Array\n(\n => 45.116.233.35\n)\n\n => Array\n(\n => 223.190.57.225\n)\n\n => Array\n(\n => 114.125.6.158\n)\n\n => Array\n(\n => 223.179.138.176\n)\n\n => Array\n(\n => 111.119.183.61\n)\n\n => Array\n(\n => 202.8.118.43\n)\n\n => Array\n(\n => 157.51.175.216\n)\n\n => Array\n(\n => 41.60.238.100\n)\n\n => Array\n(\n => 117.207.210.199\n)\n\n => Array\n(\n => 111.119.183.26\n)\n\n => Array\n(\n => 103.252.226.12\n)\n\n => Array\n(\n => 103.221.208.82\n)\n\n => Array\n(\n => 103.82.80.228\n)\n\n => Array\n(\n => 111.119.187.39\n)\n\n => Array\n(\n => 157.51.161.199\n)\n\n => Array\n(\n => 59.96.88.246\n)\n\n => Array\n(\n => 27.4.181.183\n)\n\n => Array\n(\n => 43.225.98.124\n)\n\n => Array\n(\n => 157.51.113.74\n)\n\n => Array\n(\n => 207.244.89.161\n)\n\n => Array\n(\n => 49.37.184.82\n)\n\n => Array\n(\n => 111.119.183.4\n)\n\n => Array\n(\n => 39.42.130.147\n)\n\n => Array\n(\n => 103.152.101.2\n)\n\n => Array\n(\n => 111.119.183.2\n)\n\n => Array\n(\n => 157.51.171.149\n)\n\n => Array\n(\n => 103.82.80.245\n)\n\n => Array\n(\n => 175.107.207.133\n)\n\n => Array\n(\n => 103.204.169.158\n)\n\n => Array\n(\n => 157.51.181.12\n)\n\n => Array\n(\n => 195.158.193.212\n)\n\n => Array\n(\n => 204.14.73.85\n)\n\n => Array\n(\n => 39.59.59.31\n)\n\n => Array\n(\n => 45.148.11.82\n)\n\n => Array\n(\n => 157.46.117.250\n)\n\n => Array\n(\n => 157.46.127.170\n)\n\n => Array\n(\n => 77.247.181.165\n)\n\n => Array\n(\n => 111.119.183.54\n)\n\n => Array\n(\n => 41.60.232.183\n)\n\n => Array\n(\n => 157.42.206.174\n)\n\n => Array\n(\n => 196.53.10.246\n)\n\n => Array\n(\n => 27.97.186.131\n)\n\n => Array\n(\n => 103.73.101.134\n)\n\n => Array\n(\n => 111.119.183.35\n)\n\n => Array\n(\n => 202.8.118.111\n)\n\n => Array\n(\n => 103.75.246.207\n)\n\n => Array\n(\n => 47.8.94.225\n)\n\n => Array\n(\n => 106.202.40.83\n)\n\n => Array\n(\n => 117.102.2.0\n)\n\n => Array\n(\n => 156.146.59.11\n)\n\n => Array\n(\n => 223.190.115.125\n)\n\n => Array\n(\n => 169.149.212.232\n)\n\n => Array\n(\n => 39.45.150.127\n)\n\n => Array\n(\n => 45.63.10.204\n)\n\n => Array\n(\n => 27.57.86.46\n)\n\n => Array\n(\n => 103.127.20.138\n)\n\n => Array\n(\n => 223.190.27.26\n)\n\n => Array\n(\n => 49.15.248.78\n)\n\n => Array\n(\n => 130.105.135.103\n)\n\n => Array\n(\n => 47.31.3.239\n)\n\n => Array\n(\n => 185.66.71.8\n)\n\n => Array\n(\n => 103.226.226.198\n)\n\n => Array\n(\n => 39.34.134.16\n)\n\n => Array\n(\n => 95.158.53.120\n)\n\n => Array\n(\n => 45.9.249.246\n)\n\n => Array\n(\n => 223.235.162.157\n)\n\n => Array\n(\n => 37.111.139.23\n)\n\n => Array\n(\n => 49.37.153.47\n)\n\n => Array\n(\n => 103.242.60.205\n)\n\n => Array\n(\n => 185.66.68.18\n)\n\n => Array\n(\n => 162.221.202.138\n)\n\n => Array\n(\n => 202.63.195.29\n)\n\n => Array\n(\n => 112.198.75.226\n)\n\n => Array\n(\n => 46.200.69.233\n)\n\n => Array\n(\n => 103.135.78.30\n)\n\n => Array\n(\n => 119.152.226.9\n)\n\n => Array\n(\n => 167.172.242.50\n)\n\n => Array\n(\n => 49.36.151.31\n)\n\n => Array\n(\n => 111.88.237.156\n)\n\n => Array\n(\n => 103.215.168.1\n)\n\n => Array\n(\n => 107.181.177.137\n)\n\n => Array\n(\n => 157.119.186.202\n)\n\n => Array\n(\n => 37.111.139.106\n)\n\n => Array\n(\n => 182.180.152.198\n)\n\n => Array\n(\n => 43.248.153.72\n)\n\n => Array\n(\n => 64.188.20.84\n)\n\n => Array\n(\n => 103.92.214.11\n)\n\n => Array\n(\n => 182.182.14.148\n)\n\n => Array\n(\n => 116.75.154.119\n)\n\n => Array\n(\n => 37.228.235.94\n)\n\n => Array\n(\n => 197.210.55.43\n)\n\n => Array\n(\n => 45.118.165.153\n)\n\n => Array\n(\n => 122.176.32.27\n)\n\n => Array\n(\n => 106.215.161.20\n)\n\n => Array\n(\n => 152.32.113.58\n)\n\n => Array\n(\n => 111.125.106.132\n)\n\n => Array\n(\n => 212.102.40.72\n)\n\n => Array\n(\n => 2.58.194.140\n)\n\n => Array\n(\n => 122.174.68.115\n)\n\n => Array\n(\n => 117.241.66.56\n)\n\n => Array\n(\n => 71.94.172.140\n)\n\n => Array\n(\n => 103.209.228.139\n)\n\n => Array\n(\n => 43.242.177.140\n)\n\n => Array\n(\n => 38.91.101.66\n)\n\n => Array\n(\n => 103.82.80.67\n)\n\n => Array\n(\n => 117.248.62.138\n)\n\n => Array\n(\n => 103.81.215.51\n)\n\n => Array\n(\n => 103.253.174.4\n)\n\n => Array\n(\n => 202.142.110.111\n)\n\n => Array\n(\n => 162.216.142.1\n)\n\n => Array\n(\n => 58.186.7.252\n)\n\n => Array\n(\n => 113.203.247.66\n)\n\n => Array\n(\n => 111.88.50.63\n)\n\n => Array\n(\n => 182.182.94.227\n)\n\n => Array\n(\n => 49.15.232.50\n)\n\n => Array\n(\n => 182.189.76.225\n)\n\n => Array\n(\n => 139.99.159.14\n)\n\n => Array\n(\n => 163.172.159.235\n)\n\n => Array\n(\n => 157.36.235.241\n)\n\n => Array\n(\n => 111.119.187.3\n)\n\n => Array\n(\n => 103.100.4.61\n)\n\n => Array\n(\n => 192.142.130.88\n)\n\n => Array\n(\n => 43.242.176.114\n)\n\n => Array\n(\n => 180.178.156.165\n)\n\n => Array\n(\n => 182.189.236.77\n)\n\n => Array\n(\n => 49.34.197.239\n)\n\n => Array\n(\n => 157.36.107.107\n)\n\n => Array\n(\n => 103.209.85.175\n)\n\n => Array\n(\n => 203.139.63.83\n)\n\n => Array\n(\n => 43.242.177.161\n)\n\n => Array\n(\n => 182.182.77.138\n)\n\n => Array\n(\n => 114.124.168.117\n)\n\n => Array\n(\n => 124.253.79.191\n)\n\n => Array\n(\n => 192.142.168.235\n)\n\n => Array\n(\n => 14.232.235.111\n)\n\n => Array\n(\n => 152.57.124.214\n)\n\n => Array\n(\n => 123.24.172.48\n)\n\n => Array\n(\n => 43.242.176.87\n)\n\n => Array\n(\n => 43.242.176.101\n)\n\n => Array\n(\n => 49.156.84.110\n)\n\n => Array\n(\n => 58.65.222.6\n)\n\n => Array\n(\n => 157.32.189.112\n)\n\n => Array\n(\n => 47.31.155.87\n)\n\n => Array\n(\n => 39.53.244.182\n)\n\n => Array\n(\n => 39.33.221.76\n)\n\n => Array\n(\n => 161.35.130.245\n)\n\n => Array\n(\n => 152.32.113.137\n)\n\n => Array\n(\n => 192.142.187.220\n)\n\n => Array\n(\n => 185.54.228.123\n)\n\n => Array\n(\n => 103.233.87.221\n)\n\n => Array\n(\n => 223.236.200.224\n)\n\n => Array\n(\n => 27.97.189.170\n)\n\n => Array\n(\n => 103.82.80.212\n)\n\n => Array\n(\n => 43.242.176.37\n)\n\n => Array\n(\n => 49.36.144.94\n)\n\n => Array\n(\n => 180.251.62.185\n)\n\n => Array\n(\n => 39.50.243.227\n)\n\n => Array\n(\n => 124.253.20.21\n)\n\n => Array\n(\n => 41.60.233.31\n)\n\n => Array\n(\n => 103.81.215.57\n)\n\n => Array\n(\n => 185.91.120.16\n)\n\n => Array\n(\n => 182.190.107.163\n)\n\n => Array\n(\n => 222.252.61.68\n)\n\n => Array\n(\n => 109.169.23.78\n)\n\n => Array\n(\n => 39.50.151.222\n)\n\n => Array\n(\n => 43.242.176.86\n)\n\n => Array\n(\n => 178.162.222.161\n)\n\n => Array\n(\n => 37.111.139.158\n)\n\n => Array\n(\n => 39.57.224.97\n)\n\n => Array\n(\n => 39.57.157.194\n)\n\n => Array\n(\n => 111.119.183.48\n)\n\n => Array\n(\n => 180.190.171.129\n)\n\n => Array\n(\n => 39.52.174.177\n)\n\n => Array\n(\n => 43.242.176.103\n)\n\n => Array\n(\n => 124.253.83.14\n)\n\n => Array\n(\n => 182.189.116.245\n)\n\n => Array\n(\n => 157.36.178.213\n)\n\n => Array\n(\n => 45.250.65.119\n)\n\n => Array\n(\n => 103.209.86.6\n)\n\n => Array\n(\n => 43.242.176.80\n)\n\n => Array\n(\n => 137.59.147.2\n)\n\n => Array\n(\n => 117.222.95.23\n)\n\n => Array\n(\n => 124.253.81.10\n)\n\n => Array\n(\n => 43.242.177.21\n)\n\n => Array\n(\n => 182.189.224.186\n)\n\n => Array\n(\n => 39.52.178.142\n)\n\n => Array\n(\n => 106.214.29.176\n)\n\n => Array\n(\n => 111.88.145.107\n)\n\n => Array\n(\n => 49.36.142.67\n)\n\n => Array\n(\n => 202.142.65.50\n)\n\n => Array\n(\n => 1.22.186.76\n)\n\n => Array\n(\n => 103.131.8.225\n)\n\n => Array\n(\n => 39.53.212.111\n)\n\n => Array\n(\n => 103.82.80.149\n)\n\n => Array\n(\n => 43.242.176.12\n)\n\n => Array\n(\n => 103.109.13.189\n)\n\n => Array\n(\n => 124.253.206.202\n)\n\n => Array\n(\n => 117.195.115.85\n)\n\n => Array\n(\n => 49.36.245.229\n)\n\n => Array\n(\n => 42.118.8.100\n)\n\n => Array\n(\n => 1.22.73.17\n)\n\n => Array\n(\n => 157.36.166.131\n)\n\n => Array\n(\n => 182.182.38.223\n)\n\n => Array\n(\n => 49.14.150.21\n)\n\n => Array\n(\n => 43.242.176.89\n)\n\n => Array\n(\n => 157.46.185.69\n)\n\n => Array\n(\n => 103.31.92.150\n)\n\n => Array\n(\n => 59.96.90.94\n)\n\n => Array\n(\n => 49.156.111.64\n)\n\n => Array\n(\n => 103.75.244.16\n)\n\n => Array\n(\n => 54.37.18.139\n)\n\n => Array\n(\n => 27.255.173.50\n)\n\n => Array\n(\n => 84.202.161.120\n)\n\n => Array\n(\n => 27.3.224.180\n)\n\n => Array\n(\n => 39.44.14.192\n)\n\n => Array\n(\n => 37.120.133.201\n)\n\n => Array\n(\n => 109.251.143.236\n)\n\n => Array\n(\n => 23.80.97.111\n)\n\n => Array\n(\n => 43.242.176.9\n)\n\n => Array\n(\n => 14.248.107.50\n)\n\n => Array\n(\n => 182.189.221.114\n)\n\n => Array\n(\n => 103.253.173.74\n)\n\n => Array\n(\n => 27.97.177.45\n)\n\n => Array\n(\n => 49.14.98.9\n)\n\n => Array\n(\n => 163.53.85.169\n)\n\n => Array\n(\n => 39.59.90.168\n)\n\n => Array\n(\n => 111.88.202.253\n)\n\n => Array\n(\n => 111.119.178.155\n)\n\n => Array\n(\n => 171.76.163.75\n)\n\n => Array\n(\n => 202.5.154.23\n)\n\n => Array\n(\n => 119.160.65.164\n)\n\n => Array\n(\n => 14.253.253.190\n)\n\n => Array\n(\n => 117.206.167.25\n)\n\n => Array\n(\n => 61.2.183.186\n)\n\n => Array\n(\n => 103.100.4.83\n)\n\n => Array\n(\n => 124.253.71.126\n)\n\n => Array\n(\n => 182.189.49.217\n)\n\n => Array\n(\n => 103.196.160.41\n)\n\n => Array\n(\n => 23.106.56.35\n)\n\n => Array\n(\n => 110.38.12.70\n)\n\n => Array\n(\n => 154.157.199.239\n)\n\n => Array\n(\n => 14.231.163.113\n)\n\n => Array\n(\n => 103.69.27.232\n)\n\n => Array\n(\n => 175.107.220.192\n)\n\n => Array\n(\n => 43.231.58.173\n)\n\n => Array\n(\n => 138.128.91.215\n)\n\n => Array\n(\n => 103.233.86.1\n)\n\n => Array\n(\n => 182.187.67.111\n)\n\n => Array\n(\n => 49.156.71.31\n)\n\n => Array\n(\n => 27.255.174.125\n)\n\n => Array\n(\n => 195.24.220.35\n)\n\n => Array\n(\n => 120.29.98.28\n)\n\n => Array\n(\n => 41.202.219.255\n)\n\n => Array\n(\n => 103.88.3.243\n)\n\n => Array\n(\n => 111.125.106.75\n)\n\n => Array\n(\n => 106.76.71.74\n)\n\n => Array\n(\n => 112.201.138.85\n)\n\n => Array\n(\n => 110.137.101.229\n)\n\n => Array\n(\n => 43.242.177.96\n)\n\n => Array\n(\n => 39.36.198.196\n)\n\n => Array\n(\n => 27.255.181.140\n)\n\n => Array\n(\n => 194.99.104.58\n)\n\n => Array\n(\n => 78.129.139.109\n)\n\n => Array\n(\n => 47.247.185.67\n)\n\n => Array\n(\n => 27.63.37.90\n)\n\n => Array\n(\n => 103.211.54.1\n)\n\n => Array\n(\n => 94.202.167.139\n)\n\n => Array\n(\n => 111.119.183.3\n)\n\n => Array\n(\n => 124.253.194.1\n)\n\n => Array\n(\n => 192.142.188.115\n)\n\n => Array\n(\n => 39.44.137.107\n)\n\n => Array\n(\n => 43.251.191.25\n)\n\n => Array\n(\n => 103.140.30.114\n)\n\n => Array\n(\n => 117.5.194.159\n)\n\n => Array\n(\n => 109.169.23.79\n)\n\n => Array\n(\n => 122.178.127.170\n)\n\n => Array\n(\n => 45.118.165.156\n)\n\n => Array\n(\n => 39.48.199.148\n)\n\n => Array\n(\n => 182.64.138.32\n)\n\n => Array\n(\n => 37.73.129.186\n)\n\n => Array\n(\n => 182.186.110.35\n)\n\n => Array\n(\n => 43.242.177.24\n)\n\n => Array\n(\n => 119.155.23.112\n)\n\n => Array\n(\n => 84.16.238.119\n)\n\n => Array\n(\n => 41.202.219.252\n)\n\n => Array\n(\n => 43.242.176.119\n)\n\n => Array\n(\n => 111.119.187.6\n)\n\n => Array\n(\n => 95.12.200.188\n)\n\n => Array\n(\n => 139.28.219.138\n)\n\n => Array\n(\n => 89.163.247.130\n)\n\n => Array\n(\n => 122.173.103.88\n)\n\n => Array\n(\n => 103.248.87.10\n)\n\n => Array\n(\n => 23.106.249.36\n)\n\n => Array\n(\n => 124.253.94.125\n)\n\n => Array\n(\n => 39.53.244.147\n)\n\n => Array\n(\n => 193.109.85.11\n)\n\n => Array\n(\n => 43.242.176.71\n)\n\n => Array\n(\n => 43.242.177.58\n)\n\n => Array\n(\n => 47.31.6.139\n)\n\n => Array\n(\n => 39.59.34.67\n)\n\n => Array\n(\n => 43.242.176.58\n)\n\n => Array\n(\n => 103.107.198.198\n)\n\n => Array\n(\n => 147.135.11.113\n)\n\n => Array\n(\n => 27.7.212.112\n)\n\n => Array\n(\n => 43.242.177.1\n)\n\n => Array\n(\n => 175.107.227.27\n)\n\n => Array\n(\n => 103.103.43.254\n)\n\n => Array\n(\n => 49.15.221.10\n)\n\n => Array\n(\n => 43.242.177.43\n)\n\n => Array\n(\n => 36.85.59.11\n)\n\n => Array\n(\n => 124.253.204.50\n)\n\n => Array\n(\n => 5.181.233.54\n)\n\n => Array\n(\n => 43.242.177.154\n)\n\n => Array\n(\n => 103.84.37.169\n)\n\n => Array\n(\n => 222.252.54.108\n)\n\n => Array\n(\n => 14.162.160.254\n)\n\n => Array\n(\n => 178.151.218.45\n)\n\n => Array\n(\n => 110.137.101.93\n)\n\n => Array\n(\n => 122.162.212.59\n)\n\n => Array\n(\n => 81.12.118.162\n)\n\n => Array\n(\n => 171.76.186.148\n)\n\n => Array\n(\n => 182.69.253.77\n)\n\n => Array\n(\n => 111.119.183.43\n)\n\n => Array\n(\n => 49.149.74.226\n)\n\n => Array\n(\n => 43.242.177.63\n)\n\n => Array\n(\n => 14.99.243.54\n)\n\n => Array\n(\n => 110.137.100.25\n)\n\n => Array\n(\n => 116.107.25.163\n)\n\n => Array\n(\n => 49.36.71.141\n)\n\n => Array\n(\n => 182.180.117.219\n)\n\n => Array\n(\n => 150.242.172.194\n)\n\n => Array\n(\n => 49.156.111.40\n)\n\n => Array\n(\n => 49.15.208.115\n)\n\n => Array\n(\n => 103.209.87.219\n)\n\n => Array\n(\n => 43.242.176.56\n)\n\n => Array\n(\n => 103.132.187.100\n)\n\n => Array\n(\n => 49.156.96.120\n)\n\n => Array\n(\n => 192.142.176.171\n)\n\n => Array\n(\n => 51.91.18.131\n)\n\n => Array\n(\n => 103.83.144.121\n)\n\n => Array\n(\n => 1.39.75.72\n)\n\n => Array\n(\n => 14.231.172.177\n)\n\n => Array\n(\n => 94.232.213.159\n)\n\n => Array\n(\n => 103.228.158.38\n)\n\n => Array\n(\n => 43.242.177.100\n)\n\n => Array\n(\n => 171.76.149.130\n)\n\n => Array\n(\n => 113.183.26.59\n)\n\n => Array\n(\n => 182.74.232.166\n)\n\n => Array\n(\n => 47.31.205.211\n)\n\n => Array\n(\n => 106.211.253.70\n)\n\n => Array\n(\n => 39.51.233.214\n)\n\n => Array\n(\n => 182.70.249.161\n)\n\n => Array\n(\n => 222.252.40.196\n)\n\n => Array\n(\n => 49.37.6.29\n)\n\n => Array\n(\n => 119.155.33.170\n)\n\n => Array\n(\n => 43.242.177.79\n)\n\n => Array\n(\n => 111.119.183.62\n)\n\n => Array\n(\n => 137.59.226.97\n)\n\n => Array\n(\n => 42.111.18.121\n)\n\n => Array\n(\n => 223.190.46.91\n)\n\n => Array\n(\n => 45.118.165.159\n)\n\n => Array\n(\n => 110.136.60.44\n)\n\n => Array\n(\n => 43.242.176.57\n)\n\n => Array\n(\n => 117.212.58.0\n)\n\n => Array\n(\n => 49.37.7.66\n)\n\n => Array\n(\n => 39.52.174.33\n)\n\n => Array\n(\n => 150.242.172.55\n)\n\n => Array\n(\n => 103.94.111.236\n)\n\n => Array\n(\n => 106.215.239.184\n)\n\n => Array\n(\n => 101.128.117.75\n)\n\n => Array\n(\n => 162.210.194.10\n)\n\n => Array\n(\n => 136.158.31.132\n)\n\n => Array\n(\n => 39.51.245.69\n)\n\n => Array\n(\n => 39.42.149.159\n)\n\n => Array\n(\n => 51.77.108.159\n)\n\n => Array\n(\n => 45.127.247.250\n)\n\n => Array\n(\n => 122.172.78.22\n)\n\n => Array\n(\n => 117.220.208.38\n)\n\n => Array\n(\n => 112.201.138.95\n)\n\n => Array\n(\n => 49.145.105.113\n)\n\n => Array\n(\n => 110.93.247.12\n)\n\n => Array\n(\n => 39.52.150.32\n)\n\n => Array\n(\n => 122.161.89.41\n)\n\n => Array\n(\n => 39.52.176.49\n)\n\n => Array\n(\n => 157.33.12.154\n)\n\n => Array\n(\n => 73.111.248.162\n)\n\n => Array\n(\n => 112.204.167.67\n)\n\n => Array\n(\n => 107.150.30.182\n)\n\n => Array\n(\n => 115.99.222.229\n)\n\n => Array\n(\n => 180.190.195.96\n)\n\n => Array\n(\n => 157.44.57.255\n)\n\n => Array\n(\n => 39.37.9.167\n)\n\n => Array\n(\n => 39.49.48.33\n)\n\n => Array\n(\n => 157.44.218.118\n)\n\n => Array\n(\n => 103.211.54.253\n)\n\n => Array\n(\n => 43.242.177.81\n)\n\n => Array\n(\n => 103.111.224.227\n)\n\n => Array\n(\n => 223.176.48.237\n)\n\n => Array\n(\n => 124.253.87.117\n)\n\n => Array\n(\n => 124.29.247.14\n)\n\n => Array\n(\n => 182.189.232.32\n)\n\n => Array\n(\n => 111.68.97.206\n)\n\n => Array\n(\n => 103.117.15.70\n)\n\n => Array\n(\n => 182.18.236.101\n)\n\n => Array\n(\n => 43.242.177.60\n)\n\n => Array\n(\n => 180.190.7.178\n)\n\n => Array\n(\n => 112.201.142.95\n)\n\n => Array\n(\n => 122.178.255.123\n)\n\n => Array\n(\n => 49.36.240.103\n)\n\n => Array\n(\n => 210.56.16.13\n)\n\n => Array\n(\n => 103.91.123.219\n)\n\n => Array\n(\n => 39.52.155.252\n)\n\n => Array\n(\n => 192.142.207.230\n)\n\n => Array\n(\n => 188.163.82.179\n)\n\n => Array\n(\n => 182.189.9.196\n)\n\n => Array\n(\n => 175.107.221.51\n)\n\n => Array\n(\n => 39.53.221.200\n)\n\n => Array\n(\n => 27.255.190.59\n)\n\n => Array\n(\n => 183.83.212.118\n)\n\n => Array\n(\n => 45.118.165.143\n)\n\n => Array\n(\n => 182.189.124.35\n)\n\n => Array\n(\n => 203.101.186.1\n)\n\n => Array\n(\n => 49.36.246.25\n)\n\n => Array\n(\n => 39.42.186.234\n)\n\n => Array\n(\n => 103.82.80.14\n)\n\n => Array\n(\n => 210.18.182.42\n)\n\n => Array\n(\n => 42.111.13.81\n)\n\n => Array\n(\n => 46.200.69.240\n)\n\n => Array\n(\n => 103.209.87.213\n)\n\n => Array\n(\n => 103.31.95.95\n)\n\n => Array\n(\n => 180.190.174.25\n)\n\n => Array\n(\n => 103.77.0.128\n)\n\n => Array\n(\n => 49.34.103.82\n)\n\n => Array\n(\n => 39.48.196.22\n)\n\n => Array\n(\n => 192.142.166.20\n)\n\n => Array\n(\n => 202.142.110.186\n)\n\n => Array\n(\n => 122.163.135.95\n)\n\n => Array\n(\n => 183.83.255.225\n)\n\n => Array\n(\n => 157.45.46.10\n)\n\n => Array\n(\n => 182.189.4.77\n)\n\n => Array\n(\n => 49.145.104.71\n)\n\n => Array\n(\n => 103.143.7.34\n)\n\n => Array\n(\n => 61.2.180.15\n)\n\n => Array\n(\n => 103.81.215.61\n)\n\n => Array\n(\n => 115.42.71.122\n)\n\n => Array\n(\n => 124.253.73.20\n)\n\n => Array\n(\n => 49.33.210.169\n)\n\n => Array\n(\n => 78.159.101.115\n)\n\n => Array\n(\n => 42.111.17.221\n)\n\n => Array\n(\n => 43.242.178.67\n)\n\n => Array\n(\n => 36.68.138.36\n)\n\n => Array\n(\n => 103.195.201.51\n)\n\n => Array\n(\n => 79.141.162.81\n)\n\n => Array\n(\n => 202.8.118.239\n)\n\n => Array\n(\n => 103.139.128.161\n)\n\n => Array\n(\n => 207.244.71.84\n)\n\n => Array\n(\n => 124.253.184.45\n)\n\n => Array\n(\n => 111.125.106.124\n)\n\n => Array\n(\n => 111.125.105.139\n)\n\n => Array\n(\n => 39.59.94.233\n)\n\n => Array\n(\n => 112.211.60.168\n)\n\n => Array\n(\n => 103.117.14.72\n)\n\n => Array\n(\n => 111.119.183.56\n)\n\n => Array\n(\n => 47.31.53.228\n)\n\n => Array\n(\n => 124.253.186.8\n)\n\n => Array\n(\n => 183.83.213.214\n)\n\n => Array\n(\n => 103.106.239.70\n)\n\n => Array\n(\n => 182.182.92.81\n)\n\n => Array\n(\n => 14.162.167.98\n)\n\n => Array\n(\n => 112.211.11.107\n)\n\n => Array\n(\n => 77.111.246.20\n)\n\n => Array\n(\n => 49.156.86.182\n)\n\n => Array\n(\n => 47.29.122.112\n)\n\n => Array\n(\n => 125.99.74.42\n)\n\n => Array\n(\n => 124.123.169.24\n)\n\n => Array\n(\n => 106.202.105.128\n)\n\n => Array\n(\n => 103.244.173.14\n)\n\n => Array\n(\n => 103.98.63.104\n)\n\n => Array\n(\n => 180.245.6.60\n)\n\n => Array\n(\n => 49.149.96.14\n)\n\n => Array\n(\n => 14.177.120.169\n)\n\n => Array\n(\n => 192.135.90.145\n)\n\n => Array\n(\n => 223.190.18.218\n)\n\n => Array\n(\n => 171.61.190.2\n)\n\n => Array\n(\n => 58.65.220.219\n)\n\n => Array\n(\n => 122.177.29.87\n)\n\n => Array\n(\n => 223.236.175.203\n)\n\n => Array\n(\n => 39.53.237.106\n)\n\n => Array\n(\n => 1.186.114.83\n)\n\n => Array\n(\n => 43.230.66.153\n)\n\n => Array\n(\n => 27.96.94.247\n)\n\n => Array\n(\n => 39.52.176.185\n)\n\n => Array\n(\n => 59.94.147.62\n)\n\n => Array\n(\n => 119.160.117.10\n)\n\n => Array\n(\n => 43.241.146.105\n)\n\n => Array\n(\n => 39.59.87.75\n)\n\n => Array\n(\n => 119.160.118.203\n)\n\n => Array\n(\n => 39.52.161.76\n)\n\n => Array\n(\n => 202.168.84.189\n)\n\n => Array\n(\n => 103.215.168.2\n)\n\n => Array\n(\n => 39.42.146.160\n)\n\n => Array\n(\n => 182.182.30.246\n)\n\n => Array\n(\n => 122.173.212.133\n)\n\n => Array\n(\n => 39.51.238.44\n)\n\n => Array\n(\n => 183.83.252.51\n)\n\n => Array\n(\n => 202.142.168.86\n)\n\n => Array\n(\n => 39.40.198.209\n)\n\n => Array\n(\n => 192.135.90.151\n)\n\n => Array\n(\n => 72.255.41.174\n)\n\n => Array\n(\n => 137.97.92.124\n)\n\n => Array\n(\n => 182.185.159.155\n)\n\n => Array\n(\n => 157.44.133.131\n)\n\n => Array\n(\n => 39.51.230.253\n)\n\n => Array\n(\n => 103.70.87.200\n)\n\n => Array\n(\n => 103.117.15.82\n)\n\n => Array\n(\n => 103.217.244.69\n)\n\n => Array\n(\n => 157.34.76.185\n)\n\n => Array\n(\n => 39.52.130.163\n)\n\n => Array\n(\n => 182.181.41.39\n)\n\n => Array\n(\n => 49.37.212.226\n)\n\n => Array\n(\n => 119.160.117.100\n)\n\n => Array\n(\n => 103.209.87.43\n)\n\n => Array\n(\n => 180.190.195.45\n)\n\n => Array\n(\n => 122.160.57.230\n)\n\n => Array\n(\n => 203.192.213.81\n)\n\n => Array\n(\n => 182.181.63.91\n)\n\n => Array\n(\n => 157.44.184.5\n)\n\n => Array\n(\n => 27.97.213.128\n)\n\n => Array\n(\n => 122.55.252.145\n)\n\n => Array\n(\n => 103.117.15.92\n)\n\n => Array\n(\n => 42.201.251.179\n)\n\n => Array\n(\n => 122.186.84.53\n)\n\n => Array\n(\n => 119.157.75.242\n)\n\n => Array\n(\n => 39.42.163.6\n)\n\n => Array\n(\n => 14.99.246.78\n)\n\n => Array\n(\n => 103.209.87.227\n)\n\n => Array\n(\n => 182.68.215.31\n)\n\n => Array\n(\n => 45.118.165.140\n)\n\n => Array\n(\n => 207.244.71.81\n)\n\n => Array\n(\n => 27.97.162.57\n)\n\n => Array\n(\n => 103.113.106.98\n)\n\n => Array\n(\n => 95.135.44.103\n)\n\n => Array\n(\n => 125.209.114.238\n)\n\n => Array\n(\n => 77.123.14.176\n)\n\n => Array\n(\n => 110.36.202.169\n)\n\n => Array\n(\n => 124.253.205.230\n)\n\n => Array\n(\n => 106.215.72.117\n)\n\n => Array\n(\n => 116.72.226.35\n)\n\n => Array\n(\n => 137.97.103.141\n)\n\n => Array\n(\n => 112.79.212.161\n)\n\n => Array\n(\n => 103.209.85.150\n)\n\n => Array\n(\n => 103.159.127.6\n)\n\n => Array\n(\n => 43.239.205.66\n)\n\n => Array\n(\n => 143.244.51.152\n)\n\n => Array\n(\n => 182.64.15.3\n)\n\n => Array\n(\n => 182.185.207.146\n)\n\n => Array\n(\n => 45.118.165.155\n)\n\n => Array\n(\n => 115.160.241.214\n)\n\n => Array\n(\n => 47.31.230.68\n)\n\n => Array\n(\n => 49.15.84.145\n)\n\n => Array\n(\n => 39.51.239.206\n)\n\n => Array\n(\n => 103.149.154.212\n)\n\n => Array\n(\n => 43.239.207.155\n)\n\n => Array\n(\n => 182.182.30.181\n)\n\n => Array\n(\n => 157.37.198.16\n)\n\n => Array\n(\n => 162.239.24.60\n)\n\n => Array\n(\n => 106.212.101.97\n)\n\n => Array\n(\n => 124.253.97.44\n)\n\n => Array\n(\n => 106.214.95.176\n)\n\n => Array\n(\n => 102.69.228.114\n)\n\n => Array\n(\n => 116.74.58.221\n)\n\n => Array\n(\n => 162.210.194.38\n)\n\n => Array\n(\n => 39.52.162.121\n)\n\n => Array\n(\n => 103.216.143.255\n)\n\n => Array\n(\n => 103.49.155.134\n)\n\n => Array\n(\n => 182.191.119.236\n)\n\n => Array\n(\n => 111.88.213.172\n)\n\n => Array\n(\n => 43.239.207.207\n)\n\n => Array\n(\n => 140.213.35.143\n)\n\n => Array\n(\n => 154.72.153.215\n)\n\n => Array\n(\n => 122.170.47.36\n)\n\n => Array\n(\n => 51.158.111.163\n)\n\n => Array\n(\n => 203.122.10.150\n)\n\n => Array\n(\n => 47.31.176.111\n)\n\n => Array\n(\n => 103.75.246.34\n)\n\n => Array\n(\n => 103.244.178.45\n)\n\n => Array\n(\n => 182.185.138.0\n)\n\n => Array\n(\n => 183.83.254.224\n)\n\n => Array\n(\n => 49.36.246.145\n)\n\n => Array\n(\n => 202.47.60.85\n)\n\n => Array\n(\n => 180.190.163.160\n)\n\n => Array\n(\n => 27.255.187.221\n)\n\n => Array\n(\n => 14.248.94.2\n)\n\n => Array\n(\n => 185.233.17.187\n)\n\n => Array\n(\n => 139.5.254.227\n)\n\n => Array\n(\n => 103.149.160.66\n)\n\n => Array\n(\n => 122.168.235.47\n)\n\n => Array\n(\n => 45.113.248.224\n)\n\n => Array\n(\n => 110.54.170.142\n)\n\n => Array\n(\n => 223.235.226.55\n)\n\n => Array\n(\n => 157.32.19.235\n)\n\n => Array\n(\n => 49.15.221.114\n)\n\n => Array\n(\n => 27.97.166.163\n)\n\n => Array\n(\n => 223.233.99.5\n)\n\n => Array\n(\n => 49.33.203.53\n)\n\n => Array\n(\n => 27.56.214.41\n)\n\n => Array\n(\n => 103.138.51.3\n)\n\n => Array\n(\n => 111.119.183.21\n)\n\n => Array\n(\n => 47.15.138.233\n)\n\n => Array\n(\n => 202.63.213.184\n)\n\n => Array\n(\n => 49.36.158.94\n)\n\n => Array\n(\n => 27.97.186.179\n)\n\n => Array\n(\n => 27.97.214.69\n)\n\n => Array\n(\n => 203.128.18.163\n)\n\n => Array\n(\n => 106.207.235.63\n)\n\n => Array\n(\n => 116.107.220.231\n)\n\n => Array\n(\n => 223.226.169.249\n)\n\n => Array\n(\n => 106.201.24.6\n)\n\n => Array\n(\n => 49.15.89.7\n)\n\n => Array\n(\n => 49.15.142.20\n)\n\n => Array\n(\n => 223.177.24.85\n)\n\n => Array\n(\n => 37.156.17.37\n)\n\n => Array\n(\n => 102.129.224.2\n)\n\n => Array\n(\n => 49.15.85.221\n)\n\n => Array\n(\n => 106.76.208.153\n)\n\n => Array\n(\n => 61.2.47.71\n)\n\n => Array\n(\n => 27.97.178.79\n)\n\n => Array\n(\n => 39.34.143.196\n)\n\n => Array\n(\n => 103.10.227.158\n)\n\n => Array\n(\n => 117.220.210.159\n)\n\n => Array\n(\n => 182.189.28.11\n)\n\n => Array\n(\n => 122.185.38.170\n)\n\n => Array\n(\n => 112.196.132.115\n)\n\n => Array\n(\n => 187.156.137.83\n)\n\n => Array\n(\n => 203.122.3.88\n)\n\n => Array\n(\n => 51.68.142.45\n)\n\n => Array\n(\n => 124.253.217.55\n)\n\n => Array\n(\n => 103.152.41.2\n)\n\n => Array\n(\n => 157.37.154.219\n)\n\n => Array\n(\n => 39.45.32.77\n)\n\n => Array\n(\n => 182.182.22.221\n)\n\n => Array\n(\n => 157.43.205.117\n)\n\n => Array\n(\n => 202.142.123.58\n)\n\n => Array\n(\n => 43.239.207.121\n)\n\n => Array\n(\n => 49.206.122.113\n)\n\n => Array\n(\n => 106.193.199.203\n)\n\n => Array\n(\n => 103.67.157.251\n)\n\n => Array\n(\n => 49.34.97.81\n)\n\n => Array\n(\n => 49.156.92.130\n)\n\n => Array\n(\n => 203.160.179.210\n)\n\n => Array\n(\n => 106.215.33.244\n)\n\n => Array\n(\n => 191.101.148.41\n)\n\n => Array\n(\n => 203.90.94.94\n)\n\n => Array\n(\n => 105.129.205.134\n)\n\n => Array\n(\n => 106.215.45.165\n)\n\n => Array\n(\n => 112.196.132.15\n)\n\n => Array\n(\n => 39.59.64.174\n)\n\n => Array\n(\n => 124.253.155.116\n)\n\n => Array\n(\n => 94.179.192.204\n)\n\n => Array\n(\n => 110.38.29.245\n)\n\n => Array\n(\n => 124.29.209.78\n)\n\n => Array\n(\n => 103.75.245.240\n)\n\n => Array\n(\n => 49.36.159.170\n)\n\n => Array\n(\n => 223.190.18.160\n)\n\n => Array\n(\n => 124.253.113.226\n)\n\n => Array\n(\n => 14.180.77.240\n)\n\n => Array\n(\n => 106.215.76.24\n)\n\n => Array\n(\n => 106.210.155.153\n)\n\n => Array\n(\n => 111.119.187.42\n)\n\n => Array\n(\n => 146.196.32.106\n)\n\n => Array\n(\n => 122.162.22.27\n)\n\n => Array\n(\n => 49.145.59.252\n)\n\n => Array\n(\n => 95.47.247.92\n)\n\n => Array\n(\n => 103.99.218.50\n)\n\n => Array\n(\n => 157.37.192.88\n)\n\n => Array\n(\n => 82.102.31.242\n)\n\n => Array\n(\n => 157.46.220.64\n)\n\n => Array\n(\n => 180.151.107.52\n)\n\n => Array\n(\n => 203.81.240.75\n)\n\n => Array\n(\n => 122.167.213.130\n)\n\n => Array\n(\n => 103.227.70.164\n)\n\n => Array\n(\n => 106.215.81.169\n)\n\n => Array\n(\n => 157.46.214.170\n)\n\n => Array\n(\n => 103.69.27.163\n)\n\n => Array\n(\n => 124.253.23.213\n)\n\n => Array\n(\n => 157.37.167.174\n)\n\n => Array\n(\n => 1.39.204.67\n)\n\n => Array\n(\n => 112.196.132.51\n)\n\n => Array\n(\n => 119.152.61.222\n)\n\n => Array\n(\n => 47.31.36.174\n)\n\n => Array\n(\n => 47.31.152.174\n)\n\n => Array\n(\n => 49.34.18.105\n)\n\n => Array\n(\n => 157.37.170.101\n)\n\n => Array\n(\n => 118.209.241.234\n)\n\n => Array\n(\n => 103.67.19.9\n)\n\n => Array\n(\n => 182.189.14.154\n)\n\n => Array\n(\n => 45.127.233.232\n)\n\n => Array\n(\n => 27.96.94.91\n)\n\n => Array\n(\n => 183.83.214.250\n)\n\n => Array\n(\n => 47.31.27.140\n)\n\n => Array\n(\n => 47.31.129.199\n)\n\n => Array\n(\n => 157.44.156.111\n)\n\n => Array\n(\n => 42.110.163.2\n)\n\n => Array\n(\n => 124.253.64.210\n)\n\n => Array\n(\n => 49.36.167.54\n)\n\n => Array\n(\n => 27.63.135.145\n)\n\n => Array\n(\n => 157.35.254.63\n)\n\n => Array\n(\n => 39.45.18.182\n)\n\n => Array\n(\n => 197.210.85.102\n)\n\n => Array\n(\n => 112.196.132.90\n)\n\n => Array\n(\n => 59.152.97.84\n)\n\n => Array\n(\n => 43.242.178.7\n)\n\n => Array\n(\n => 47.31.40.70\n)\n\n => Array\n(\n => 202.134.10.136\n)\n\n => Array\n(\n => 132.154.241.43\n)\n\n => Array\n(\n => 185.209.179.240\n)\n\n => Array\n(\n => 202.47.50.28\n)\n\n => Array\n(\n => 182.186.1.29\n)\n\n => Array\n(\n => 124.253.114.229\n)\n\n => Array\n(\n => 49.32.210.126\n)\n\n => Array\n(\n => 43.242.178.122\n)\n\n => Array\n(\n => 42.111.28.52\n)\n\n => Array\n(\n => 23.227.141.44\n)\n\n => Array\n(\n => 23.227.141.156\n)\n\n => Array\n(\n => 103.253.173.79\n)\n\n => Array\n(\n => 116.75.231.74\n)\n\n => Array\n(\n => 106.76.78.196\n)\n\n => Array\n(\n => 116.75.197.68\n)\n\n => Array\n(\n => 42.108.172.131\n)\n\n => Array\n(\n => 157.38.27.199\n)\n\n => Array\n(\n => 103.70.86.205\n)\n\n => Array\n(\n => 119.152.63.239\n)\n\n => Array\n(\n => 103.233.116.94\n)\n\n => Array\n(\n => 111.119.188.17\n)\n\n => Array\n(\n => 103.196.160.156\n)\n\n => Array\n(\n => 27.97.208.40\n)\n\n => Array\n(\n => 188.163.7.136\n)\n\n => Array\n(\n => 49.15.202.205\n)\n\n => Array\n(\n => 124.253.201.111\n)\n\n => Array\n(\n => 182.190.213.246\n)\n\n => Array\n(\n => 5.154.174.10\n)\n\n => Array\n(\n => 103.21.185.16\n)\n\n => Array\n(\n => 112.196.132.67\n)\n\n => Array\n(\n => 49.15.194.230\n)\n\n => Array\n(\n => 103.118.34.103\n)\n\n => Array\n(\n => 49.15.201.92\n)\n\n => Array\n(\n => 42.111.13.238\n)\n\n => Array\n(\n => 203.192.213.137\n)\n\n => Array\n(\n => 45.115.190.82\n)\n\n => Array\n(\n => 78.26.130.102\n)\n\n => Array\n(\n => 49.15.85.202\n)\n\n => Array\n(\n => 106.76.193.33\n)\n\n => Array\n(\n => 103.70.41.30\n)\n\n => Array\n(\n => 103.82.78.254\n)\n\n => Array\n(\n => 110.38.35.90\n)\n\n => Array\n(\n => 181.214.107.27\n)\n\n => Array\n(\n => 27.110.183.162\n)\n\n => Array\n(\n => 94.225.230.215\n)\n\n => Array\n(\n => 27.97.185.58\n)\n\n => Array\n(\n => 49.146.196.124\n)\n\n => Array\n(\n => 119.157.76.144\n)\n\n => Array\n(\n => 103.99.218.34\n)\n\n => Array\n(\n => 185.32.221.247\n)\n\n => Array\n(\n => 27.97.161.12\n)\n\n => Array\n(\n => 27.62.144.214\n)\n\n => Array\n(\n => 124.253.90.151\n)\n\n => Array\n(\n => 49.36.135.69\n)\n\n => Array\n(\n => 39.40.217.106\n)\n\n => Array\n(\n => 119.152.235.136\n)\n\n => Array\n(\n => 103.91.103.226\n)\n\n => Array\n(\n => 117.222.226.93\n)\n\n => Array\n(\n => 182.190.24.126\n)\n\n => Array\n(\n => 27.97.223.179\n)\n\n => Array\n(\n => 202.137.115.11\n)\n\n => Array\n(\n => 43.242.178.130\n)\n\n => Array\n(\n => 182.189.125.232\n)\n\n => Array\n(\n => 182.190.202.87\n)\n\n => Array\n(\n => 124.253.102.193\n)\n\n => Array\n(\n => 103.75.247.73\n)\n\n => Array\n(\n => 122.177.100.97\n)\n\n => Array\n(\n => 47.31.192.254\n)\n\n => Array\n(\n => 49.149.73.185\n)\n\n => Array\n(\n => 39.57.147.197\n)\n\n => Array\n(\n => 103.110.147.52\n)\n\n => Array\n(\n => 124.253.106.255\n)\n\n => Array\n(\n => 152.57.116.136\n)\n\n => Array\n(\n => 110.38.35.102\n)\n\n => Array\n(\n => 182.18.206.127\n)\n\n => Array\n(\n => 103.133.59.246\n)\n\n => Array\n(\n => 27.97.189.139\n)\n\n => Array\n(\n => 179.61.245.54\n)\n\n => Array\n(\n => 103.240.233.176\n)\n\n => Array\n(\n => 111.88.124.196\n)\n\n => Array\n(\n => 49.146.215.3\n)\n\n => Array\n(\n => 110.39.10.246\n)\n\n => Array\n(\n => 27.5.42.135\n)\n\n => Array\n(\n => 27.97.177.251\n)\n\n => Array\n(\n => 93.177.75.254\n)\n\n => Array\n(\n => 43.242.177.3\n)\n\n => Array\n(\n => 112.196.132.97\n)\n\n => Array\n(\n => 116.75.242.188\n)\n\n => Array\n(\n => 202.8.118.101\n)\n\n => Array\n(\n => 49.36.65.43\n)\n\n => Array\n(\n => 157.37.146.220\n)\n\n => Array\n(\n => 157.37.143.235\n)\n\n => Array\n(\n => 157.38.94.34\n)\n\n => Array\n(\n => 49.36.131.1\n)\n\n => Array\n(\n => 132.154.92.97\n)\n\n => Array\n(\n => 132.154.123.115\n)\n\n => Array\n(\n => 49.15.197.222\n)\n\n => Array\n(\n => 124.253.198.72\n)\n\n => Array\n(\n => 27.97.217.95\n)\n\n => Array\n(\n => 47.31.194.65\n)\n\n => Array\n(\n => 197.156.190.156\n)\n\n => Array\n(\n => 197.156.190.230\n)\n\n => Array\n(\n => 103.62.152.250\n)\n\n => Array\n(\n => 103.152.212.126\n)\n\n => Array\n(\n => 185.233.18.177\n)\n\n => Array\n(\n => 116.75.63.83\n)\n\n => Array\n(\n => 157.38.56.125\n)\n\n => Array\n(\n => 119.157.107.195\n)\n\n => Array\n(\n => 103.87.50.73\n)\n\n => Array\n(\n => 95.142.120.141\n)\n\n => Array\n(\n => 154.13.1.221\n)\n\n => Array\n(\n => 103.147.87.79\n)\n\n => Array\n(\n => 39.53.173.186\n)\n\n => Array\n(\n => 195.114.145.107\n)\n\n => Array\n(\n => 157.33.201.185\n)\n\n => Array\n(\n => 195.85.219.36\n)\n\n => Array\n(\n => 105.161.67.127\n)\n\n => Array\n(\n => 110.225.87.77\n)\n\n => Array\n(\n => 103.95.167.236\n)\n\n => Array\n(\n => 89.187.162.213\n)\n\n => Array\n(\n => 27.255.189.50\n)\n\n => Array\n(\n => 115.96.77.54\n)\n\n => Array\n(\n => 223.182.220.223\n)\n\n => Array\n(\n => 157.47.206.192\n)\n\n => Array\n(\n => 182.186.110.226\n)\n\n => Array\n(\n => 39.53.243.237\n)\n\n => Array\n(\n => 39.40.228.58\n)\n\n => Array\n(\n => 157.38.60.9\n)\n\n => Array\n(\n => 106.198.244.189\n)\n\n => Array\n(\n => 124.253.51.164\n)\n\n => Array\n(\n => 49.147.113.58\n)\n\n => Array\n(\n => 14.231.196.229\n)\n\n => Array\n(\n => 103.81.214.152\n)\n\n => Array\n(\n => 117.222.220.60\n)\n\n => Array\n(\n => 83.142.111.213\n)\n\n => Array\n(\n => 14.224.77.147\n)\n\n => Array\n(\n => 110.235.236.95\n)\n\n => Array\n(\n => 103.26.83.30\n)\n\n => Array\n(\n => 106.206.191.82\n)\n\n => Array\n(\n => 103.49.117.135\n)\n\n => Array\n(\n => 202.47.39.9\n)\n\n => Array\n(\n => 180.178.145.205\n)\n\n => Array\n(\n => 43.251.93.119\n)\n\n => Array\n(\n => 27.6.212.182\n)\n\n => Array\n(\n => 39.42.156.20\n)\n\n => Array\n(\n => 47.31.141.195\n)\n\n => Array\n(\n => 157.37.146.73\n)\n\n => Array\n(\n => 49.15.93.155\n)\n\n => Array\n(\n => 162.210.194.37\n)\n\n => Array\n(\n => 223.188.160.236\n)\n\n => Array\n(\n => 47.9.90.158\n)\n\n => Array\n(\n => 49.15.85.224\n)\n\n => Array\n(\n => 49.15.93.134\n)\n\n => Array\n(\n => 107.179.244.94\n)\n\n => Array\n(\n => 182.190.203.90\n)\n\n => Array\n(\n => 185.192.69.203\n)\n\n => Array\n(\n => 185.17.27.99\n)\n\n => Array\n(\n => 119.160.116.182\n)\n\n => Array\n(\n => 203.99.177.25\n)\n\n => Array\n(\n => 162.228.207.248\n)\n\n => Array\n(\n => 47.31.245.69\n)\n\n => Array\n(\n => 49.15.210.159\n)\n\n => Array\n(\n => 42.111.2.112\n)\n\n => Array\n(\n => 223.186.116.79\n)\n\n => Array\n(\n => 103.225.176.143\n)\n\n => Array\n(\n => 45.115.190.49\n)\n\n => Array\n(\n => 115.42.71.105\n)\n\n => Array\n(\n => 157.51.11.157\n)\n\n => Array\n(\n => 14.175.56.186\n)\n\n => Array\n(\n => 59.153.16.7\n)\n\n => Array\n(\n => 106.202.84.144\n)\n\n => Array\n(\n => 27.6.242.91\n)\n\n => Array\n(\n => 47.11.112.107\n)\n\n => Array\n(\n => 106.207.54.187\n)\n\n => Array\n(\n => 124.253.196.121\n)\n\n => Array\n(\n => 51.79.161.244\n)\n\n => Array\n(\n => 103.41.24.100\n)\n\n => Array\n(\n => 195.66.79.32\n)\n\n => Array\n(\n => 117.196.127.42\n)\n\n => Array\n(\n => 103.75.247.197\n)\n\n => Array\n(\n => 89.187.162.107\n)\n\n => Array\n(\n => 223.238.154.49\n)\n\n => Array\n(\n => 117.223.99.139\n)\n\n => Array\n(\n => 103.87.59.134\n)\n\n => Array\n(\n => 124.253.212.30\n)\n\n => Array\n(\n => 202.47.62.55\n)\n\n => Array\n(\n => 47.31.219.128\n)\n\n => Array\n(\n => 49.14.121.72\n)\n\n => Array\n(\n => 124.253.212.189\n)\n\n => Array\n(\n => 103.244.179.24\n)\n\n => Array\n(\n => 182.190.213.92\n)\n\n => Array\n(\n => 43.242.178.51\n)\n\n => Array\n(\n => 180.92.138.54\n)\n\n => Array\n(\n => 111.119.187.26\n)\n\n => Array\n(\n => 49.156.111.31\n)\n\n => Array\n(\n => 27.63.108.183\n)\n\n => Array\n(\n => 27.58.184.79\n)\n\n => Array\n(\n => 39.40.225.130\n)\n\n => Array\n(\n => 157.38.5.178\n)\n\n => Array\n(\n => 103.112.55.44\n)\n\n => Array\n(\n => 119.160.100.247\n)\n\n => Array\n(\n => 39.53.101.15\n)\n\n => Array\n(\n => 47.31.207.117\n)\n\n => Array\n(\n => 112.196.158.155\n)\n\n => Array\n(\n => 94.204.247.123\n)\n\n => Array\n(\n => 103.118.76.38\n)\n\n => Array\n(\n => 124.29.212.208\n)\n\n => Array\n(\n => 124.253.196.250\n)\n\n => Array\n(\n => 118.70.182.242\n)\n\n => Array\n(\n => 157.38.78.67\n)\n\n => Array\n(\n => 103.99.218.33\n)\n\n => Array\n(\n => 137.59.220.191\n)\n\n => Array\n(\n => 47.31.139.182\n)\n\n => Array\n(\n => 182.179.136.36\n)\n\n => Array\n(\n => 106.203.73.130\n)\n\n => Array\n(\n => 193.29.107.188\n)\n\n => Array\n(\n => 81.96.92.111\n)\n\n => Array\n(\n => 110.93.203.185\n)\n\n => Array\n(\n => 103.163.248.128\n)\n\n => Array\n(\n => 43.229.166.135\n)\n\n => Array\n(\n => 43.230.106.175\n)\n\n => Array\n(\n => 202.47.62.54\n)\n\n => Array\n(\n => 39.37.181.46\n)\n\n => Array\n(\n => 49.15.204.204\n)\n\n => Array\n(\n => 122.163.237.110\n)\n\n => Array\n(\n => 45.249.8.92\n)\n\n => Array\n(\n => 27.34.50.159\n)\n\n => Array\n(\n => 39.42.171.27\n)\n\n => Array\n(\n => 124.253.101.195\n)\n\n => Array\n(\n => 188.166.145.20\n)\n\n => Array\n(\n => 103.83.145.220\n)\n\n => Array\n(\n => 39.40.96.137\n)\n\n => Array\n(\n => 157.37.185.196\n)\n\n => Array\n(\n => 103.115.124.32\n)\n\n => Array\n(\n => 72.255.48.85\n)\n\n => Array\n(\n => 124.253.74.46\n)\n\n => Array\n(\n => 60.243.225.5\n)\n\n => Array\n(\n => 103.58.152.194\n)\n\n => Array\n(\n => 14.248.71.63\n)\n\n => Array\n(\n => 152.57.214.137\n)\n\n => Array\n(\n => 103.166.58.14\n)\n\n => Array\n(\n => 14.248.71.103\n)\n\n => Array\n(\n => 49.156.103.124\n)\n\n => Array\n(\n => 103.99.218.56\n)\n\n => Array\n(\n => 27.97.177.246\n)\n\n => Array\n(\n => 152.57.94.84\n)\n\n => Array\n(\n => 111.119.187.60\n)\n\n => Array\n(\n => 119.160.99.11\n)\n\n => Array\n(\n => 117.203.11.220\n)\n\n => Array\n(\n => 114.31.131.67\n)\n\n => Array\n(\n => 47.31.253.95\n)\n\n => Array\n(\n => 83.139.184.178\n)\n\n => Array\n(\n => 125.57.9.72\n)\n\n => Array\n(\n => 185.233.16.53\n)\n\n => Array\n(\n => 49.36.180.197\n)\n\n => Array\n(\n => 95.142.119.27\n)\n\n => Array\n(\n => 223.225.70.77\n)\n\n => Array\n(\n => 47.15.222.200\n)\n\n => Array\n(\n => 47.15.218.231\n)\n\n => Array\n(\n => 111.119.187.34\n)\n\n => Array\n(\n => 157.37.198.81\n)\n\n => Array\n(\n => 43.242.177.92\n)\n\n => Array\n(\n => 122.161.68.214\n)\n\n => Array\n(\n => 47.31.145.92\n)\n\n => Array\n(\n => 27.7.196.201\n)\n\n => Array\n(\n => 39.42.172.183\n)\n\n => Array\n(\n => 49.15.129.162\n)\n\n => Array\n(\n => 49.15.206.110\n)\n\n => Array\n(\n => 39.57.141.45\n)\n\n => Array\n(\n => 171.229.175.90\n)\n\n => Array\n(\n => 119.160.68.200\n)\n\n => Array\n(\n => 193.176.84.214\n)\n\n => Array\n(\n => 43.242.177.77\n)\n\n => Array\n(\n => 137.59.220.95\n)\n\n => Array\n(\n => 122.177.118.209\n)\n\n => Array\n(\n => 103.92.214.27\n)\n\n => Array\n(\n => 178.62.10.228\n)\n\n => Array\n(\n => 103.81.214.91\n)\n\n => Array\n(\n => 156.146.33.68\n)\n\n => Array\n(\n => 42.118.116.60\n)\n\n => Array\n(\n => 183.87.122.190\n)\n\n => Array\n(\n => 157.37.159.162\n)\n\n => Array\n(\n => 59.153.16.9\n)\n\n => Array\n(\n => 223.185.43.241\n)\n\n => Array\n(\n => 103.81.214.153\n)\n\n => Array\n(\n => 47.31.143.169\n)\n\n => Array\n(\n => 112.196.158.250\n)\n\n => Array\n(\n => 156.146.36.110\n)\n\n => Array\n(\n => 27.255.34.80\n)\n\n => Array\n(\n => 49.205.77.19\n)\n\n => Array\n(\n => 95.142.120.20\n)\n\n => Array\n(\n => 171.49.195.53\n)\n\n => Array\n(\n => 39.37.152.132\n)\n\n => Array\n(\n => 103.121.204.237\n)\n\n => Array\n(\n => 43.242.176.153\n)\n\n => Array\n(\n => 43.242.176.120\n)\n\n => Array\n(\n => 122.161.66.120\n)\n\n => Array\n(\n => 182.70.140.223\n)\n\n => Array\n(\n => 103.201.135.226\n)\n\n => Array\n(\n => 202.47.44.135\n)\n\n => Array\n(\n => 182.179.172.27\n)\n\n => Array\n(\n => 185.22.173.86\n)\n\n => Array\n(\n => 67.205.148.219\n)\n\n => Array\n(\n => 27.58.183.140\n)\n\n => Array\n(\n => 39.42.118.163\n)\n\n => Array\n(\n => 117.5.204.59\n)\n\n => Array\n(\n => 223.182.193.163\n)\n\n => Array\n(\n => 157.37.184.33\n)\n\n => Array\n(\n => 110.37.218.92\n)\n\n => Array\n(\n => 106.215.8.67\n)\n\n => Array\n(\n => 39.42.94.179\n)\n\n => Array\n(\n => 106.51.25.124\n)\n\n => Array\n(\n => 157.42.25.212\n)\n\n => Array\n(\n => 43.247.40.170\n)\n\n => Array\n(\n => 101.50.108.111\n)\n\n => Array\n(\n => 117.102.48.152\n)\n\n => Array\n(\n => 95.142.120.48\n)\n\n => Array\n(\n => 183.81.121.160\n)\n\n => Array\n(\n => 42.111.21.195\n)\n\n => Array\n(\n => 50.7.142.180\n)\n\n => Array\n(\n => 223.130.28.33\n)\n\n => Array\n(\n => 107.161.86.141\n)\n\n => Array\n(\n => 117.203.249.159\n)\n\n => Array\n(\n => 110.225.192.64\n)\n\n => Array\n(\n => 157.37.152.168\n)\n\n => Array\n(\n => 110.39.2.202\n)\n\n => Array\n(\n => 23.106.56.52\n)\n\n => Array\n(\n => 59.150.87.85\n)\n\n => Array\n(\n => 122.162.175.128\n)\n\n => Array\n(\n => 39.40.63.182\n)\n\n => Array\n(\n => 182.190.108.76\n)\n\n => Array\n(\n => 49.36.44.216\n)\n\n => Array\n(\n => 73.105.5.185\n)\n\n => Array\n(\n => 157.33.67.204\n)\n\n => Array\n(\n => 157.37.164.171\n)\n\n => Array\n(\n => 192.119.160.21\n)\n\n => Array\n(\n => 156.146.59.29\n)\n\n => Array\n(\n => 182.190.97.213\n)\n\n => Array\n(\n => 39.53.196.168\n)\n\n => Array\n(\n => 112.196.132.93\n)\n\n => Array\n(\n => 182.189.7.18\n)\n\n => Array\n(\n => 101.53.232.117\n)\n\n => Array\n(\n => 43.242.178.105\n)\n\n => Array\n(\n => 49.145.233.44\n)\n\n => Array\n(\n => 5.107.214.18\n)\n\n => Array\n(\n => 139.5.242.124\n)\n\n => Array\n(\n => 47.29.244.80\n)\n\n => Array\n(\n => 43.242.178.180\n)\n\n => Array\n(\n => 194.110.84.171\n)\n\n => Array\n(\n => 103.68.217.99\n)\n\n => Array\n(\n => 182.182.27.59\n)\n\n => Array\n(\n => 119.152.139.146\n)\n\n => Array\n(\n => 39.37.131.1\n)\n\n => Array\n(\n => 106.210.99.47\n)\n\n => Array\n(\n => 103.225.176.68\n)\n\n => Array\n(\n => 42.111.23.67\n)\n\n => Array\n(\n => 223.225.37.57\n)\n\n => Array\n(\n => 114.79.1.247\n)\n\n => Array\n(\n => 157.42.28.39\n)\n\n => Array\n(\n => 47.15.13.68\n)\n\n => Array\n(\n => 223.230.151.59\n)\n\n => Array\n(\n => 115.186.7.112\n)\n\n => Array\n(\n => 111.92.78.33\n)\n\n => Array\n(\n => 119.160.117.249\n)\n\n => Array\n(\n => 103.150.209.45\n)\n\n => Array\n(\n => 182.189.22.170\n)\n\n => Array\n(\n => 49.144.108.82\n)\n\n => Array\n(\n => 39.49.75.65\n)\n\n => Array\n(\n => 39.52.205.223\n)\n\n => Array\n(\n => 49.48.247.53\n)\n\n => Array\n(\n => 5.149.250.222\n)\n\n => Array\n(\n => 47.15.187.153\n)\n\n => Array\n(\n => 103.70.86.101\n)\n\n => Array\n(\n => 112.196.158.138\n)\n\n => Array\n(\n => 156.241.242.139\n)\n\n => Array\n(\n => 157.33.205.213\n)\n\n => Array\n(\n => 39.53.206.247\n)\n\n => Array\n(\n => 157.45.83.132\n)\n\n => Array\n(\n => 49.36.220.138\n)\n\n => Array\n(\n => 202.47.47.118\n)\n\n => Array\n(\n => 182.185.233.224\n)\n\n => Array\n(\n => 182.189.30.99\n)\n\n => Array\n(\n => 223.233.68.178\n)\n\n => Array\n(\n => 161.35.139.87\n)\n\n => Array\n(\n => 121.46.65.124\n)\n\n => Array\n(\n => 5.195.154.87\n)\n\n => Array\n(\n => 103.46.236.71\n)\n\n => Array\n(\n => 195.114.147.119\n)\n\n => Array\n(\n => 195.85.219.35\n)\n\n => Array\n(\n => 111.119.183.34\n)\n\n => Array\n(\n => 39.34.158.41\n)\n\n => Array\n(\n => 180.178.148.13\n)\n\n => Array\n(\n => 122.161.66.166\n)\n\n => Array\n(\n => 185.233.18.1\n)\n\n => Array\n(\n => 146.196.34.119\n)\n\n => Array\n(\n => 27.6.253.159\n)\n\n => Array\n(\n => 198.8.92.156\n)\n\n => Array\n(\n => 106.206.179.160\n)\n\n => Array\n(\n => 202.164.133.53\n)\n\n => Array\n(\n => 112.196.141.214\n)\n\n => Array\n(\n => 95.135.15.148\n)\n\n => Array\n(\n => 111.92.119.165\n)\n\n => Array\n(\n => 84.17.34.18\n)\n\n => Array\n(\n => 49.36.232.117\n)\n\n => Array\n(\n => 122.180.235.92\n)\n\n => Array\n(\n => 89.187.163.177\n)\n\n => Array\n(\n => 103.217.238.38\n)\n\n => Array\n(\n => 103.163.248.115\n)\n\n => Array\n(\n => 156.146.59.10\n)\n\n => Array\n(\n => 223.233.68.183\n)\n\n => Array\n(\n => 103.12.198.92\n)\n\n => Array\n(\n => 42.111.9.221\n)\n\n => Array\n(\n => 111.92.77.242\n)\n\n => Array\n(\n => 192.142.128.26\n)\n\n => Array\n(\n => 182.69.195.139\n)\n\n => Array\n(\n => 103.209.83.110\n)\n\n => Array\n(\n => 207.244.71.80\n)\n\n => Array\n(\n => 41.140.106.29\n)\n\n => Array\n(\n => 45.118.167.65\n)\n\n => Array\n(\n => 45.118.167.70\n)\n\n => Array\n(\n => 157.37.159.180\n)\n\n => Array\n(\n => 103.217.178.194\n)\n\n => Array\n(\n => 27.255.165.94\n)\n\n => Array\n(\n => 45.133.7.42\n)\n\n => Array\n(\n => 43.230.65.168\n)\n\n => Array\n(\n => 39.53.196.221\n)\n\n => Array\n(\n => 42.111.17.83\n)\n\n => Array\n(\n => 110.39.12.34\n)\n\n => Array\n(\n => 45.118.158.169\n)\n\n => Array\n(\n => 202.142.110.165\n)\n\n => Array\n(\n => 106.201.13.212\n)\n\n => Array\n(\n => 103.211.14.94\n)\n\n => Array\n(\n => 160.202.37.105\n)\n\n => Array\n(\n => 103.99.199.34\n)\n\n => Array\n(\n => 183.83.45.104\n)\n\n => Array\n(\n => 49.36.233.107\n)\n\n => Array\n(\n => 182.68.21.51\n)\n\n => Array\n(\n => 110.227.93.182\n)\n\n => Array\n(\n => 180.178.144.251\n)\n\n => Array\n(\n => 129.0.102.0\n)\n\n => Array\n(\n => 124.253.105.176\n)\n\n => Array\n(\n => 105.156.139.225\n)\n\n => Array\n(\n => 208.117.87.154\n)\n\n => Array\n(\n => 138.68.185.17\n)\n\n => Array\n(\n => 43.247.41.207\n)\n\n => Array\n(\n => 49.156.106.105\n)\n\n => Array\n(\n => 223.238.197.124\n)\n\n => Array\n(\n => 202.47.39.96\n)\n\n => Array\n(\n => 223.226.131.80\n)\n\n => Array\n(\n => 122.161.48.139\n)\n\n => Array\n(\n => 106.201.144.12\n)\n\n => Array\n(\n => 122.178.223.244\n)\n\n => Array\n(\n => 195.181.164.65\n)\n\n => Array\n(\n => 106.195.12.187\n)\n\n => Array\n(\n => 124.253.48.48\n)\n\n => Array\n(\n => 103.140.30.214\n)\n\n => Array\n(\n => 180.178.147.132\n)\n\n => Array\n(\n => 138.197.139.130\n)\n\n => Array\n(\n => 5.254.2.138\n)\n\n => Array\n(\n => 183.81.93.25\n)\n\n => Array\n(\n => 182.70.39.254\n)\n\n => Array\n(\n => 106.223.87.131\n)\n\n => Array\n(\n => 106.203.91.114\n)\n\n => Array\n(\n => 196.70.137.128\n)\n\n => Array\n(\n => 150.242.62.167\n)\n\n => Array\n(\n => 184.170.243.198\n)\n\n => Array\n(\n => 59.89.30.66\n)\n\n => Array\n(\n => 49.156.112.201\n)\n\n => Array\n(\n => 124.29.212.168\n)\n\n => Array\n(\n => 103.204.170.238\n)\n\n => Array\n(\n => 124.253.116.81\n)\n\n => Array\n(\n => 41.248.102.107\n)\n\n => Array\n(\n => 119.160.100.51\n)\n\n => Array\n(\n => 5.254.40.91\n)\n\n => Array\n(\n => 103.149.154.25\n)\n\n => Array\n(\n => 103.70.41.28\n)\n\n => Array\n(\n => 103.151.234.42\n)\n\n => Array\n(\n => 39.37.142.107\n)\n\n => Array\n(\n => 27.255.186.115\n)\n\n => Array\n(\n => 49.15.193.151\n)\n\n => Array\n(\n => 103.201.146.115\n)\n\n => Array\n(\n => 223.228.177.70\n)\n\n => Array\n(\n => 182.179.141.37\n)\n\n => Array\n(\n => 110.172.131.126\n)\n\n => Array\n(\n => 45.116.232.0\n)\n\n => Array\n(\n => 193.37.32.206\n)\n\n => Array\n(\n => 119.152.62.246\n)\n\n => Array\n(\n => 180.178.148.228\n)\n\n => Array\n(\n => 195.114.145.120\n)\n\n => Array\n(\n => 122.160.49.194\n)\n\n => Array\n(\n => 103.240.237.17\n)\n\n => Array\n(\n => 103.75.245.238\n)\n\n => Array\n(\n => 124.253.215.148\n)\n\n => Array\n(\n => 45.118.165.146\n)\n\n => Array\n(\n => 103.75.244.111\n)\n\n => Array\n(\n => 223.185.7.42\n)\n\n => Array\n(\n => 139.5.240.165\n)\n\n => Array\n(\n => 45.251.117.204\n)\n\n => Array\n(\n => 132.154.71.227\n)\n\n => Array\n(\n => 178.92.100.97\n)\n\n => Array\n(\n => 49.48.248.42\n)\n\n => Array\n(\n => 182.190.109.252\n)\n\n => Array\n(\n => 43.231.57.209\n)\n\n => Array\n(\n => 39.37.185.133\n)\n\n => Array\n(\n => 123.17.79.174\n)\n\n => Array\n(\n => 180.178.146.215\n)\n\n => Array\n(\n => 41.248.83.40\n)\n\n => Array\n(\n => 103.255.4.79\n)\n\n => Array\n(\n => 103.39.119.233\n)\n\n => Array\n(\n => 85.203.44.24\n)\n\n => Array\n(\n => 93.74.18.246\n)\n\n => Array\n(\n => 95.142.120.51\n)\n\n => Array\n(\n => 202.47.42.57\n)\n\n => Array\n(\n => 41.202.219.253\n)\n\n => Array\n(\n => 154.28.188.182\n)\n\n => Array\n(\n => 14.163.178.106\n)\n\n => Array\n(\n => 118.185.57.226\n)\n\n => Array\n(\n => 49.15.141.102\n)\n\n => Array\n(\n => 182.189.86.47\n)\n\n => Array\n(\n => 111.88.68.79\n)\n\n => Array\n(\n => 156.146.59.8\n)\n\n => Array\n(\n => 119.152.62.82\n)\n\n => Array\n(\n => 49.207.128.103\n)\n\n => Array\n(\n => 203.212.30.234\n)\n\n => Array\n(\n => 41.202.219.254\n)\n\n => Array\n(\n => 103.46.203.10\n)\n\n => Array\n(\n => 112.79.141.15\n)\n\n => Array\n(\n => 103.68.218.75\n)\n\n => Array\n(\n => 49.35.130.14\n)\n\n => Array\n(\n => 172.247.129.90\n)\n\n => Array\n(\n => 116.90.74.214\n)\n\n => Array\n(\n => 180.178.142.242\n)\n\n => Array\n(\n => 111.119.183.59\n)\n\n => Array\n(\n => 117.5.103.189\n)\n\n => Array\n(\n => 203.110.93.146\n)\n\n => Array\n(\n => 188.163.97.86\n)\n\n => Array\n(\n => 124.253.90.47\n)\n\n => Array\n(\n => 139.167.249.160\n)\n\n => Array\n(\n => 103.226.206.55\n)\n\n => Array\n(\n => 154.28.188.191\n)\n\n => Array\n(\n => 182.190.197.205\n)\n\n => Array\n(\n => 111.119.183.33\n)\n\n => Array\n(\n => 14.253.254.64\n)\n\n => Array\n(\n => 117.237.197.246\n)\n\n => Array\n(\n => 172.105.53.82\n)\n\n => Array\n(\n => 124.253.207.164\n)\n\n => Array\n(\n => 103.255.4.33\n)\n\n => Array\n(\n => 27.63.131.206\n)\n\n => Array\n(\n => 103.118.170.99\n)\n\n => Array\n(\n => 111.119.183.55\n)\n\n => Array\n(\n => 14.182.101.109\n)\n\n => Array\n(\n => 175.107.223.199\n)\n\n => Array\n(\n => 39.57.168.94\n)\n\n => Array\n(\n => 122.182.213.139\n)\n\n => Array\n(\n => 112.79.214.237\n)\n\n => Array\n(\n => 27.6.252.22\n)\n\n => Array\n(\n => 89.163.212.83\n)\n\n => Array\n(\n => 182.189.23.1\n)\n\n => Array\n(\n => 49.15.222.253\n)\n\n => Array\n(\n => 125.63.97.110\n)\n\n => Array\n(\n => 223.233.65.159\n)\n\n => Array\n(\n => 139.99.159.18\n)\n\n => Array\n(\n => 45.118.165.137\n)\n\n => Array\n(\n => 39.52.2.167\n)\n\n => Array\n(\n => 39.57.141.24\n)\n\n => Array\n(\n => 27.5.32.145\n)\n\n => Array\n(\n => 49.36.212.33\n)\n\n => Array\n(\n => 157.33.218.32\n)\n\n => Array\n(\n => 116.71.4.122\n)\n\n => Array\n(\n => 110.93.244.176\n)\n\n => Array\n(\n => 154.73.203.156\n)\n\n => Array\n(\n => 136.158.30.235\n)\n\n => Array\n(\n => 122.161.53.72\n)\n\n => Array\n(\n => 106.203.203.156\n)\n\n => Array\n(\n => 45.133.7.22\n)\n\n => Array\n(\n => 27.255.180.69\n)\n\n => Array\n(\n => 94.46.244.3\n)\n\n => Array\n(\n => 43.242.178.157\n)\n\n => Array\n(\n => 171.79.189.215\n)\n\n => Array\n(\n => 37.117.141.89\n)\n\n => Array\n(\n => 196.92.32.64\n)\n\n => Array\n(\n => 154.73.203.157\n)\n\n => Array\n(\n => 183.83.176.14\n)\n\n => Array\n(\n => 106.215.84.145\n)\n\n => Array\n(\n => 95.142.120.12\n)\n\n => Array\n(\n => 190.232.110.94\n)\n\n => Array\n(\n => 179.6.194.47\n)\n\n => Array\n(\n => 103.62.155.172\n)\n\n => Array\n(\n => 39.34.156.177\n)\n\n => Array\n(\n => 122.161.49.120\n)\n\n => Array\n(\n => 103.58.155.253\n)\n\n => Array\n(\n => 175.107.226.20\n)\n\n => Array\n(\n => 206.81.28.165\n)\n\n => Array\n(\n => 49.36.216.36\n)\n\n => Array\n(\n => 104.223.95.178\n)\n\n => Array\n(\n => 122.177.69.35\n)\n\n => Array\n(\n => 39.57.163.107\n)\n\n => Array\n(\n => 122.161.53.35\n)\n\n => Array\n(\n => 182.190.102.13\n)\n\n => Array\n(\n => 122.161.68.95\n)\n\n => Array\n(\n => 154.73.203.147\n)\n\n => Array\n(\n => 122.173.125.2\n)\n\n => Array\n(\n => 117.96.140.189\n)\n\n => Array\n(\n => 106.200.244.10\n)\n\n => Array\n(\n => 110.36.202.5\n)\n\n => Array\n(\n => 124.253.51.144\n)\n\n => Array\n(\n => 176.100.1.145\n)\n\n => Array\n(\n => 156.146.59.20\n)\n\n => Array\n(\n => 122.176.100.151\n)\n\n => Array\n(\n => 185.217.117.237\n)\n\n => Array\n(\n => 49.37.223.97\n)\n\n => Array\n(\n => 101.50.108.80\n)\n\n => Array\n(\n => 124.253.155.88\n)\n\n => Array\n(\n => 39.40.208.96\n)\n\n => Array\n(\n => 122.167.151.154\n)\n\n => Array\n(\n => 172.98.89.13\n)\n\n => Array\n(\n => 103.91.52.6\n)\n\n => Array\n(\n => 106.203.84.5\n)\n\n => Array\n(\n => 117.216.221.34\n)\n\n => Array\n(\n => 154.73.203.131\n)\n\n => Array\n(\n => 223.182.210.117\n)\n\n => Array\n(\n => 49.36.185.208\n)\n\n => Array\n(\n => 111.119.183.30\n)\n\n => Array\n(\n => 39.42.107.13\n)\n\n => Array\n(\n => 39.40.15.174\n)\n\n => Array\n(\n => 1.38.244.65\n)\n\n => Array\n(\n => 49.156.75.252\n)\n\n => Array\n(\n => 122.161.51.99\n)\n\n => Array\n(\n => 27.73.78.57\n)\n\n => Array\n(\n => 49.48.228.70\n)\n\n => Array\n(\n => 111.119.183.18\n)\n\n => Array\n(\n => 116.204.252.218\n)\n\n => Array\n(\n => 73.173.40.248\n)\n\n => Array\n(\n => 223.130.28.81\n)\n\n => Array\n(\n => 202.83.58.81\n)\n\n => Array\n(\n => 45.116.233.31\n)\n\n => Array\n(\n => 111.119.183.1\n)\n\n => Array\n(\n => 45.133.7.66\n)\n\n => Array\n(\n => 39.48.204.174\n)\n\n => Array\n(\n => 37.19.213.30\n)\n\n => Array\n(\n => 111.119.183.22\n)\n\n => Array\n(\n => 122.177.74.19\n)\n\n => Array\n(\n => 124.253.80.59\n)\n\n => Array\n(\n => 111.119.183.60\n)\n\n => Array\n(\n => 157.39.106.191\n)\n\n => Array\n(\n => 157.47.86.121\n)\n\n => Array\n(\n => 47.31.159.100\n)\n\n => Array\n(\n => 106.214.85.144\n)\n\n => Array\n(\n => 182.189.22.197\n)\n\n => Array\n(\n => 111.119.183.51\n)\n\n => Array\n(\n => 202.47.35.57\n)\n\n => Array\n(\n => 42.108.33.220\n)\n\n => Array\n(\n => 180.178.146.158\n)\n\n => Array\n(\n => 124.253.184.239\n)\n\n => Array\n(\n => 103.165.20.8\n)\n\n => Array\n(\n => 94.178.239.156\n)\n\n => Array\n(\n => 72.255.41.142\n)\n\n => Array\n(\n => 116.90.107.102\n)\n\n => Array\n(\n => 39.36.164.250\n)\n\n => Array\n(\n => 124.253.195.172\n)\n\n => Array\n(\n => 203.142.218.149\n)\n\n => Array\n(\n => 157.43.165.180\n)\n\n => Array\n(\n => 39.40.242.57\n)\n\n => Array\n(\n => 103.92.43.150\n)\n\n => Array\n(\n => 39.42.133.202\n)\n\n => Array\n(\n => 119.160.66.11\n)\n\n => Array\n(\n => 138.68.3.7\n)\n\n => Array\n(\n => 210.56.125.226\n)\n\n => Array\n(\n => 157.50.4.249\n)\n\n => Array\n(\n => 124.253.81.162\n)\n\n => Array\n(\n => 103.240.235.141\n)\n\n => Array\n(\n => 132.154.128.20\n)\n\n => Array\n(\n => 49.156.115.37\n)\n\n => Array\n(\n => 45.133.7.48\n)\n\n => Array\n(\n => 122.161.49.137\n)\n\n => Array\n(\n => 202.47.46.31\n)\n\n => Array\n(\n => 192.140.145.148\n)\n\n => Array\n(\n => 202.14.123.10\n)\n\n => Array\n(\n => 122.161.53.98\n)\n\n => Array\n(\n => 124.253.114.113\n)\n\n => Array\n(\n => 103.227.70.34\n)\n\n => Array\n(\n => 223.228.175.227\n)\n\n => Array\n(\n => 157.39.119.110\n)\n\n => Array\n(\n => 180.188.224.231\n)\n\n => Array\n(\n => 132.154.188.85\n)\n\n => Array\n(\n => 197.210.227.207\n)\n\n => Array\n(\n => 103.217.123.177\n)\n\n => Array\n(\n => 124.253.85.31\n)\n\n => Array\n(\n => 123.201.105.97\n)\n\n => Array\n(\n => 39.57.190.37\n)\n\n => Array\n(\n => 202.63.205.248\n)\n\n => Array\n(\n => 122.161.51.100\n)\n\n => Array\n(\n => 39.37.163.97\n)\n\n => Array\n(\n => 43.231.57.173\n)\n\n => Array\n(\n => 223.225.135.169\n)\n\n => Array\n(\n => 119.160.71.136\n)\n\n => Array\n(\n => 122.165.114.93\n)\n\n => Array\n(\n => 47.11.77.102\n)\n\n => Array\n(\n => 49.149.107.198\n)\n\n => Array\n(\n => 192.111.134.206\n)\n\n => Array\n(\n => 182.64.102.43\n)\n\n => Array\n(\n => 124.253.184.111\n)\n\n => Array\n(\n => 171.237.97.228\n)\n\n => Array\n(\n => 117.237.237.101\n)\n\n => Array\n(\n => 49.36.33.19\n)\n\n => Array\n(\n => 103.31.101.241\n)\n\n => Array\n(\n => 129.0.207.203\n)\n\n => Array\n(\n => 157.39.122.155\n)\n\n => Array\n(\n => 197.210.85.120\n)\n\n => Array\n(\n => 124.253.219.201\n)\n\n => Array\n(\n => 152.57.75.92\n)\n\n => Array\n(\n => 169.149.195.121\n)\n\n => Array\n(\n => 198.16.76.27\n)\n\n => Array\n(\n => 157.43.192.188\n)\n\n => Array\n(\n => 119.155.244.221\n)\n\n => Array\n(\n => 39.51.242.216\n)\n\n => Array\n(\n => 39.57.180.158\n)\n\n => Array\n(\n => 134.202.32.5\n)\n\n => Array\n(\n => 122.176.139.205\n)\n\n => Array\n(\n => 151.243.50.9\n)\n\n => Array\n(\n => 39.52.99.161\n)\n\n => Array\n(\n => 136.144.33.95\n)\n\n => Array\n(\n => 157.37.205.216\n)\n\n => Array\n(\n => 217.138.220.134\n)\n\n => Array\n(\n => 41.140.106.65\n)\n\n => Array\n(\n => 39.37.253.126\n)\n\n => Array\n(\n => 103.243.44.240\n)\n\n => Array\n(\n => 157.46.169.29\n)\n\n => Array\n(\n => 92.119.177.122\n)\n\n => Array\n(\n => 196.240.60.21\n)\n\n => Array\n(\n => 122.161.6.246\n)\n\n => Array\n(\n => 117.202.162.46\n)\n\n => Array\n(\n => 205.164.137.120\n)\n\n => Array\n(\n => 171.237.79.241\n)\n\n => Array\n(\n => 198.16.76.28\n)\n\n => Array\n(\n => 103.100.4.151\n)\n\n => Array\n(\n => 178.239.162.236\n)\n\n => Array\n(\n => 106.197.31.240\n)\n\n => Array\n(\n => 122.168.179.251\n)\n\n => Array\n(\n => 39.37.167.126\n)\n\n => Array\n(\n => 171.48.8.115\n)\n\n => Array\n(\n => 157.44.152.14\n)\n\n => Array\n(\n => 103.77.43.219\n)\n\n => Array\n(\n => 122.161.49.38\n)\n\n => Array\n(\n => 122.161.52.83\n)\n\n => Array\n(\n => 122.173.108.210\n)\n\n => Array\n(\n => 60.254.109.92\n)\n\n => Array\n(\n => 103.57.85.75\n)\n\n => Array\n(\n => 106.0.58.36\n)\n\n => Array\n(\n => 122.161.49.212\n)\n\n => Array\n(\n => 27.255.182.159\n)\n\n => Array\n(\n => 116.75.230.159\n)\n\n => Array\n(\n => 122.173.152.133\n)\n\n => Array\n(\n => 129.0.79.247\n)\n\n => Array\n(\n => 223.228.163.44\n)\n\n => Array\n(\n => 103.168.78.82\n)\n\n => Array\n(\n => 39.59.67.124\n)\n\n => Array\n(\n => 182.69.19.120\n)\n\n => Array\n(\n => 196.202.236.195\n)\n\n => Array\n(\n => 137.59.225.206\n)\n\n => Array\n(\n => 143.110.209.194\n)\n\n => Array\n(\n => 117.201.233.91\n)\n\n => Array\n(\n => 37.120.150.107\n)\n\n => Array\n(\n => 58.65.222.10\n)\n\n => Array\n(\n => 202.47.43.86\n)\n\n => Array\n(\n => 106.206.223.234\n)\n\n => Array\n(\n => 5.195.153.158\n)\n\n => Array\n(\n => 223.227.127.243\n)\n\n => Array\n(\n => 103.165.12.222\n)\n\n => Array\n(\n => 49.36.185.189\n)\n\n => Array\n(\n => 59.96.92.57\n)\n\n => Array\n(\n => 203.194.104.235\n)\n\n => Array\n(\n => 122.177.72.33\n)\n\n => Array\n(\n => 106.213.126.40\n)\n\n => Array\n(\n => 45.127.232.69\n)\n\n => Array\n(\n => 156.146.59.39\n)\n\n => Array\n(\n => 103.21.184.11\n)\n\n => Array\n(\n => 106.212.47.59\n)\n\n => Array\n(\n => 182.179.137.235\n)\n\n => Array\n(\n => 49.36.178.154\n)\n\n => Array\n(\n => 171.48.7.128\n)\n\n => Array\n(\n => 119.160.57.96\n)\n\n => Array\n(\n => 197.210.79.92\n)\n\n => Array\n(\n => 36.255.45.87\n)\n\n => Array\n(\n => 47.31.219.47\n)\n\n => Array\n(\n => 122.161.51.160\n)\n\n => Array\n(\n => 103.217.123.129\n)\n\n => Array\n(\n => 59.153.16.12\n)\n\n => Array\n(\n => 103.92.43.226\n)\n\n => Array\n(\n => 47.31.139.139\n)\n\n => Array\n(\n => 210.2.140.18\n)\n\n => Array\n(\n => 106.210.33.219\n)\n\n => Array\n(\n => 175.107.203.34\n)\n\n => Array\n(\n => 146.196.32.144\n)\n\n => Array\n(\n => 103.12.133.121\n)\n\n => Array\n(\n => 103.59.208.182\n)\n\n => Array\n(\n => 157.37.190.232\n)\n\n => Array\n(\n => 106.195.35.201\n)\n\n => Array\n(\n => 27.122.14.83\n)\n\n => Array\n(\n => 194.193.44.5\n)\n\n => Array\n(\n => 5.62.43.245\n)\n\n => Array\n(\n => 103.53.80.50\n)\n\n => Array\n(\n => 47.29.142.233\n)\n\n => Array\n(\n => 154.6.20.63\n)\n\n => Array\n(\n => 173.245.203.128\n)\n\n => Array\n(\n => 103.77.43.231\n)\n\n => Array\n(\n => 5.107.166.235\n)\n\n => Array\n(\n => 106.212.44.123\n)\n\n => Array\n(\n => 157.41.60.93\n)\n\n => Array\n(\n => 27.58.179.79\n)\n\n => Array\n(\n => 157.37.167.144\n)\n\n => Array\n(\n => 119.160.57.115\n)\n\n => Array\n(\n => 122.161.53.224\n)\n\n => Array\n(\n => 49.36.233.51\n)\n\n => Array\n(\n => 101.0.32.8\n)\n\n => Array\n(\n => 119.160.103.158\n)\n\n => Array\n(\n => 122.177.79.115\n)\n\n => Array\n(\n => 107.181.166.27\n)\n\n => Array\n(\n => 183.6.0.125\n)\n\n => Array\n(\n => 49.36.186.0\n)\n\n => Array\n(\n => 202.181.5.4\n)\n\n => Array\n(\n => 45.118.165.144\n)\n\n => Array\n(\n => 171.96.157.133\n)\n\n => Array\n(\n => 222.252.51.163\n)\n\n => Array\n(\n => 103.81.215.162\n)\n\n => Array\n(\n => 110.225.93.208\n)\n\n => Array\n(\n => 122.161.48.200\n)\n\n => Array\n(\n => 119.63.138.173\n)\n\n => Array\n(\n => 202.83.58.208\n)\n\n => Array\n(\n => 122.161.53.101\n)\n\n => Array\n(\n => 137.97.95.21\n)\n\n => Array\n(\n => 112.204.167.123\n)\n\n => Array\n(\n => 122.180.21.151\n)\n\n => Array\n(\n => 103.120.44.108\n)\n\n => Array\n(\n => 49.37.220.174\n)\n\n => Array\n(\n => 1.55.255.124\n)\n\n => Array\n(\n => 23.227.140.173\n)\n\n => Array\n(\n => 43.248.153.110\n)\n\n => Array\n(\n => 106.214.93.101\n)\n\n => Array\n(\n => 103.83.149.36\n)\n\n => Array\n(\n => 103.217.123.57\n)\n\n => Array\n(\n => 193.9.113.119\n)\n\n => Array\n(\n => 14.182.57.204\n)\n\n => Array\n(\n => 117.201.231.0\n)\n\n => Array\n(\n => 14.99.198.186\n)\n\n => Array\n(\n => 36.255.44.204\n)\n\n => Array\n(\n => 103.160.236.42\n)\n\n => Array\n(\n => 31.202.16.116\n)\n\n => Array\n(\n => 223.239.49.201\n)\n\n => Array\n(\n => 122.161.102.149\n)\n\n => Array\n(\n => 117.196.123.184\n)\n\n => Array\n(\n => 49.205.112.105\n)\n\n => Array\n(\n => 103.244.176.201\n)\n\n => Array\n(\n => 95.216.15.219\n)\n\n => Array\n(\n => 103.107.196.174\n)\n\n)\n```\nArchive for May, 2010: Monkey Mama*s Monkey Money Blog\n Layout: Blue and Brown (Default) Author's Creation\n Home > Archive: May, 2010\n\n# Archive for May, 2010\n\n## I Figured it Out\n\nJune 1st, 2010 at 12:37 am\n\nI kept feeling like I haven't had as much time as I should!\n\nI finally figured it out - I have been cooking a lot more. Kind of time consuming! (Which doesn't really make much difference in the grand scheme of things, since dh cooks 90%+ of our meals). But, I have been enjoying cooking more, all the same.\n\n--------------------------------------------------\n\nThis weekend was nice. Had a nice visit with my parents on Saturday. Yesterday we went swimming. It was about 90 degrees (after weeks of unusual cold and rain).\n\nToday we stuffed ourselves silly at a friend's Housewarming BBQ.\n\nI had planned to bake up some red potatoes and I have a ton of cabbage salad in the fridge. For dinner - keeping it light.\n\nDh bought a \\$3 watermelon to bring to the BBQ - we ended up bringing about 1/2 of it back home. We can add that to dinner.\n\n----------------------------------------------------\n\nYesterday was the first day it got a little warm in the house, this year. I was disappointed since it was the first \"hot\" day, (the house heated up so quickly) but we managed to be comfortable enough without the AC. I thought we would cave at bedtime - even if we only generally turn it on a few minutes to cool off the upstairs before bed.\n\nBut, we didn't cave, and it turned out to be cooler than expected, today. Was sad not to see the sun, but the weather was \"just right,\" otherwise.\n\nTo get through May without flipping on the AC for a few days, is a new record. Not one I could take credit for. I missed having a little warmer May, but glad it wasn't sweltering, all the same. We've got all summer to swelter. But, kind of glad to say good bye to these grey skies! Next week is looking hot. Time for that AC weather.\n\n## Gearing Up for Busy\n\nMay 29th, 2010 at 02:02 pm\n\nThe month of June is getting a wee bit crazy!\n\nDh is volunteering about 30 hours, nights and weekends. Just seems to be a big volunteer month (Scholastic and Public TV station).\n\nBM has a last day of school BBQ, and a big fundraiser; LM has graduation from preschool (hard to believe!)\n\nDh is organizing some grade school reunion (lord knows why - so unlike him!)\n\nMy work is having a big dinner.\n\nWe are going on our family camp trip for 4 days in Tahoe.\n\nI think I have turned down 10 invitations on the day of June 18. It's like the day all the stars aligned. Some of these things have been scheduled to work around us (work dinner got moved to the 17th?).\n\nOh yeah, dh has a volunteer appreciation dinner (which are always really nice - at the TV station).\n\nI don't remember the last time the kids had a babysitter, and now we have 2 dinners in one month. I think we can arrange a \"trade\" with a neighbor - & have a 15% off coupon for the drop-in place, for the other dinner.\n\n---------------------------------------------------\n\nThis weekend is also turning up a wee bit crazy. I was kind of looking for some quiet/settling down time. Suppose we can try for July.", null, "We can tend to be really hermit-y. You wouldn't know it, but we do have one extrovert child, which forces us to come out of hermithood more than we care for. LOL. So, it's a bit much, but will be good for us all the same.\n\nMy folks are coming up this weekend and we made plans with friends on Monday. Sunday we can have a full day of being hermits - phew!\n\n## This & That\n\nMay 27th, 2010 at 08:25 pm\n\n**So, started both kids on piano lessons. Is going well.\n\nTime is so finite and precious with small kids, my tolerance for using precious time, has been thin the last few years. But that has lightened up quite a bit, with time.\n\nAnyway, I am finding this good practice for me. What I need to do is get back into practicing a bit myself. Though I know I am perfectly capable of teaching, I am a little rusty, and don't have much to show how I was a much more accomplished player at some time or other.\n\nI realized I Am probably in no shape to teach at the moment, but am considering letting the neighbors know that I teach, and starting to offer lessons. Maybe in a year. One or two nights a week. With the uncertain economy and everything, I think it is good to start building the foundation for a side income stream.\n\nOh teaching was so much WORK last time. As all teaching is.\n\nFor now, my kids are the guniea pigs.\n\nI suppose another idea is to contact local teachers and ask if they need a substitute. Or a tutor of sorts. Might be more my speed. I primarily taught 15-minute private lessons to kids in group piano classes, as a student teacher. It would be helpful to network with teachers, I suppose. I've got the experience but no music degree. Not sure how it would be taken, but you don't know until you ask!\n\n---------------------------------------------------\n\n**Well, the weather here has turned manic depressive.\n\n(I suppose I like that term?)\n\nI was sweltering in my car the other day around the noon hour. I Was kind of like, \"oh, it's not hot enough for the AC,\" but whimped out in the end. About 4 hours later, when I left work, it was freezing!!!! I flipped on the heat. At 5pm. Like, I rarley do that in winter! It was so bizarre! A storm had moved in rather quickly. I think it was the shock of the cold - not that it was \"that cold.\"\n\nI skipped aerobics Tuesday because it was pouring rain out of nowhere and I didn't want to deal with the stupid drivers. (My drive home is rather reverse commute, and wide open, but the route to aerobics cuts through some bad traffic). I figured it could take hours, anyway. Accidents, traffic and everything.\n\nToday ain't looking much better. It was rather nice a few days this week. Got in some bike rides and walks, etc. But stormy stormy stormy today.\n\nThat said, should warm up this weekend.\n\n---------------------------------------------------\n\n**This weekend, plans are filling up the schedule:\n\nSaturday - going to a little zoo/park to see a show and some sheep shearing. Free with our membership.\n\nSunday - is supposed to reach 86 degrees. I think Sunday will be a great day for swimming, though I think it is possible they won't heat the pool until Monday? Like, it opens Memorial Day? Hopefully they mean, \"Memorial Day Weekend.\" Usually we get a heat wave and brave the pool anyway in May, but it hasn't been swimming weather at ALL! Well, at 86 degrees, probably fine in the afternoon, heat or no. We like the morning when no one else is there, is all. Giant pool to ourselves!\n\nMonday - Invited to a BBQ\n\n----------------------------------------------------\n\nI'd like to have a no-spend week - until next Thursday. The credit card closes Thursday - I think we spent enough this month. We are like this every month.\n\nBUT, I feel like the forces are working against me.\n\nI keep thinking of little things. Like, I thought the weekend might be nice to cook up some salmon. \\$10/pound. Eh, nevermind. Plus, we should bring something for the BBQ...\n\nWell, will try to keep it low key. I can bring cabbage salad - I got a TON!\n\nIt's just been that kind of week, is all. Haven't been out to lunch in forever, and a friend was available at the last minute, yesterday. Wasn't worth saying no. I had been bugging her to get together for a couple of weeks and hadn't done much lunch since last year (surgery, tax season, everything). But sometimes no-spend weeks are easy peasy, and sometimes not so much. I will be practicing a lot of self control for the next week! Trying, anyway.\n\nOverall, I think we have a nice, low-key weekend plan. Want to get caught up on some house cleaning, too.\n\nMay 23rd, 2010 at 03:42 pm\n\nIn the last couple of weeks, dh made \\$130 with Amazon.\n\nOur disgrunteld ebay buyer (or scammer?) let his complaint expire, so that whole thing is over. We theorize he probably was a scammer, and gave up once we didn't roll over and give him a refund? Either way - he doesn't seem that concerned about it.\n\nIt's for the best - I think Amazon has been easier, and more profitable, for our purposes. Not sure we would have thought to try it, if not for bad e-bay experiences of late.\n\nDh also made a \\$70 craigslist sale, today.\n\nIt's not as grand as it sounds - he took \\$230 from our checking to buy some big game bundle thing, and gave me back about \\$250 in the end. HE did it more to keep some of the good stuff that came in the bundle, than for a profit. So, with the \\$70 sale, it's probably a rather average \\$100 profit month.\n\n----------------------------------------------------\n\nIn other news, we had a good month. I don't keep cash around, nor do I keep any money in my checking (just works best for us - we are aggressive on the savings), but BM needed \\$20 for a yearbook. I actually don't mind the yearbook purchase. We actually don't buy the school pics - could care less - but the yearbook is a nice way to get a picture of his class and all that. \\$20 is pretty reasonable, I think.\n\nAnyway, it is no biggie, but it was going to be a pain to transfer \\$20 over, etc., etc.\n\nWell, lo and behold, I got some random \\$21 refund in the mail yesterday. A RX refund from our HMO? No idea what the heck it is.\n\nWell, that makes it easy! It's been a while since things have worked out like that. But often, they just do.\n\nI was actually wary, because it was clearly some blue statement or notice, which I had never seen. \"What the heck is this?\" I thought. I was nervous. I actually thought it was a \"late/overdue statement\" because a \\$1500 payment I had made through the mail hadn't cleared yet.\n\nInstead, it was a check. Yup - never got a refund from them before!\n\nThey have seemed to have lots of problems adjusting to their new deductible/out-of-pockets this year. I am sure it stems from that. Maybe a RX purchase that should have been reduced to a co-pay since we had used our deductible? I don't know. We generally do not have prescriptions, but we all had pink eye twice, BM got an inhaler, and dh got some pain meds after surgery. So lord knows which prescription this applies to. Any other time it would probably be obvious - but we are a mess this year! I presume the inhaler since it cost like 3 times as much as LM's had. I suppose that was a mistake.\n\n-----------------------------------------------------\n\nWe decided to get a new computer monitor for Father's Day. We primarily use one computer, and 2 of our computers have monitors circa 1980.\n\nThis is something we have been meaning to purchase for a long time, and I see our window of opportunity closing, as our finances tighten a bit.\n\nMy idea was to just buy it because it would probably save energy. (Changing light bulbs was a bust because apparently we don't use them enough. That, and our non-CFLs were apparently quite energy efficient, as is). The computer monitor is something clearly heavily used and ancient. I think we have better odds to improve on it!\n\nI think dh has a modern monitor in his office for video editing and such. (Now that I think about it - we only bought that one because one ancient monitor went dead after nursing it along for many years). When I brought up the idea to dh, he really liked it, since he plans to use the main computer for more editing. Basically, I didn't realize he was kind of thinking of getting a monitor anyway - for his own working purposes.\n\nWe will pay for it with the first month of \"no preschool.\" He's already picked one out - I asked him to card it in June or after, is all. So I don't have to touch savings for it.\n\nI think that will cool it on big purchases for us. Last year was really good financially, and this year has not been so good. We used last year's bounty to really catch up on some stuff around the house. So, it's been a really good run. But we are happy to cool it for while.\n\nWe also discussed keeping it a low key/close to home year. We re-instituted a vacation budget in the last couple of years (survived many years without one) and it's kind of the first thing to go. Last year we used it more for season pass/amusement park type stuff. Staycation. We didn't even go on a big trip. But, I was telling dh last night that maybe it's best his surgery used up so much of my vacation time - and this big Hawaii trip his mom has planned. Because, I think we should contract it in and be a little less spendy this year.\n\nI can't even manage a day off for an amusement park (avoid places like that on the weekend - can't stand crowds). So, works out.\n\n-----------------------------------------------------\n\nWe will survive just fine!\n\nWe already went to Monterey Bay Aquarium (which is quite a treat!).\n\nWe have memberships to the local parks/zoos, museums, and can spend our summer at the pool and bike riding by the lake. Cost is like \\$100 vs. \\$1500! (Our vacation budget is only \\$1500 - and we generally do the memberships on top of that, anyway).\n\nIt's fun to splurge once in a while, but it doesn't have to be all the time.\n\nI think this is also an easy year to be low key. IT has more to do with my work situation than anything (which we haven't vocalized to anyone, so no one really knows our compensation has been hit. I might have talked about it to my mom, but that is it). That said, dh's surgery situation hasn't been that huge a hit, but people kind of expect us to be broke because of it. It's always easier to be frugal when people expect that you are broke.", null, "So, phew.\n\n## Borrowing Ideas from Thriftorama\n\nMay 22nd, 2010 at 05:09 pm\n\nI am in the way super early stages of thinking about gardening.\n\nI've never had much luck in the garden, and don't consider it really my thing. But as I look for new ways to economize, gardening is kind of the next obvious step. Dh is also a little more into it, and has always liked the idea of growing a garden with the kids.\n\n\"Sacramento's long growing season (240+ days) gives us two major vegetable planting periods� spring and fall. As you'll see from the calendar below, however, there's actually something edible to plant every month of the year.\"\n\n{I am having no luck pasting the link here - something like sacramento gardening dot com.}\n\nI suppose we will start with peppers (easy and May is the time to plant). Next would be carrots, radishes, and deciding on some herbs. Those seem obvious, anyway.\n\nAnyway, yesterday, I came across a blog entry on gardening (on another local blog). The blog mentioned it is nearly impossible to grow edibles in our soil, and went into \"frugal\" ways to build raised garden beds. May be on the fugal side, but seemed pretty complicated to me. Ugh.\n\nI thought, \"there has got to be something more frugal!\" So I googled \"cheap raised garden beds,\" or something of the like, and probably got a zillion ideas on re-using recycled materials. Much more my speed!\n\nOF course, then I came across the best idea of all:", null, "I have been storing these forever (to freecycle, or use, at some point. I might have at least 6 laying around the house right now (some white ones too!). We will probably cut them in half (top half/bottom half) and make holes in the bottoms of them.\n\nSo, today I was ruminating on where to make space for all these plastic containers, in our soil. I am sure we will invest in some nicer looking ones for the patio and such. These will be good around the yard as we find places to sneak in some veggies around the yard.\n\nI thought of Thriftorama's plan to hide her veggies behind bushes in her front yard (you know, due to the \"no gardens in the front yard\" thing to which I have the feeling my HOA would subscribe to). Even if that wasn't an issue, fact is, we have very little yard to grow anything out front.\n\nSo I Was ruminating, and then it hit me! I totally forgot that we had some unused space in our front yard, hiding behind a pile of bushes. We used to fret about what to do with that space and eventually just figured no one could see it so who cares.\n\nding ding ding!!!", null, "We will have some weeds to clear out - but it ain't half bad - looks like it even gets water back there?", null, "", null, "SO, I have to think Thriftorama for that idea.\n\nTime for a secret garden!", null, "-------------------------------------------------\n\nFinally, I need all the luck in the world. The only thing I have successfully planted, ever, is my wildflowers (from seed). As I mentioned earlier. While taking pictures, I snapped a pic.\n\nMy little wildflower jungle!", null, "", null, "Hopefully I can expand my horizons beyond wildflowers...\n\nAnyway, if nothing else, I feel relieved that it looks like we can start gardening, whenever. Summer and fall is a good time for lots of plantings. Yay!\n\n## Birthday, Check\n\nMay 20th, 2010 at 11:50 pm\n\nI didn't go the cheap route, but I did go the SIMPLE route.\n\nGot the kids' party reserved.\n\nWas going to say, now all we have to do is show up. BUT, I suppose I need to send out invites first. Then track RSVPs, and then show up.\n\n& if I drive down some day at lunch (not too far from the office) I can pick up 15 invitations.\n\n-------------------------------------------------\n\nWe've got room for 15 kids, including my own 2.\n\nWe want to invite about 45 kids. Is that insane?\n\nThing is, the 20 kids from BM's class, and about 10 from LM's - I don't expect most of those to show. It's hard to say though. Last year we did a weekday party (only a few showed). On the flip side, even if Saturday is more popular, it is still in the middle of summer when everyone is on vacation.\n\nAlso includes cousins in another city who likely will not come.\n\ncousins = 4\nfriends = 7\nmy kids = 2\n\nThat leaves 2 random kids to show up. More like 6 since I don't expect the cousins to show.\n\nFor another \\$45 we can double the size of the party, up to a week before. So I will just hope people respect the RSVP! I wouldn't mind doubling it if the turnout is big. I just don't expect it to be big.\n\n---------------------------------------------------\n\nDh has scored a bunch of video games and books for the kids, and has some Scholastic shifts this next month (where he gets paid with games and books). SO, I ain't shopping for them or anything. The in-laws will also spoil them rotten.\n\nI'd say, that was the easiest birthday to plan, ever! It took a 10-minute phone call.", null, "" ]
[ null, "https://www.savingadvice.com/forums/core/images/smilies/biggrin.png", null, "https://www.savingadvice.com/forums/core/images/smilies/wink.png", null, "https://www.savingadvice.com/blogs/image.php", null, "https://www.savingadvice.com/blogs/image.php", null, "https://www.savingadvice.com/forums/core/images/smilies/biggrin.png", null, "https://www.savingadvice.com/blogs/image.php", null, "https://www.savingadvice.com/forums/core/images/smilies/wink.png", null, "https://www.savingadvice.com/forums/core/images/smilies/biggrin.png", null, "https://www.savingadvice.com/blogs/image.php", null, "https://www.savingadvice.com/forums/core/images/smilies/biggrin.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.97855383,"math_prob":0.9982487,"size":35855,"snap":"2021-43-2021-49","text_gpt3_token_len":8415,"char_repetition_ratio":0.12853198,"word_repetition_ratio":0.9700688,"special_character_ratio":0.2705062,"punctuation_ratio":0.123083025,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9991134,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-25T20:06:48Z\",\"WARC-Record-ID\":\"<urn:uuid:aade5bd4-dce9-4d4e-84ac-5a7e12908fad>\",\"Content-Length\":\"1049178\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1f320fc1-60d1-42ca-80fc-ed2578dd2d3d>\",\"WARC-Concurrent-To\":\"<urn:uuid:b939d8b4-0106-4a75-9777-82e9ada873f1>\",\"WARC-IP-Address\":\"173.231.200.26\",\"WARC-Target-URI\":\"https://monkeymama.savingadvice.com/2010/05/\",\"WARC-Payload-Digest\":\"sha1:WJO3H5NPGDDICVLHARRUGSQ7Q6CC6MOB\",\"WARC-Block-Digest\":\"sha1:V7EZMJF7T2Q74WYSB23NIQ3JHSXMR32O\",\"WARC-Truncated\":\"length\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323587767.18_warc_CC-MAIN-20211025185311-20211025215311-00319.warc.gz\"}"}
https://www.lmfdb.org/EllipticCurve/Q/90/b/
[ "# Properties\n\n Label 90.b Number of curves 4 Conductor 90 CM no Rank 0 Graph", null, "# Related objects\n\nShow commands for: SageMath\nsage: E = EllipticCurve(\"90.b1\")\n\nsage: E.isogeny_class()\n\n## Elliptic curves in class 90.b\n\nsage: E.isogeny_class().curves\n\nLMFDB label Cremona label Weierstrass coefficients Torsion structure Modular degree Optimality\n90.b1 90b4 [1, -1, 1, -218, -269] 48\n90.b2 90b2 [1, -1, 1, -128, 587] 16\n90.b3 90b1 [1, -1, 1, -8, 11] 8 $$\\Gamma_0(N)$$-optimal\n90.b4 90b3 [1, -1, 1, 52, -53] 24\n\n## Rank\n\nsage: E.rank()\n\nThe elliptic curves in class 90.b have rank $$0$$.\n\n## Modular form90.2.a.b\n\nsage: E.q_eigenform(10)\n\n$$q + q^{2} + q^{4} - q^{5} + 2q^{7} + q^{8} - q^{10} - 6q^{11} - 4q^{13} + 2q^{14} + q^{16} + 6q^{17} - 4q^{19} + O(q^{20})$$\n\n## Isogeny matrix\n\nsage: E.isogeny_class().matrix()\n\nThe $$i,j$$ entry is the smallest degree of a cyclic isogeny between the $$i$$-th and $$j$$-th curve in the isogeny class, in the LMFDB numbering.\n\n$$\\left(\\begin{array}{rrrr} 1 & 3 & 6 & 2 \\\\ 3 & 1 & 2 & 6 \\\\ 6 & 2 & 1 & 3 \\\\ 2 & 6 & 3 & 1 \\end{array}\\right)$$\n\n## Isogeny graph\n\nsage: E.isogeny_graph().plot(edge_labels=True)\n\nThe vertices are labelled with LMFDB labels.", null, "" ]
[ null, "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAoAAAAHgCAYAAAA10dzkAAAABHNCSVQICAgIfAhkiAAAAAlwSFlzAAAPYQAAD2EBqD%2BnaQAAADl0RVh0U29mdHdhcmUAbWF0cGxvdGxpYiB2ZXJzaW9uIDIuMi4zLCBodHRwOi8vbWF0cGxvdGxpYi5vcmcvIxREBQAAIABJREFUeJzt3X%2BU1fWd3/HXgA4dokLkR5aINVpX8Ed%2BwIBs0qQbxriiUX6k2WBE627XiMtG0LTZVJrCYBtIds0KNiHgJt10A6x6agTjUWwV427aQmGAJP6iIUuyGyEyMxtcIyMjcPsH0a6r8uMydy7yeTzOmZMj5873%2B845w5vn/d77vdNQqVQqAQCgGH3qPQAAAL1LAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFOaEeg/A8aNSqaS9vT27d%2B9Od3d3Ghsb079//wwZMiQNDQ31Hg%2BgGPYxhyIAqVpHR0fWrFmTtra2bNiwPhs3bsyuXc%2B/7nEDBw7I6NGjM2bM2DQ3N6elpSWDBw%2Buw8QAxyf7mCPVUKlUKvUegreOSqWStWvXZvHixbnnnnvS3d2d4e8YmjEjzs7okWfn/DPPyMn9m9J44onpfvnlvLC7K09u%2B2k2PrM1G7Zszc%2Be25nGxsZMnTo1M2bMyLhx4zwbBaiCfczREIActlWrVqV17txs/v73c%2BZpw3LD5Mty9YSWDBs86LCPsaOjM8tWr8mSlQ9m27M7Mup970vrvHmZOHFiDScHOL7YxxwtAcghdXZ2ZubMmVmxYkU%2BMnZUbv7kx3LJuOb06VP9PUT79%2B/Pw%2BvacvtffDuPrN%2BUq666KnfccUcGDTr85QVQGvuYniIAOaiVK1fmhunT0/1SVxbdfEOmXdLSoy8RVCqVLFv9aGbdvjT9mpqyZOnSTJ48uceOD3C8sI/pST4GhjdUqVQyf/78TJkyJReec1aeWL4kV0%2B4qMffH9LQ0JBrLv1InlyxJBeec1amTJmSBQsWxPMSgAPsY2qhb2tra2u9h%2BDYUqlUMnv27Nx6662Ze93V%2Bdof3piT39a/puc8uX//XHnxbyZJ5ty2MN3d3Wlp6dlntwBvNfYxtSIAeZ0FCxbk1ltvzR/f%2BKnccu2VvfaXvqGhIR8e/d6c1L8pc768KP369cuHPvShXjk3wLHIPqZWBCCvsXLlylx//fWZe93VueXaK%2BsywwfefV4qqWTObQszatSojBw5si5zANSTfUwtuQmEV3V2dub8887LheeclZV/NLeul/srlUomfbY163%2B0LU8%2B9ZS70YCi2MfUmptAeNXMmTPT/VJXlnzuxrq/16OhoSFLPjcze7q6MmvWrLrOAtDb7GNqTQCS5MCHiq5YsSKLbr7hiD5ItJbeOWRQFt08PcuXL8/9999f73EAeoV9TG/wEjCpVCoZPWpUBjf2ycOL5tf92eY/VKlUcsms2el8uZK2jRuPqdkAepp9TG9xBZCsXbs2m7///dz8yY8dc3%2BhGxoactOVU7Jp8%2BasW7eu3uMA1JR9TG8RgGTx4sU587RhuWRcc71HeUOXjGvOmacNy%2BLFi%2Bs9CkBN2cf0FgFYuI6Ojtxzzz25YfJlR/y7JMfP%2BGxuun1JjSb7//r27Zvpky/L3XffnY6OjpqfD6Aeqt3HvbWLE/v4eCIAC7dmzZp0d3fn6gktPXrcl/fuzee%2B%2Bo28Z9oNOWn8pJx2xVW5dt4fZ3t7Z1XHu2ZCS7q7u/PYY4/16Jzwj33ta8l73pOccsqBr/e/P3nooXpPRQlqtY%2B//d3vZcJNszNkwifS5/0Tsvn//viojmcfHx8EYOHa2toy/B1De/xOs90v7cmmLVvz%2Bd%2B9Km3f/EruXfAf8n//9tlM%2BsPWqo43bPCgnDZ0SNra2np0TvjHhg9PvvjFZMOGA18tLcmkScmTT9Z7Mo53tdrHL3a9lA%2B8%2B/wsmPG7PXI8%2B/j4cEK9B6C%2BNqxfnzEjzq76%2B/fu25dP3/bVLH94Tfr26ZMbPvbR/Mfrr82Ak96W/37Hgtc89o7P/H7G/d6s/M3Pd%2Baf/trQIz7XmJFnZ8OG9VXPCofjiite%2B99f%2BMKBq4Jr1ybnn1%2BfmSjD0ezjN9vFDQ0NuebSjyRJfrLj5z02q3381ucKYMEqlUo2btqY0SOrD8A/f%2BiRnNC3b9Z%2BfWEWfeb3s/Cu%2B/L1%2B1e/4WOf/%2BWLaWhoyMCT31bVuUaPODsb2zbGJxfRW/btS%2B66K3nxxQMvBUOtHO0%2BPpJd3BPs47c%2BVwAL1t7enl27ns/5Z55R9TFOHzokt980PQ0NDRlxxun54Y9/koV33ZdPTbr0NY97aU93bvnan%2BWq3/pwTnlbdQF4wVnvyi927Up7e3uGDj3yK4hwuH74wwPB99JLyUknJffdl5x3Xr2n4nh2tPv4cHdxT7GP3/oEYMF2796dJDm5f1PVxxh3/sjXfFbV%2By84N3%2By4t7s27cvffv2TXLghpBPzlmQ/fv356uf/XTV5zrpV3OuX78%2Bw4YNq/o4lK2pqSnnnnvuQR8zYkSyeXOya1dy773Jtdcmjz9%2B8Ah8%2Bumn09XV1cPTUort27cnqX4fH84u7kmv7GM/829dArBg3d3dSZLGE0%2Bs2Tle3rs3U//9/Gzb/vM8%2BpUvVX31L0kaTzjw43r55Zf31HgUaNSoUdm4ceNBH9PYmJz9q1fixoxJ1q9PFi1Kli598%2B%2BZNm1aNm3a1IOTUqJa7uOe9Mo%2B3rNnT50noVoCsGCNjY1Jku6XX676GOuefOY1/732iafz66eflr59%2B74afz/62bNZ85UvZdCAU45q3u69e5MkDzzwgCuAVK2p6civsFQqyaH%2BnVu%2BfLmrIVRt%2B/btueKKK6rexwfbxbXwyj7u169fTY5P7QnAgvXv3z9J8sLu6v/R%2Btud7fnMoqWZPvmybNyyNV/5b/fnths/lb179%2BW3Z/%2BnbNyyNd%2B57dbs278/P%2B/8uyTJqaecXNWz3F/%2Bas6xY8d6zwk1M3t2cumlyemnJy%2B8cOAmkO9%2BN1l9iPfTH%2BplZTiY4cOHJ6l%2BH7/ZLk6Sv3v%2BhfzNczuzvePA57Bu%2BZufJUl%2BbdDb82uDTq3qfK/s42qeUHFsEIAFGzJkSAYOHJAnt/00Uz78z6s6xjUTLkrXnu6M%2B71Z6dunTz798Ym5fvJl%2BenPn8v9f7U2STLqX814zfes%2BeqX8uHR7z3icz3x1z/J2wcOzJAhQ6qaFQ7Hc88l11yT7NiRDBhw4EOhV69OLr643pNxPDvaffxmuzhJ7v/e/86//k9/8upjP/kfDnxE15zfm5bW666pal77%2BK2voeIe7qJd1NKSU/btybe/NKfeoxzSlM/Nyy9PbMojjzxa71EAepx9TG/yOYCFGzN2bDZs2VrvMQ7Lhme2ZsyYsfUeA6Am7GN6kwAsXHNzc3723M7s6Kjud/T2lh0dnXl2Z3uam5vrPQpATdjH9CYBWLiWlpY0NjZm2eo19R7loL61ek0aGxszfvz4eo8CUBP2Mb1JABZu8ODB%2BcQnPpElKx/M/v376z3OG9q3b1%2BWrnwwU6dOzeDBg%2Bs9DkBN2Mf0JgFIZsyYkW3P7sjD69rqPcobenhdW7Y9uyMzZsw49IMB3sLsY3qLu4BJpVJJ8%2BjRGXRiQx5eNP81v06o3iqVSi6ZNTt/tzfZ0NZ2TM0G0NPsY3qLK4CkoaEhrfPm5ZH1m7L84WPrvSfLVj%2BaR9ZvytzWVssGOO7Zx/QWVwB51bRp0/LQA9/JE8uXZNjgQfUeJ9vbO3PBtBvy0YkTs2zZsnqPA9Br7GNqTQDyqs7Ozpx/3nm58JyzsvKP5tb1GV6lUsmkz7Zm/Y%2B25cmnnsqgQfVfgAC9xT6m1rwEzKsGDRqUJUuX5jvfW5tb/8vyus4y7xvL8sD/XJeld95p2QDFsY%2Bptb6tra2t9R6CY8fIkSPT2NiYObctzEn9m/KBd5/X6zN8ecW9%2BfySb2b%2B/Pm57rrrev38AMcC%2B5haEoC8zgc/%2BMF0d3dnzpcXpZJKfnPUe3rl5YdKpZJ531iWzy/5Zm655ZbMnVvflz0A6s0%2BplYEIK/T0NCQlpaW9OvXL3NuW5hNW36cD49%2Bd07u379m59ze3pmr534pf7rqoSxYsMCyAYh9TO24CYSDWrVqVaZff332dHVl0c3Tc/WEi3p0EVQqlSxb/Whm3b40/ZqasvTOOzNp0qQeOz7A8cI%2BpicJQA6ps7MzM2fOzIoVK/KRsaNy05VTMuE3xqRPn%2BrvIdq3b18eXteWhXfdl0fWb8q0adNyxx135NRTT%2B3ByQGOL/YxPUUActhWrVqVea2t2bR5c848bVimT74s10xoOaLPqNrR0ZlvrV6TpSsfzLZnd2TU%2B96X1nnzMnHixBpODnB8sY85WgKQI1KpVLJu3bosXrw4d999d7q7uzP8HUPTPOKfZfSIs3PBWe/KSf2b0njCCeneuze/3N2VJ/76J9m4ZWs2PLM1z%2B5sT79%2B/TJ16tTMmDEjF154ofeWAFTBPuZoCECq1tHRkcceeywbNmxIW9uGtLW1Zdeu51/3uIEDB6S5uTljxoxNc3Nzxo8fn8GDB9dhYoDjk33MkRKA9JhKpZL29vasX78%2Bl19%2BeR544IGMHTs2Q4YM8awSoBfZxxzKCfUegONHQ0NDhg4dmmHDhiVJhg0blqFDh9Z5KoDy2Mccil8FBwBQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAEIAFAYAQgAUBgBCABQGAFIj2tqasqoUaPS1NRU71EAimYf82YaKpVKpd5DAADQe1wBBAAojAAEACiMAAQAKIwABAAojAAEACiMAKTHLFiQjB2bnHxyMnRoMnlysmVLvacCKItdzOEQgPSYxx9P/uAPkrVrk//xP5K9e5Pf%2Bq3kxRfrPRlAOexiDofPAaRm2tsPPPt8/PHkX/yLek8DUCa7mDfiCiA18/zzB/731FPrOwdAyexi3ogrgNREpZJMmpT84hfJX/1VvacBKJNdzJs5od4DcHz69KeTH/wg%2Bd736j0JQLnsYt6MAKTH3Xhjcv/9yV/%2BZTJ8eL2nASiTXczBCEB6TKVyYOHcd1/y3e8mZ55Z74kAymMXczgEID3mD/4gWbEiWbXqwOdP/fznB/58wICkqam%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%2BfObN%2B%2BPUmyffv27Ny5M5VKpc6TAZTFPuZQGip%2BGqhSR0dH1qxZk7a2tmzYsD4bN27Mrl3Pv%2B5xAwcOyOjRozNmzNg0NzenpaUlgwcPrsPEAMcn%2B5gjJQA5IpVKJWvXrs3ixYtzzz33pLu7O8PfMTRjRpyd0SPPzvlnnpGT%2Bzel8cQT0/3yy3lhd1ee3PbTbHxmazZs2ZqfPbczjY2NmTp1ambMmJFx48aloaGh3v%2B3AN5y7GOOhgDksK1atSqtc%2Bdm8/e/nzNPG5YbJl%2BWqye0ZNjgQYd9jB0dnVm2ek2WrHww257dkVHve19a583LxIkTazg5wPHFPuZoCUAOqbOzMzNnzsyKFSvykbGjcvMnP5ZLxjWnT5/q30K6f//%2BPLyuLbf/xbfzyPpNueqqq3LHHXdk0KDDX14ApbGP6SkCkINauXJlbpg%2BPd0vdWXRzTdk2iUtPfoSQaVSybLVj2bW7UvTr6kpS5YuzeTJk3vs%2BADHC/uYnuQuYN5QpVLJ/PnzM2XKlFx4zll5YvmSXD3hoh5/f0hDQ0OuufQjeXLFklx4zlmZMmVKFixY4E41gF%2Bxj6mFvq2tra31HoJjS6VSyezZs3Prrbdm7nVX52t/eGNOflv/mp7z5P79c%2BXFv5kkmXPbwnR3d6elpWef3QK81djH1IoA5HUWLFiQW2%2B9NX9846dyy7VX9tpf%2BoaGhnx49HtzUv%2BmzPnyovTr1y8f%2BtCHeuXcAMci%2B5haEYC8xsqVK3P99ddn7nVX55Zrr6zLDB9493mppJI5ty3MqFGjMnLkyLrMAVBP9jG15CYQXtXZ2ZnzzzsvF55zVlb%2B0dy6Xu6vVCqZ9NnWrP/Rtjz51FPuRgOKYh9Ta24C4VUzZ85M90tdWfK5G%2Bv%2BXo%2BGhoYs%2BdzM7OnqyqxZs%2Bo6C0Bvs4%2BpNQFIkgMfKrpixYosuvmGI/og0Vp655BBWXTz9Cxfvjz3339/vccB6BX2Mb3BS8CkUqlk9KhRGdzYJw8vml/3Z5v/UKVSySWzZqfz5UraNm48pmYD6Gn2Mb3FFUCydu3abP7%2B93PzJz92zP2FbmhoyE1XTsmmzZuzbt26eo8DUFP2Mb1FAJLFixfnzNOG5ZJxzfUe5Q1dMq45Z542LIsXL673KAA1ZR/TWwRg4To6OnLPPffkhsmXHfHvkhw/47O56fYlNZrs/%2Bvbt2%2BmT74sd999dzo6Omp%2BPoB6qHYf99YuTuzj44kALNyaNWvS3d2dqye09PixW7/%2BrZw79bqcNH5STv2tj%2BfiG/9d1j35TFXHumZCS7q7u/PYY4/18JTwWl/7WvKe9ySnnHLg6/3vTx56qN5TUYJa7uNXTP/iovR5/4QsvOu%2Bqo9hHx8fBGDh2traMvwdQ2typ9k5pw/Pf/43M/KDZUvyV0tuyxnD3pFLZs1O%2By92HfGxhg0elNOGDklbW1uPzwn/0PDhyRe/mGzYcOCrpSWZNCl58sl6T8bxrpb7OElWPv6/8n%2Be2pJ3HuXx7ePjgwAs3Ib16zNmxNlVf//effvy6du%2Bmrdf/C8z%2BJLfzueXfvPVXxx%2B1SXj85ELR%2Bes04bl/LPelT%2BZdX3%2B/sXd%2BcHWbVWda8zIs7Nhw/qqZ4XDccUVyWWXJeecc%2BDrC19ITjopWbu23pNxvDuafXywXZwkz%2B7syI1fXpxlrX%2BYE0/oe9Sz2sdvfQKwYJVKJRs3bczokdUH4J8/9EhO6Ns3a7%2B%2BMIs%2B8/tZeNd9%2Bfr9q1/3uO6XX86dKx/KgJPelvf%2B%2BllVnWv0iLOzsW1jfHIRvWXfvuSuu5IXXzzwUjDUytHu44Pt4v379%2Bdf3frH%2BbfTPp7zz3pXj8xrH7/1nVDvAaif9vb27Nr1fM4/84yqj3H60CG5/abpaWhoyIgzTs8Pf/yTLLzrvnxq0qVJkge%2Bty6fnLMgu1/ak2GDTs1/XzQ/gwcOqOpcF5z1rvxi1660t7dn6NChVc8Mh/LDHx4IvpdeOnD17777kvPOq/dUHM%2BOdh8fbBd/6Vv35IS%2BfTPzE5N6bF77%2BK1PABZs9%2B7dSZKT%2BzdVfYxx5498zWdVvf%2BCc/MnK%2B7Nvn370rdv34xvfm82/dfF6Xj%2B%2Bfzpqocy9fPzs/brizL01IFHfK6TfjXn%2BvXrM2zYsKpnpmxNTU0599xzD/qYESOSzZuTXbuSe%2B9Nrr02efzxg0fg008/na6urh6ellJs3749SfX7%2BM12cdszP8od96xK2ze/0qOfK/jKPvYz/9YlAAvW3d2dJGk88cSaneNtTf8kZ5/%2Bzpx9%2BjvzGxecm3N%2B%2B1/nG99ZnVuuvfKIj9V4woEf18svv7ynx6Qgo0aNysaNGw/6mMbG5OxfvRI3Zkyyfn2yaFGydOmbf8%2B0adOyadOmHpyUEvX0Pv7uxh9k5y925Ywp17z6Z/v27c%2B//c9/mkV335dt9/15Vcd9ZR/v2bOnR%2Bak9wnAgjU2NiY58P68av3jj3VZ%2B8TT%2BfXTT0vfvm/8JuNKpZI9VZ6ve%2B/eJMkDDzzgCiBVa2o68isslUpyqH/nli9f7moIVdu%2BfXuuuOKKqvfxm%2B3i3/noxa/7UOkJN/37XH3pRfndj15c9byv7ON%2B/fpVfQzqSwAWrH///kmSF3ZX/4/W3%2B5sz2cWLc30yZdl45at%2Bcp/uz%2B33fipvNj1Ur7wzb/IxA/9RoYNOjWdf//3WXzvA/lZe0d%2Bu%2BVDVZ3rl7%2Bac%2BzYsd5zQs3Mnp1cemly%2BunJCy8cuAnku99NVr/%2B3qbXONTLynAww4cPT1L9Pn6zXTxowCkZNOCU1zz2xBP65tdOfXtGnHF61fO%2Bso%2BreULFsUEAFmzIkCEZOHBAntz200z58D%2Bv6hjXTLgoXXu6M%2B73ZqVvnz759Mcn5vrJl2VP98vZ8tO/zccffCQdz/99Bg04OWPPPSd/%2BbXbqr4L7Ym//knePnBghgwZUtX3w%2BF47rnkmmuSHTuSAQMOfCj06tXJxdVfLIFDOtp9/Ga7uFbs47e%2Bhop7uIt2UUtLTtm3J9/%2B0px6j3JIUz43L788sSmPPPJovUcB6HH2Mb3J5wAWbszYsdmwZWu9xzgsG57ZmjFjxtZ7DICasI/pTQKwcM3NzfnZczuzo6Oz3qMc1I6Ozjy7sz3Nzc2HfjDAW5B9TG8SgIVraWlJY2Njlq1eU%2B9RDupbq9eksbEx48ePr/coADVhH9ObBGDhBg8enE984hNZsvLB7N%2B/v97jvKF9%2B/Zl6coHM3Xq1AwePLje4wDUhH1MbxKAZMaMGdn27I48vK6t3qO8oYfXtWXbszsyY8aMeo8CUFP2Mb3FXcCkUqmkefToDDqxIQ8vmt%2Bjvy7oaFUqlVwya3b%2Bbm%2Byoa3tmJoNoKfZx/QWVwBJQ0NDWufNyyPrN2X5w8fWe0%2BWrX40j6zflLmtrZYNcNyzj%2BktrgDyqmnTpuWhB76TJ5YvybDBg%2Bo9Tra3d%2BaCaTfkoxMnZtmyZfUeB6DX2MfUmgDkVZ2dnTn/vPNy4TlnZeUfza3rM7xKpZJJn23N%2Bh9ty5NPPZVBg%2Bq/AAF6i31MrXkJmFcNGjQoS5YuzXe%2Btza3/pfldZ1l3jeW5YH/uS5L77zTsgGKYx9Ta31bW1tb6z0Ex46RI0emsbExc25bmJP6N%2BUD7z6v12f48op78/kl38z8%2BfNz3XXX9fr5AY4F9jG1JAB5nQ9%2B8IPp7u7OnC8vSiWV/Oao9/TKyw%2BVSiXzvrEsn1/yzdxyyy2ZO7e%2BL3sA1Jt9TK0IQF6noaEhLS0t6devX%2BbctjCbtvw4Hx797pzcv38/Js2KAAACTUlEQVTNzrm9vTNXz/1S/nTVQ1mwYIFlAxD7mNpxEwgHtWrVqky//vrs6erKopun5%2BoJF/XoIqhUKlm2%2BtHMun1p%2BjU1Zemdd2bSpEk9dnyA44V9TE8SgBxSZ2dnZs6cmRUrVuQjY0flpiunZMJvjEmfPtXfQ7Rv3748vK4tC%2B%2B6L4%2Bs35Rp06bljjvuyKmnntqDkwMcX%2BxjeooA5LCtWrUq81pbs2nz5px52rBMn3xZrpnQckSfUbWjozPfWr0mS1c%2BmG3P7sio970vrfPmZeLEiTWcHOD4Yh9ztAQgR6RSqWTdunVZvHhx7r777nR3d2f4O4amecQ/y%2BgRZ%2BeCs96Vk/o3pfGEE9K9d29%2BubsrT/z1T7Jxy9ZseGZrnt3Znn79%2BmXq1KmZMWNGLrzwQu8tAaiCfczREIBUraOjI4899lg2bNiQtrYNaWtry65dz7/ucQMHDkhzc3PGjBmb5ubmjB8/PoMHD67DxADHJ/uYIyUA6TGVSiXt7e3p6urKnj170q9fvzQ1NWXIkCGeVQL0IvuYQxGAAACF8avgAAAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAArz/wAQL4%2BugPMaygAAAABJRU5ErkJggg%3D%3D", null, "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAoAAAAHgCAYAAAA10dzkAAAABHNCSVQICAgIfAhkiAAAAAlwSFlzAAAPYQAAD2EBqD%2BnaQAAADl0RVh0U29mdHdhcmUAbWF0cGxvdGxpYiB2ZXJzaW9uIDIuMi4zLCBodHRwOi8vbWF0cGxvdGxpYi5vcmcvIxREBQAAIABJREFUeJzt3X%2BU1fWd3/HXgA4dokLkR5aINVpX8Ed%2BwIBs0qQbxriiUX6k2WBE627XiMtG0LTZVJrCYBtIds0KNiHgJt10A6x6agTjUWwV427aQmGAJP6iIUuyGyEyMxtcIyMjcPsH0a6r8uMydy7yeTzOmZMj5873%2B845w5vn/d77vdNQqVQqAQCgGH3qPQAAAL1LAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFEYAAgAURgACABRGAAIAFOaEeg/A8aNSqaS9vT27d%2B9Od3d3Ghsb079//wwZMiQNDQ31Hg%2BgGPYxhyIAqVpHR0fWrFmTtra2bNiwPhs3bsyuXc%2B/7nEDBw7I6NGjM2bM2DQ3N6elpSWDBw%2Buw8QAxyf7mCPVUKlUKvUegreOSqWStWvXZvHixbnnnnvS3d2d4e8YmjEjzs7okWfn/DPPyMn9m9J44onpfvnlvLC7K09u%2B2k2PrM1G7Zszc%2Be25nGxsZMnTo1M2bMyLhx4zwbBaiCfczREIActlWrVqV17txs/v73c%2BZpw3LD5Mty9YSWDBs86LCPsaOjM8tWr8mSlQ9m27M7Mup970vrvHmZOHFiDScHOL7YxxwtAcghdXZ2ZubMmVmxYkU%2BMnZUbv7kx3LJuOb06VP9PUT79%2B/Pw%2BvacvtffDuPrN%2BUq666KnfccUcGDTr85QVQGvuYniIAOaiVK1fmhunT0/1SVxbdfEOmXdLSoy8RVCqVLFv9aGbdvjT9mpqyZOnSTJ48uceOD3C8sI/pST4GhjdUqVQyf/78TJkyJReec1aeWL4kV0%2B4qMffH9LQ0JBrLv1InlyxJBeec1amTJmSBQsWxPMSgAPsY2qhb2tra2u9h%2BDYUqlUMnv27Nx6662Ze93V%2Bdof3piT39a/puc8uX//XHnxbyZJ5ty2MN3d3Wlp6dlntwBvNfYxtSIAeZ0FCxbk1ltvzR/f%2BKnccu2VvfaXvqGhIR8e/d6c1L8pc768KP369cuHPvShXjk3wLHIPqZWBCCvsXLlylx//fWZe93VueXaK%2BsywwfefV4qqWTObQszatSojBw5si5zANSTfUwtuQmEV3V2dub8887LheeclZV/NLeul/srlUomfbY163%2B0LU8%2B9ZS70YCi2MfUmptAeNXMmTPT/VJXlnzuxrq/16OhoSFLPjcze7q6MmvWrLrOAtDb7GNqTQCS5MCHiq5YsSKLbr7hiD5ItJbeOWRQFt08PcuXL8/9999f73EAeoV9TG/wEjCpVCoZPWpUBjf2ycOL5tf92eY/VKlUcsms2el8uZK2jRuPqdkAepp9TG9xBZCsXbs2m7///dz8yY8dc3%2BhGxoactOVU7Jp8%2BasW7eu3uMA1JR9TG8RgGTx4sU587RhuWRcc71HeUOXjGvOmacNy%2BLFi%2Bs9CkBN2cf0FgFYuI6Ojtxzzz25YfJlR/y7JMfP%2BGxuun1JjSb7//r27Zvpky/L3XffnY6OjpqfD6Aeqt3HvbWLE/v4eCIAC7dmzZp0d3fn6gktPXrcl/fuzee%2B%2Bo28Z9oNOWn8pJx2xVW5dt4fZ3t7Z1XHu2ZCS7q7u/PYY4/16Jzwj33ta8l73pOccsqBr/e/P3nooXpPRQlqtY%2B//d3vZcJNszNkwifS5/0Tsvn//viojmcfHx8EYOHa2toy/B1De/xOs90v7cmmLVvz%2Bd%2B9Km3f/EruXfAf8n//9tlM%2BsPWqo43bPCgnDZ0SNra2np0TvjHhg9PvvjFZMOGA18tLcmkScmTT9Z7Mo53tdrHL3a9lA%2B8%2B/wsmPG7PXI8%2B/j4cEK9B6C%2BNqxfnzEjzq76%2B/fu25dP3/bVLH94Tfr26ZMbPvbR/Mfrr82Ak96W/37Hgtc89o7P/H7G/d6s/M3Pd%2Baf/trQIz7XmJFnZ8OG9VXPCofjiite%2B99f%2BMKBq4Jr1ybnn1%2BfmSjD0ezjN9vFDQ0NuebSjyRJfrLj5z02q3381ucKYMEqlUo2btqY0SOrD8A/f%2BiRnNC3b9Z%2BfWEWfeb3s/Cu%2B/L1%2B1e/4WOf/%2BWLaWhoyMCT31bVuUaPODsb2zbGJxfRW/btS%2B66K3nxxQMvBUOtHO0%2BPpJd3BPs47c%2BVwAL1t7enl27ns/5Z55R9TFOHzokt980PQ0NDRlxxun54Y9/koV33ZdPTbr0NY97aU93bvnan%2BWq3/pwTnlbdQF4wVnvyi927Up7e3uGDj3yK4hwuH74wwPB99JLyUknJffdl5x3Xr2n4nh2tPv4cHdxT7GP3/oEYMF2796dJDm5f1PVxxh3/sjXfFbV%2By84N3%2By4t7s27cvffv2TXLghpBPzlmQ/fv356uf/XTV5zrpV3OuX78%2Bw4YNq/o4lK2pqSnnnnvuQR8zYkSyeXOya1dy773Jtdcmjz9%2B8Ah8%2Bumn09XV1cPTUort27cnqX4fH84u7kmv7GM/829dArBg3d3dSZLGE0%2Bs2Tle3rs3U//9/Gzb/vM8%2BpUvVX31L0kaTzjw43r55Zf31HgUaNSoUdm4ceNBH9PYmJz9q1fixoxJ1q9PFi1Kli598%2B%2BZNm1aNm3a1IOTUqJa7uOe9Mo%2B3rNnT50noVoCsGCNjY1Jku6XX676GOuefOY1/732iafz66eflr59%2B74afz/62bNZ85UvZdCAU45q3u69e5MkDzzwgCuAVK2p6civsFQqyaH%2BnVu%2BfLmrIVRt%2B/btueKKK6rexwfbxbXwyj7u169fTY5P7QnAgvXv3z9J8sLu6v/R%2Btud7fnMoqWZPvmybNyyNV/5b/fnths/lb179%2BW3Z/%2BnbNyyNd%2B57dbs278/P%2B/8uyTJqaecXNWz3F/%2Bas6xY8d6zwk1M3t2cumlyemnJy%2B8cOAmkO9%2BN1l9iPfTH%2BplZTiY4cOHJ6l%2BH7/ZLk6Sv3v%2BhfzNczuzvePA57Bu%2BZufJUl%2BbdDb82uDTq3qfK/s42qeUHFsEIAFGzJkSAYOHJAnt/00Uz78z6s6xjUTLkrXnu6M%2B71Z6dunTz798Ym5fvJl%2BenPn8v9f7U2STLqX814zfes%2BeqX8uHR7z3icz3x1z/J2wcOzJAhQ6qaFQ7Hc88l11yT7NiRDBhw4EOhV69OLr643pNxPDvaffxmuzhJ7v/e/86//k9/8upjP/kfDnxE15zfm5bW666pal77%2BK2voeIe7qJd1NKSU/btybe/NKfeoxzSlM/Nyy9PbMojjzxa71EAepx9TG/yOYCFGzN2bDZs2VrvMQ7Lhme2ZsyYsfUeA6Am7GN6kwAsXHNzc3723M7s6Kjud/T2lh0dnXl2Z3uam5vrPQpATdjH9CYBWLiWlpY0NjZm2eo19R7loL61ek0aGxszfvz4eo8CUBP2Mb1JABZu8ODB%2BcQnPpElKx/M/v376z3OG9q3b1%2BWrnwwU6dOzeDBg%2Bs9DkBN2Mf0JgFIZsyYkW3P7sjD69rqPcobenhdW7Y9uyMzZsw49IMB3sLsY3qLu4BJpVJJ8%2BjRGXRiQx5eNP81v06o3iqVSi6ZNTt/tzfZ0NZ2TM0G0NPsY3qLK4CkoaEhrfPm5ZH1m7L84WPrvSfLVj%2BaR9ZvytzWVssGOO7Zx/QWVwB51bRp0/LQA9/JE8uXZNjgQfUeJ9vbO3PBtBvy0YkTs2zZsnqPA9Br7GNqTQDyqs7Ozpx/3nm58JyzsvKP5tb1GV6lUsmkz7Zm/Y%2B25cmnnsqgQfVfgAC9xT6m1rwEzKsGDRqUJUuX5jvfW5tb/8vyus4y7xvL8sD/XJeld95p2QDFsY%2Bptb6tra2t9R6CY8fIkSPT2NiYObctzEn9m/KBd5/X6zN8ecW9%2BfySb2b%2B/Pm57rrrev38AMcC%2B5haEoC8zgc/%2BMF0d3dnzpcXpZJKfnPUe3rl5YdKpZJ531iWzy/5Zm655ZbMnVvflz0A6s0%2BplYEIK/T0NCQlpaW9OvXL3NuW5hNW36cD49%2Bd07u379m59ze3pmr534pf7rqoSxYsMCyAYh9TO24CYSDWrVqVaZff332dHVl0c3Tc/WEi3p0EVQqlSxb/Whm3b40/ZqasvTOOzNp0qQeOz7A8cI%2BpicJQA6ps7MzM2fOzIoVK/KRsaNy05VTMuE3xqRPn%2BrvIdq3b18eXteWhXfdl0fWb8q0adNyxx135NRTT%2B3ByQGOL/YxPUUActhWrVqVea2t2bR5c848bVimT74s10xoOaLPqNrR0ZlvrV6TpSsfzLZnd2TU%2B96X1nnzMnHixBpODnB8sY85WgKQI1KpVLJu3bosXrw4d999d7q7uzP8HUPTPOKfZfSIs3PBWe/KSf2b0njCCeneuze/3N2VJ/76J9m4ZWs2PLM1z%2B5sT79%2B/TJ16tTMmDEjF154ofeWAFTBPuZoCECq1tHRkcceeywbNmxIW9uGtLW1Zdeu51/3uIEDB6S5uTljxoxNc3Nzxo8fn8GDB9dhYoDjk33MkRKA9JhKpZL29vasX78%2Bl19%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%2Bq3kxRfrPRlAOexiDofPAaRm2tsPPPt8/PHkX/yLek8DUCa7mDfiCiA18/zzB/731FPrOwdAyexi3ogrgNREpZJMmpT84hfJX/1VvacBKJNdzJs5od4DcHz69KeTH/wg%2Bd736j0JQLnsYt6MAKTH3Xhjcv/9yV/%2BZTJ8eL2nASiTXczBCEB6TKVyYOHcd1/y3e8mZ55Z74kAymMXczgEID3mD/4gWbEiWbXqwOdP/fznB/58wICkqam%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%2BfObN%2B%2BPUmyffv27Ny5M5VKpc6TAZTFPuZQGip%2BGqhSR0dH1qxZk7a2tmzYsD4bN27Mrl3Pv%2B5xAwcOyOjRozNmzNg0NzenpaUlgwcPrsPEAMcn%2B5gjJQA5IpVKJWvXrs3ixYtzzz33pLu7O8PfMTRjRpyd0SPPzvlnnpGT%2Bzel8cQT0/3yy3lhd1ee3PbTbHxmazZs2ZqfPbczjY2NmTp1ambMmJFx48aloaGh3v%2B3AN5y7GOOhgDksK1atSqtc%2Bdm8/e/nzNPG5YbJl%2BWqye0ZNjgQYd9jB0dnVm2ek2WrHww257dkVHve19a583LxIkTazg5wPHFPuZoCUAOqbOzMzNnzsyKFSvykbGjcvMnP5ZLxjWnT5/q30K6f//%2BPLyuLbf/xbfzyPpNueqqq3LHHXdk0KDDX14ApbGP6SkCkINauXJlbpg%2BPd0vdWXRzTdk2iUtPfoSQaVSybLVj2bW7UvTr6kpS5YuzeTJk3vs%2BADHC/uYnuQuYN5QpVLJ/PnzM2XKlFx4zll5YvmSXD3hoh5/f0hDQ0OuufQjeXLFklx4zlmZMmVKFixY4E41gF%2Bxj6mFvq2tra31HoJjS6VSyezZs3Prrbdm7nVX52t/eGNOflv/mp7z5P79c%2BXFv5kkmXPbwnR3d6elpWef3QK81djH1IoA5HUWLFiQW2%2B9NX9846dyy7VX9tpf%2BoaGhnx49HtzUv%2BmzPnyovTr1y8f%2BtCHeuXcAMci%2B5haEYC8xsqVK3P99ddn7nVX55Zrr6zLDB9493mppJI5ty3MqFGjMnLkyLrMAVBP9jG15CYQXtXZ2ZnzzzsvF55zVlb%2B0dy6Xu6vVCqZ9NnWrP/Rtjz51FPuRgOKYh9Ta24C4VUzZ85M90tdWfK5G%2Bv%2BXo%2BGhoYs%2BdzM7OnqyqxZs%2Bo6C0Bvs4%2BpNQFIkgMfKrpixYosuvmGI/og0Vp655BBWXTz9Cxfvjz3339/vccB6BX2Mb3BS8CkUqlk9KhRGdzYJw8vml/3Z5v/UKVSySWzZqfz5UraNm48pmYD6Gn2Mb3FFUCydu3abP7%2B93PzJz92zP2FbmhoyE1XTsmmzZuzbt26eo8DUFP2Mb1FAJLFixfnzNOG5ZJxzfUe5Q1dMq45Z542LIsXL673KAA1ZR/TWwRg4To6OnLPPffkhsmXHfHvkhw/47O56fYlNZrs/%2Bvbt2%2BmT74sd999dzo6Omp%2BPoB6qHYf99YuTuzj44kALNyaNWvS3d2dqye09PixW7/%2BrZw79bqcNH5STv2tj%2BfiG/9d1j35TFXHumZCS7q7u/PYY4/18JTwWl/7WvKe9ySnnHLg6/3vTx56qN5TUYJa7uNXTP/iovR5/4QsvOu%2Bqo9hHx8fBGDh2traMvwdQ2typ9k5pw/Pf/43M/KDZUvyV0tuyxnD3pFLZs1O%2By92HfGxhg0elNOGDklbW1uPzwn/0PDhyRe/mGzYcOCrpSWZNCl58sl6T8bxrpb7OElWPv6/8n%2Be2pJ3HuXx7ePjgwAs3Ib16zNmxNlVf//effvy6du%2Bmrdf/C8z%2BJLfzueXfvPVXxx%2B1SXj85ELR%2Bes04bl/LPelT%2BZdX3%2B/sXd%2BcHWbVWda8zIs7Nhw/qqZ4XDccUVyWWXJeecc%2BDrC19ITjopWbu23pNxvDuafXywXZwkz%2B7syI1fXpxlrX%2BYE0/oe9Sz2sdvfQKwYJVKJRs3bczokdUH4J8/9EhO6Ns3a7%2B%2BMIs%2B8/tZeNd9%2Bfr9q1/3uO6XX86dKx/KgJPelvf%2B%2BllVnWv0iLOzsW1jfHIRvWXfvuSuu5IXXzzwUjDUytHu44Pt4v379%2Bdf3frH%2BbfTPp7zz3pXj8xrH7/1nVDvAaif9vb27Nr1fM4/84yqj3H60CG5/abpaWhoyIgzTs8Pf/yTLLzrvnxq0qVJkge%2Bty6fnLMgu1/ak2GDTs1/XzQ/gwcOqOpcF5z1rvxi1660t7dn6NChVc8Mh/LDHx4IvpdeOnD17777kvPOq/dUHM%2BOdh8fbBd/6Vv35IS%2BfTPzE5N6bF77%2BK1PABZs9%2B7dSZKT%2BzdVfYxx5498zWdVvf%2BCc/MnK%2B7Nvn370rdv34xvfm82/dfF6Xj%2B%2Bfzpqocy9fPzs/brizL01IFHfK6TfjXn%2BvXrM2zYsKpnpmxNTU0599xzD/qYESOSzZuTXbuSe%2B9Nrr02efzxg0fg008/na6urh6ellJs3749SfX7%2BM12cdszP8od96xK2ze/0qOfK/jKPvYz/9YlAAvW3d2dJGk88cSaneNtTf8kZ5/%2Bzpx9%2BjvzGxecm3N%2B%2B1/nG99ZnVuuvfKIj9V4woEf18svv7ynx6Qgo0aNysaNGw/6mMbG5OxfvRI3Zkyyfn2yaFGydOmbf8%2B0adOyadOmHpyUEvX0Pv7uxh9k5y925Ywp17z6Z/v27c%2B//c9/mkV335dt9/15Vcd9ZR/v2bOnR%2Bak9wnAgjU2NiY58P68av3jj3VZ%2B8TT%2BfXTT0vfvm/8JuNKpZI9VZ6ve%2B/eJMkDDzzgCiBVa2o68isslUpyqH/nli9f7moIVdu%2BfXuuuOKKqvfxm%2B3i3/noxa/7UOkJN/37XH3pRfndj15c9byv7ON%2B/fpVfQzqSwAWrH///kmSF3ZX/4/W3%2B5sz2cWLc30yZdl45at%2Bcp/uz%2B33fipvNj1Ur7wzb/IxA/9RoYNOjWdf//3WXzvA/lZe0d%2Bu%2BVDVZ3rl7%2Bac%2BzYsd5zQs3Mnp1cemly%2BunJCy8cuAnku99NVr/%2B3qbXONTLynAww4cPT1L9Pn6zXTxowCkZNOCU1zz2xBP65tdOfXtGnHF61fO%2Bso%2BreULFsUEAFmzIkCEZOHBAntz200z58D%2Bv6hjXTLgoXXu6M%2B73ZqVvnz759Mcn5vrJl2VP98vZ8tO/zccffCQdz/99Bg04OWPPPSd/%2BbXbqr4L7Ym//knePnBghgwZUtX3w%2BF47rnkmmuSHTuSAQMOfCj06tXJxdVfLIFDOtp9/Ga7uFbs47e%2Bhop7uIt2UUtLTtm3J9/%2B0px6j3JIUz43L788sSmPPPJovUcB6HH2Mb3J5wAWbszYsdmwZWu9xzgsG57ZmjFjxtZ7DICasI/pTQKwcM3NzfnZczuzo6Oz3qMc1I6Ozjy7sz3Nzc2HfjDAW5B9TG8SgIVraWlJY2Njlq1eU%2B9RDupbq9eksbEx48ePr/coADVhH9ObBGDhBg8enE984hNZsvLB7N%2B/v97jvKF9%2B/Zl6coHM3Xq1AwePLje4wDUhH1MbxKAZMaMGdn27I48vK6t3qO8oYfXtWXbszsyY8aMeo8CUFP2Mb3FXcCkUqmkefToDDqxIQ8vmt%2Bjvy7oaFUqlVwya3b%2Bbm%2Byoa3tmJoNoKfZx/QWVwBJQ0NDWufNyyPrN2X5w8fWe0%2BWrX40j6zflLmtrZYNcNyzj%2BktrgDyqmnTpuWhB76TJ5YvybDBg%2Bo9Tra3d%2BaCaTfkoxMnZtmyZfUeB6DX2MfUmgDkVZ2dnTn/vPNy4TlnZeUfza3rM7xKpZJJn23N%2Bh9ty5NPPZVBg%2Bq/AAF6i31MrXkJmFcNGjQoS5YuzXe%2Btza3/pfldZ1l3jeW5YH/uS5L77zTsgGKYx9Ta31bW1tb6z0Ex46RI0emsbExc25bmJP6N%2BUD7z6v12f48op78/kl38z8%2BfNz3XXX9fr5AY4F9jG1JAB5nQ9%2B8IPp7u7OnC8vSiWV/Oao9/TKyw%2BVSiXzvrEsn1/yzdxyyy2ZO7e%2BL3sA1Jt9TK0IQF6noaEhLS0t6devX%2BbctjCbtvw4Hx797pzcv38/Js2KAAACTUlEQVTNzrm9vTNXz/1S/nTVQ1mwYIFlAxD7mNpxEwgHtWrVqky//vrs6erKopun5%2BoJF/XoIqhUKlm2%2BtHMun1p%2BjU1Zemdd2bSpEk9dnyA44V9TE8SgBxSZ2dnZs6cmRUrVuQjY0flpiunZMJvjEmfPtXfQ7Rv3748vK4tC%2B%2B6L4%2Bs35Rp06bljjvuyKmnntqDkwMcX%2BxjeooA5LCtWrUq81pbs2nz5px52rBMn3xZrpnQckSfUbWjozPfWr0mS1c%2BmG3P7sio970vrfPmZeLEiTWcHOD4Yh9ztAQgR6RSqWTdunVZvHhx7r777nR3d2f4O4amecQ/y%2BgRZ%2BeCs96Vk/o3pfGEE9K9d29%2BubsrT/z1T7Jxy9ZseGZrnt3Znn79%2BmXq1KmZMWNGLrzwQu8tAaiCfczREIBUraOjI4899lg2bNiQtrYNaWtry65dz7/ucQMHDkhzc3PGjBmb5ubmjB8/PoMHD67DxADHJ/uYIyUA6TGVSiXt7e3p6urKnj170q9fvzQ1NWXIkCGeVQL0IvuYQxGAAACF8avgAAAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAAojAAEACiMAAQAKIwABAArz/wAQL4%2BugPMaygAAAABJRU5ErkJggg%3D%3D", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5417541,"math_prob":0.9987926,"size":978,"snap":"2020-10-2020-16","text_gpt3_token_len":412,"char_repetition_ratio":0.13963039,"word_repetition_ratio":0.0,"special_character_ratio":0.44887525,"punctuation_ratio":0.21818182,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9956446,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-27T21:19:24Z\",\"WARC-Record-ID\":\"<urn:uuid:23385f3f-b206-42bb-ac3e-b91a859d907b>\",\"Content-Length\":\"44863\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cbbee627-2448-4f14-a264-dfa7252fdd05>\",\"WARC-Concurrent-To\":\"<urn:uuid:b0de66ca-b9b7-46da-8957-30df997bbe51>\",\"WARC-IP-Address\":\"35.241.19.59\",\"WARC-Target-URI\":\"https://www.lmfdb.org/EllipticCurve/Q/90/b/\",\"WARC-Payload-Digest\":\"sha1:PDL4JWUFV5SNZFYGITFAXF3GRAXQZ3B6\",\"WARC-Block-Digest\":\"sha1:Y4XKGXNE4ZQN7KVRI6K7U4CUJGCVA5Z3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146809.98_warc_CC-MAIN-20200227191150-20200227221150-00280.warc.gz\"}"}
https://ccjou.wordpress.com/2014/03/17/%E6%AF%8F%E9%80%B1%E5%95%8F%E9%A1%8C-march-17-2014/
[ "## 每週問題 March 17, 2014\n\nLet", null, "$A$ be an", null, "$n\\times n$ Hermitian matrix with eigenvalues", null, "$\\lambda_i$,", null, "$1\\le i\\le n$. Prove that", null, "$(A-\\lambda_1I)(A-\\lambda_2I)\\cdots(A-\\lambda_nI)=0$.\n\nHermitian 矩陣", null, "$A$ 可么正對角化 (unitarily diagonalizable),設為", null, "$A=UDU^\\ast$,其中", null, "$D=\\text{diag}(\\lambda_1,\\ldots,\\lambda_n)$", null, "$U^\\ast=U^{-1}$。因此,", null, "\\displaystyle\\begin{aligned} (A-\\lambda_1I)\\cdots(A-\\lambda_nI)&=(UDU^\\ast-\\lambda_1I)\\cdots(UDU^\\ast-\\lambda_nI)\\\\ &=U (D-\\lambda_1I)U^\\ast \\cdots U(D-\\lambda_nI)U^\\ast\\\\ &=U(D-\\lambda_1I)\\cdots(D-\\lambda_nI)U^\\ast\\\\ &=U\\begin{bmatrix} \\prod_{i=1}^n(\\lambda_1-\\lambda_i)&&\\\\ &\\ddots&\\\\ &&\\prod_{i=1}^n(\\lambda_n-\\lambda_i) \\end{bmatrix}U^\\ast\\\\ &=0. \\end{aligned}\n\nThis entry was posted in pow 二次型, 每週問題 and tagged , . Bookmark the permalink.\n\n### 2 Responses to 每週問題 March 17, 2014\n\n1.", null, "levinc417 says:\n\n似乎可用最小多項式說明?\n\n•", null, "ccjou says:\n\n一針見血!" ]
[ null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://1.gravatar.com/avatar/484983aec0f56da3027904a8814085ab", null, "https://1.gravatar.com/avatar/71c9b87b879aeb85493c9f894c78ab8b", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.79425997,"math_prob":0.9988607,"size":366,"snap":"2019-43-2019-47","text_gpt3_token_len":209,"char_repetition_ratio":0.15469614,"word_repetition_ratio":0.88,"special_character_ratio":0.21857923,"punctuation_ratio":0.10344828,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999832,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-18T09:40:39Z\",\"WARC-Record-ID\":\"<urn:uuid:ad25e14c-5bcc-4422-b5b6-69e0e1e845d8>\",\"Content-Length\":\"135906\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2f17ad7f-ca2f-434a-b087-fecb6b82ad23>\",\"WARC-Concurrent-To\":\"<urn:uuid:25655914-c8dd-4317-a643-1332be2c2359>\",\"WARC-IP-Address\":\"192.0.78.13\",\"WARC-Target-URI\":\"https://ccjou.wordpress.com/2014/03/17/%E6%AF%8F%E9%80%B1%E5%95%8F%E9%A1%8C-march-17-2014/\",\"WARC-Payload-Digest\":\"sha1:W4FSOHGVKJPWGCUN2XRR4UTM275N3VZ7\",\"WARC-Block-Digest\":\"sha1:FNK3AKCWQQCDVOYJZYB6U5ADJXUKX62P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496669730.38_warc_CC-MAIN-20191118080848-20191118104848-00022.warc.gz\"}"}
http://www.fact-index.com/p/pr/principal_components_analysis.html
[ "Main Page | See live article | Alphabetical index\n\n# Principal components analysis\n\nIn statistics, principal components analysis (PCA) is a technique to simplify a dataset; more formally it is a transform used for reducing dimensionality in a dataset while retaining those characteristics of the dataset that contribute most to its variance. These characteristics may be the 'most important', but this is not necessarily the case, depending on the application.\n\nPCA is also called the Karhunen-Ločve transform or the Hotelling transform. PCA has the speciality of being the optimal linear transform for keeping the subspace that has largest variance. However this comes at the price of greater computational requirement, e.g. if compared to the discrete cosine transform. Unlike other linear transforms, the PCA does not have a fixed set of basis vectors. Its basis vectors depend on the data set.\n\nThe principal component w1 of a dataset x can be defined as (assuming zero mean, i.e. E(x)=0)\n\n(See arg max for the notation.) With the first components, the -th component can be found by subtracting the first principal components from x:\nand by substituting this as the new dataset to find a principal component in:\n\nA simpler way to calculate the components wi uses the covariance matrix of x, the measurement vector. By finding the eigenvalues and eigenvectors of the covariance matrix, we find that the eigenvectors with the largest eigenvalues correspond to the dimensions that have the strongest correlation in the dataset. The original measurements are finally projected onto the reduced vector space.\n\nRelated (or even more similar than related?) is the calculus of empirical orthogonal functions (EOF).\n\nAnother method of dimension reduction is a self-organizing map.\n\nIf PCA is used in pattern recognition an often useful alternative is the linear discriminant analysis that takes into account the class separability, which is not the case for PCA." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8959896,"math_prob":0.9548584,"size":1917,"snap":"2023-40-2023-50","text_gpt3_token_len":384,"char_repetition_ratio":0.1306848,"word_repetition_ratio":0.0,"special_character_ratio":0.18935837,"punctuation_ratio":0.097345136,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9930333,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-05T04:45:39Z\",\"WARC-Record-ID\":\"<urn:uuid:761f6c64-0966-4ea2-8de3-e42e5db10bf5>\",\"Content-Length\":\"5394\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:729b32b1-7aef-4f8f-90b9-14990a3fd720>\",\"WARC-Concurrent-To\":\"<urn:uuid:3eb3b1de-d4ea-45ec-b4d0-aaa03d84f161>\",\"WARC-IP-Address\":\"23.227.169.68\",\"WARC-Target-URI\":\"http://www.fact-index.com/p/pr/principal_components_analysis.html\",\"WARC-Payload-Digest\":\"sha1:VUN25GE5NCJHKAIT4FHSO6WI6IP3X6OI\",\"WARC-Block-Digest\":\"sha1:NOZPV7LL4EAGPDBX6G5JHW5L533XUJDN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100545.7_warc_CC-MAIN-20231205041842-20231205071842-00640.warc.gz\"}"}
https://au.mathworks.com/matlabcentral/profile/authors/4610665
[ "Community Profile", null, "### The Ohio State University\n\nActive since 2016\n\n#### Statistics\n\nAll\n•", null, "•", null, "#### Content Feed\n\nView by\n\nHow do I make a desktop launcher for MATLAB in Linux?\nA little bit late to the train, but an alternative that one can use, not only for matlab but for other scripts also, for those i...\n\n5 years ago | 1\n\nSolved\n\nWhile loop with branching\nWrite a while loop that adjusts userValue while userValue is less than 0 or greater than 80. If userValue is greater than 80, th...\n\n7 years ago\n\nSolved\n\nGiven a and b, return the sum a+b in c.\n\n7 years ago\n\nSolved\n\nSwap the first and last columns\nFlip the outermost columns of matrix A, so that the first column becomes the last and the last column becomes the first. All oth...\n\n7 years ago\n\nSolved\n\nCreate a row array using double colon operator\nCreate a row array from 9 to 1, using the double colon operator.\n\n7 years ago\n\nSolved\n\nFind all elements less than 0 or greater than 10 and replace them with NaN\nGiven an input vector x, find all elements of x less than 0 or greater than 10 and replace them with NaN. Example: Input ...\n\n7 years ago\n\nSolved\n\nColumn Removal\nRemove the nth column from input matrix A and return the resulting matrix in output B. So if A = [1 2 3; 4 5 6]; and ...\n\n7 years ago\n\nSolved\n\nPizza!\nGiven a circular pizza with radius _z_ and thickness _a_, return the pizza's volume. [ _z_ is first input argument.] Non-scor...\n\n7 years ago\n\nSolved\n\nTriangle Numbers\nTriangle numbers are the sums of successive integers. So 6 is a triangle number because 6 = 1 + 2 + 3 which can be displa...\n\n7 years ago\n\nSolved\n\nIs my wife right?\nRegardless of input, output the string 'yes'.\n\n7 years ago\n\nSolved\n\nFind the sum of all the numbers of the input vector\nFind the sum of all the numbers of the input vector x. Examples: Input x = [1 2 3 5] Output y is 11 Input x ...\n\n7 years ago\n\nSolved\n\nMake the vector [1 2 3 4 5 6 7 8 9 10]\nIn MATLAB, you create a vector by enclosing the elements in square brackets like so: x = [1 2 3 4] Commas are optional, s...\n\n7 years ago\n\nSolved\n\nTimes 2 - START HERE\nTry out this test problem first. Given the variable x as your input, multiply it by two and put the result in y. Examples:...\n\n7 years ago" ]
[ null, "https://au.mathworks.com/responsive_image/150/150/0/0/0/cache/matlabcentral/profiles/4610665_1522103190256_DEF.jpg", null, "https://au.mathworks.com/matlabcentral/profile/badges/First_Answer.png", null, "https://au.mathworks.com/images/responsive/supporting/matlabcentral/cody/badges/solver.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.71484244,"math_prob":0.9365451,"size":2520,"snap":"2022-40-2023-06","text_gpt3_token_len":736,"char_repetition_ratio":0.15023847,"word_repetition_ratio":0.07676349,"special_character_ratio":0.27738094,"punctuation_ratio":0.13105924,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98923606,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,1,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-04T02:49:23Z\",\"WARC-Record-ID\":\"<urn:uuid:404aeec3-8508-4239-a785-265560ad3d0c>\",\"Content-Length\":\"96591\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5af1f3af-8e86-428e-aa87-0c65caf0b96a>\",\"WARC-Concurrent-To\":\"<urn:uuid:caf5186c-42a3-455a-a27c-93cb444a7b26>\",\"WARC-IP-Address\":\"23.34.160.82\",\"WARC-Target-URI\":\"https://au.mathworks.com/matlabcentral/profile/authors/4610665\",\"WARC-Payload-Digest\":\"sha1:GYAWOULLBE7PMUXGKKB6KCLWCSPZARP5\",\"WARC-Block-Digest\":\"sha1:SRBQLOHS4PNPFXRDGUEYF3EXG6IKULC7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500080.82_warc_CC-MAIN-20230204012622-20230204042622-00436.warc.gz\"}"}
https://www.sisense.com/blog/predicting-exponential-growth-with-sql/
[ "SQL is great at grouping and counting the data you already have, and with a little help from regressions, SQL can help you project that data into the future.\n\nLet’s estimate total users over time for a rapidly growing fictitious mobile app. The early days of this app were pretty messy, so we’ll chop them off and add them in as the starting sum, only plotting dates after October 2013. Instead of a range join to get the rolling sum, we’ll use a window function. To keep things organized, we’ll put each step into a with query:\n\n``````with\ndaily_new_users as (\nselect created_at::date dt, count(1) daily_ct\nfrom users where created_at > '2013-10-01' group by 1),\ndaily_user_volume as (\nselect\ndt,\ndt - '2013-10-01' as dt_id, -- integer version of date\n84066 -- users before October 2013\n+ sum(daily_ct) over (\norder by dt\nrows between unbounded preceding and current row\n)\nas user_ct\nfrom daily_new_users\n)\nselect dt, daily_ct from daily_new_users;\nselect dt, user_ct from daily_user_volume``````\n\nHere are the two curves:\n\nThe daily_user_volume  data has the look of an exponential growth curve, making it an ideal candidate for an exponential projection.\n\n## Linearizing Exponential Data\n\nThe easiest kind of regression is a linear regression. Of course, fitting a line to exponential data would yield a terrible fit. Instead, we can linearize the exponential data by taking the log of the data fit to a linear regression, and then inverse process on the future data points to get the predicted future growth.\n\nThe log’ed version of daily_user_volume  is quite linear, so this will be a great fit:\n\nTo make a linear regression, we need to find the best estimates for A and B (intercept and slope) that minimize the error in this formula:\n\nWe’ll use the Ordinary Least Squares method for minimizing error of our estimates, which lets us solve for A and B like this:\n\nSolving for B first, we’ll define estimate_b  as:\n\n``````with\n...\nestimate_b as (\nselect sum(covar.s) / sum(var.s) b\nfrom (\nselect (\ndt_id - avg(dt_id::float8) over ()) * (\nlog(user_ct) - avg(log(user_ct)) over ()\n) as s\nfrom daily_user_volume) covar\njoin (\nselect pow(dt_id - avg(dt_id::float8) over (), 2) as s\nfrom daily_user_volume\n) var\non true\n),``````\n\nCritically, we’re taking the log of user_ct to linearize those exponential data points!\n\nOur window functions use over () so that the window is applied to the whole result set. It’s very convenient in situations like this, where you want to compare each row to an aggregation over every row.\n\nGetting estimate_a  is more straightforward:\n\n``````with\n...\nestimate_a as (\nselect\navg(log(user_ct)) - avg(dt_id::float) *\n(select b from estimate_b) a\nfrom daily_user_volume\n),``````\n\nNow that we have our A and B for the regression, it’s time to project forward.\n\n### Projecting and De-linearizing\n\nWith the estimates computed, we can simply generate the y-values for the current and future dates and then invert the logarithm! We’ll generate a series of dates that will start with and then exceed the dt in daily_user_volume, use them as x-values to predict the log(y), and invert the logarithm with pow.\n\n``````with\n...\npredictions as (\nselect\n'2013-10-01'::date + i,\ncoalesce(user_ct, 7111884) as user_ct, -- last real count\npow(10, (select a from estimate_a) + (\nselect b from estimate_b\n) * i) estimate\nfrom\n-- make more dt_ids for the projection\ngenerate_series(1, 275, 1) i\nleft join daily_user_volume\non i = daily_user_volume.dt_id\n),\nselect * from predictions``````\n\nLook at that beautiful fit! We’ve fit an exponential curve to our cumulative user counts so that we can project the counts into the future.\n\nHere’s the full SQL for all the steps together:\n\n``````with\ndaily_new_users as (\nselect created_at::date dt, count(1) daily_ct\nfrom users where created_at > '2013-10-01' group by 1\n),\ndaily_user_volume as (\nselect\ndt,\ndt - '2013-10-01' as dt_id, -- integer version of date\n84066 -- users before October 2013\n+ sum(daily_ct) over (\norder by dt\nrows between unbounded preceding and current row\n) as user_ct\nfrom daily_new_users\n),\nestimate_b as (\nselect sum(covar.s) / sum(var.s) b\nfrom (\nselect (\ndt_id - avg(dt_id::float8) over ()) * (\nlog(user_ct) - avg(log(user_ct)) over ()\n) as s\nfrom daily_user_volume\n) covar\njoin (\nselect pow(dt_id - avg(dt_id::float8) over (), 2) as s\nfrom daily_user_volume\n) var\non true\n),\nestimate_a as (\nselect\navg(log(user_ct)) - avg(dt_id::float) * (\nselect b from estimate_b\n) a\nfrom daily_user_volume\n),\npredictions as (\nselect\n'2013-10-01'::date + i,\ncoalesce(user_ct, 7111884) as user_ct, -- last real count\npow(10, (select a from estimate_a) + (\nselect b from estimate_b) * i\n) estimate\nfrom\n-- make more dt_ids for the projection\ngenerate_series(1, 275, 1) i\nleft join daily_user_volume\non i = daily_user_volume.dt_id\n)\nselect * from predictions``````\nTags:" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7932971,"math_prob":0.8880517,"size":4736,"snap":"2021-31-2021-39","text_gpt3_token_len":1226,"char_repetition_ratio":0.16166526,"word_repetition_ratio":0.3358876,"special_character_ratio":0.27850506,"punctuation_ratio":0.12443439,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.990018,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-22T20:54:06Z\",\"WARC-Record-ID\":\"<urn:uuid:59e76bc2-6804-4af5-beb0-c1af380b7cba>\",\"Content-Length\":\"55101\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4bafbca5-7bf0-49cd-92c1-8f9afc43b76c>\",\"WARC-Concurrent-To\":\"<urn:uuid:e3ec7751-d06c-4a3e-82a9-4d2c06622a68>\",\"WARC-IP-Address\":\"104.16.154.17\",\"WARC-Target-URI\":\"https://www.sisense.com/blog/predicting-exponential-growth-with-sql/\",\"WARC-Payload-Digest\":\"sha1:VCQ4BJ2Y7X3B4GEPJWEA35DAPN5ANVDW\",\"WARC-Block-Digest\":\"sha1:KVBEUOR4KSYRPOJKE4SQZEZQN3ZMXA4C\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057388.12_warc_CC-MAIN-20210922193630-20210922223630-00220.warc.gz\"}"}
https://research.cbs.dk/en/studentProjects/optimal-allocation-under-a-stochastic-interest-rate-and-the-costs
[ "# Optimal Allocation under a Stochastic Interest Rate and the Costs from Suboptimal Allocation\n\nDitlev Muhlig Melgaard & Kristian Vandel Nørgaard\n\nStudent thesis: Master thesis\n\n## Abstract\n\nThe purpose of this thesis is to analyse investor’s dynamic asset allocation strategies, when introducing a stochastic interest rate, and a non-constant market price of risk. This is followed by an evaluation of the costs of applying a suboptimal portfolio allocation strategy. The starting point is the classical static portfolio result of the mean-variance analysis developed by Markowitz (1952). This is followed by a demonstration of the intertemporal portfolio problem under constant investment opportunities from Merton (1969). The problem is solved by dynamic programming using the Hamiliton-Jacobian-Bellman equation to obtain portfolio result, the socalled myopic portfolio. The Merton’s portfolio problem serves as foundation for the extensions in this thesis. In the first extension, a dynamic portfolio choice model includes the interest rate as state variable, where interest rate is modelled by a one-factor Vasicek model, which introduces the set of stochastic investment opportunities. The result of this model is a closed-form solution and is considered for a CRRA-investor, which shows that investors should hold the myopic portfolio and a hedging portfolio, which contains assets that are correlated with the state variable, the interest rate. From the analysis, the model results show that the stock allocation is time-invariant and decreasing in risk aversion. The bond allocation is increasing in investment horizon and risk aversion, since bonds through a hedging term is used to minimize exposure from the interest rate risk. In the second extension, a dynamic asset allocation model is developed again with a stochastic interest rate as a state variable, where the market price of risk is an affine function of the state variable. A closed-form solution is obtained for the optimal portfolio choice and applied for a CRRA-investor. The result shows that the stock allocation is still decreasing in risk aversion, but it also starts to vary over time. This is because the stochastic interest rate enters directly into the portfolio weight of stocks. The bond allocation under the second extension is different from the former. With the market price of risk as an affine function of the stochastic interest rate, the bond allocation fluctuates due to the changes in the interest rate. As the risk aversion increases, the fluctuations will be smaller, and the two models will converge to the same bond allocation, which is increasing in the investment horizon. To evaluate the portfolio choice models, two loss functions are considered. The loss function evaluates a suboptimal investment strategy under the optimal assumptions in terms of welfare losses for the investor. It is shown that applying the result from constant investment opportunities under the assumptions of the first extension leads to marginal welfare losses. However, using the investment strategy of the first extension under the assumptions of second extension shows a significant increase in welfare losses for the investor.\n\nEducations MSc in Advanced Economics and Finance, (Graduate Programme) Final Thesis English 2016 172 Claus Munk" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.91742545,"math_prob":0.9283446,"size":3203,"snap":"2021-04-2021-17","text_gpt3_token_len":601,"char_repetition_ratio":0.14066896,"word_repetition_ratio":0.016632017,"special_character_ratio":0.17764595,"punctuation_ratio":0.077922076,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98814094,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-16T10:32:22Z\",\"WARC-Record-ID\":\"<urn:uuid:83c2c8c7-aac5-42b0-a66a-5408b23e2bd6>\",\"Content-Length\":\"23425\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1afd269b-20d5-4a31-9ea2-0d1f5d3d4247>\",\"WARC-Concurrent-To\":\"<urn:uuid:9fbedf23-13b8-4a67-b78e-60948e9b9dea>\",\"WARC-IP-Address\":\"34.248.98.230\",\"WARC-Target-URI\":\"https://research.cbs.dk/en/studentProjects/optimal-allocation-under-a-stochastic-interest-rate-and-the-costs\",\"WARC-Payload-Digest\":\"sha1:ZZ5N5QKAWL26N6A6A23KFLJMGCXG2AOX\",\"WARC-Block-Digest\":\"sha1:WP7UV2NTO3QTOOFBIGHR7VCHK5J4JKIB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038056325.1_warc_CC-MAIN-20210416100222-20210416130222-00532.warc.gz\"}"}
https://mathematica.stackexchange.com/questions/266553/whats-the-mathematica-command-for-frac-partiala-partial-na-binomnk
[ "# What's the Mathematica command for $\\frac{\\partial^a}{\\partial n^a}\\binom{n}{k}$?\n\nWhat's the Mathematica command for\n\n$$f(a,n,k)=\\frac{\\partial^a}{\\partial n^a}\\binom{n}{k}$$\n\nI tried\n\nf[a_,n_,k_]:=D[Binomial[n,k], {n,a}]\n\n\nbut didn't work. To make it work, I had to use\n\nf[a_]:=D[Binomial[n,k], {n,a}]\n\n\nthen I picked a value for $$a$$ (f for example) to get a function in terms of $$n$$ and $$k$$ then I selected values for $$n$$ and $$k$$.\n\nIs there one-line command for this? Thank you.\n\nThe problem you face is, that you must evaluate the derivative relative to n before n is replaced by an argument. One way to achieve this is by using an additional variable: n1. E.g.:\n\nf[a_, n_, k_] := D[Binomial[n1, k],{n1,a}] /. n1 -> n\n\n\nwith this:\n\nf[1, 5, 3]\n(* 47/6*)\n\n• Thanks Dan thats what I'm looking for (+1). Apr 11, 2022 at 16:51\n• I think you meant D[Binomial[n1, k], {n1, a}] Apr 11, 2022 at 18:05\n• Yes that's right. Thank you. Apr 11, 2022 at 20:28\n\nTry\n\nDerivative[a, 0][Function[{nn, kk}, Binomial[nn, kk]]][n, k]\n\n\nor\n\nDerivative[a, 0][Binomial][n, k] (Thanks @CarlWoll )\n\n\n$$\\frac{1}{2} \\left( \\begin{array}{cc} \\{ & \\begin{array}{cc} a! \\left( \\begin{array}{cc} \\{ & \\begin{array}{cc} 1 & a=2 \\\\ 2 n-1 & a=1 \\\\ \\end{array} \\\\ \\end{array} \\right) & a\\geq 1 \\\\ (n-1) n & \\text{True} \\\\ \\end{array} \\\\ \\end{array} \\right)$$\n\n• Simpler is Derivative[a, 0][Binomial][n, k] Apr 11, 2022 at 18:04\n• Got it. I also see @bmf's code is simple as well. thank you guys Apr 12, 2022 at 9:29\n\nAnother way to do it: use Set rather than SetDelayed\n\ng[a_, n_, k_] = D[Binomial[n, k], {n, a}];\n\n\nThe first derivative\n\ng[1, 5, 3]", null, "The second\n\ng[2, 5, 3]", null, "• (+1) This is a typical example, why it is better to use Set, whereever you can, instead of SetDelayed as a standard. I often said. Jul 19, 2022 at 11:33" ]
[ null, "https://i.stack.imgur.com/DpwKR.png", null, "https://i.stack.imgur.com/a9Z1Y.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86163527,"math_prob":0.99663615,"size":393,"snap":"2023-40-2023-50","text_gpt3_token_len":142,"char_repetition_ratio":0.09768637,"word_repetition_ratio":0.0,"special_character_ratio":0.35114503,"punctuation_ratio":0.16346154,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99996793,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T11:45:39Z\",\"WARC-Record-ID\":\"<urn:uuid:eb9ed1f4-3281-4dc8-8581-983d3b3f6858>\",\"Content-Length\":\"188765\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f36ac0e4-336b-43ee-8db7-05709955dabd>\",\"WARC-Concurrent-To\":\"<urn:uuid:543dc211-8ad1-43b1-8732-90a9b99bb342>\",\"WARC-IP-Address\":\"104.18.11.86\",\"WARC-Target-URI\":\"https://mathematica.stackexchange.com/questions/266553/whats-the-mathematica-command-for-frac-partiala-partial-na-binomnk\",\"WARC-Payload-Digest\":\"sha1:2BWJXTOGPBAD3UW3FAIEYEBWVSFYCH4Y\",\"WARC-Block-Digest\":\"sha1:46XENBXNTFMVNOF6VCTE3D7XATD6TCTB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511075.63_warc_CC-MAIN-20231003092549-20231003122549-00188.warc.gz\"}"}
https://www.drillingformulas.com/category/drilling-engineering-calculations/
[ "## How Much Force Applied to a Rig Tong To Get The Right Torque at The Connection", null, "One application of the rig tong is to use to make up connection. The question is asked about how to get the right torque value to the connection if you use the rig tong because you will not see the torque value on the gauge. This article will describe how to determine the correct force applied to get the correct torque value when you use the rig tong to make up the connection.", null, "This formula below is used to determine force at required make up torque value.", null, "# Oilfield Unit\n\n## Force = Torque ÷ Length of the tong\n\nWhere;\n\nTorque in ft-lb\n\nForce in lb\n\nLength of the tong in ft\n\nForce is perpendicular to the tong length.\n\nThe illustration above demonstrates the direction of force.\n\n# Metric Unit\n\n## Force = Torque ÷ Length of the tong\n\nWhere;\n\nTorque in N-m\n\nForce in\n\nLength of the tong in m\n\nForce is perpendicular to the tong length.\n\nExample:\n\nConnection 4-1/2” IF – required make up torque = 30,700 ft-lb.\n\nTong length is 4 ft", null, "How much pulling force do you require to achieve the required make up torque?\n\nForce = Torque ÷ Length of the tong\n\nForce = 30,700 ÷ 4.0\n\nForce = 7,675 lb\n\nAnswer: 7,675 lb pulling force is applied to 4-ft tong in order to get the torque at connection at 30,700 ft-lb.", null, "Ref books:\n\nLapeyrouse, N.J., 2002. Formulas and calculations for drilling, production and workover, Boston: Gulf Professional publishing.\n\nBourgoyne, A.J.T., Chenevert , M.E. & Millheim, K.K., 1986. SPE Textbook Series, Volume 2: Applied Drilling Engineering, Society of Petroleum Engineers.\n\nMitchell, R.F., Miska, S. & Aadny, B.S., 2011. Fundamentals of drilling engineering, Richardson, TX: Society of Petroleum Engineers.\n\nThe drilling line is reeved over a set of crow block and down to another set of sheaves known as travelling block. The hook connected to travelling block is used to suspend the drilling load. One end of drilling line is wound onto the drawworks and this line is called “Fast Line”. Other end of the drilling line is tied into an anchor point on the rig floor and this line is named as “Dead Line”. The drilling line is reeved around the blocks several times in order to meet required load.", null, "According to the diagram above, we can use basic physic to determine derrick load.\n\n## Drillstring Elongation Due To a Tensile Load\n\nWhen a tensile load is applied into a drillstring, it results in elongation of the drillstring.", null, "The formula to determine pipe elongation is listed below;\n\nOilfield unit\n\ne = (L x T) ÷ (735,000 x W)\n\nWhere;\n\ne = elongation, inch\n\nL = length of drill string, ft\n\nW = drill string weight, lb/ft\n\nMetric (SI) unit\n\ne = (L x T) ÷ (26.7 x W)\n\nWhere;\n\ne = elongation, mm\n\nL = length of drill string, metres\n\nW = drill string weight, kg/m\n\nNote: The equations are taken from API RP 7G 16th Edition, August 1998.\n\n## Directional Drilling Handout from Texas AM\n\nI would like to share very useful Power Point slide in the topic of directional drilling which is belong to Texas A&M university, USA.\n\nDirectional Drilling\n\nWhen is it used?\n\nType I Wells (build and hold)\n\nType II Wells (build, hold and drop)\n\nType III Wells (build)\n\nDirectional Well Planning & Design\n\nSurvey Calculation Methods", null, "Survey Calculation Methods –\n\nBalanced Tangential\n\nMinimum Curvature\n\nKicking Off from Vertical\n\nControlling Hole Angle (Inclination)", null, "Directional Drilling  Continued\n\nTool-Face Angle\n\nOuija Board\n\nDogleg Severity\n\nReverse Torque of Mud Motor", null, "The Wellbore Trajectory Control –\n\nBent Motor and Bent Sub\n\nExamples\n\nDirectional Drilling Measurements\n\nSingle Shot and Multishot\n\nMagnetic and Gyro\n\nSteering Tools\n\nMWD tools", null, "## Pressure Drop Across a Bit", null, "Pressure across a bit occurs when the drilling mud passing through the jet nozzles. This pressure drop is important for drilling hydraulic optimization (maximum hydraulic horse power or impact force) and hole cleaning. The pressure drop at the nozzle area is a function of total flow area of the bit, flow rate and mud density.", null, "Pressure drop across the bit can be determined by the following equation:\n\n## Oilfield Unit\n\nPb = (Q²×W) ÷ (12031 × A²)\n\nWhere:\n\nPb = pressure drop across a bit, psi\n\nQ = flow rate, gpm\n\nW = mud weight, ppg\n\nA = total flow area, square inch\n\nPlease use the following information to determine pressure drop across a bit\n\nFlow rate = 800 gpm\n\nMud weight = 9.0 ppg\n\nTotal Flow Area = 0.3728 square inch\n\nPb = (800²×9.0) ÷ (12031 × 0.3728²)\n\nPb = 3,446 psi\n\n## Metric Unit\n\nPb = (Q²×W) ÷ (7.191 × A²)\n\nWhere:\n\nPb = pressure drop across a bit, KPa\n\nQ = flow rate, lpm\n\nW = mud weight, kg/m³\n\nA = total flow area, mm²\n\nPlease use the following information to determine pressure drop across a bit\n\nFlow rate = 3,000 l/m\n\nMud weight = 1,100 kg/m³\n\nTotal Flow Area = 240 mm²\n\nPb = (3,000²×1,100) ÷ (7.191 × 240²)\n\nPb = 23,901  KPa", null, "" ]
[ null, "https://www.drillingformulas.com/wp-content/uploads/2014/07/Cover-page-facebook-2017-225x150.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2014/07/Cover-page-facebook-2017.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2014/07/rig-tong.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2014/07/rig-tong-example.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2014/07/force-to-make-up-tong.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2013/09/derrick-Load-Calculation-1.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2013/07/Drillstring-elongation-due-to-tensile-load-1.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2012/07/552847_435072903198913_359160853_n.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2012/07/550649_435456863160517_1619027471_n.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2012/07/dd.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2012/07/wellbore-trajectory-control.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2012/05/15-P-Drop-Across-Bit-225x150.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2012/05/134-Pressure-Drop-Across-the-Bit-1.jpg", null, "https://www.drillingformulas.com/wp-content/uploads/2012/05/15-P-Drop-Across-Bit.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.81730556,"math_prob":0.9242802,"size":1657,"snap":"2021-31-2021-39","text_gpt3_token_len":424,"char_repetition_ratio":0.14640048,"word_repetition_ratio":0.10526316,"special_character_ratio":0.25045264,"punctuation_ratio":0.17597765,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9859194,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28],"im_url_duplicate_count":[null,6,null,6,null,6,null,6,null,6,null,5,null,null,null,2,null,2,null,2,null,2,null,3,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-20T08:27:57Z\",\"WARC-Record-ID\":\"<urn:uuid:9058860a-643b-4f23-8448-73b71fb84a4c>\",\"Content-Length\":\"61440\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:34016691-52b5-46bd-a0fb-df11bb98c83d>\",\"WARC-Concurrent-To\":\"<urn:uuid:47d7de24-22a6-445a-a942-ba8010819101>\",\"WARC-IP-Address\":\"162.215.212.247\",\"WARC-Target-URI\":\"https://www.drillingformulas.com/category/drilling-engineering-calculations/\",\"WARC-Payload-Digest\":\"sha1:6HQN4AKXSMRLU226CWE5LLI6LW7WZUCT\",\"WARC-Block-Digest\":\"sha1:FR5KQ7OXZK2TZNYVL3B7ITE4IAA5MLNQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057033.33_warc_CC-MAIN-20210920070754-20210920100754-00293.warc.gz\"}"}
https://www.jobilize.com/online/course/3-2-polynomial-function-real-functions-by-openstax?qcr=www.quizover.com&page=1
[ "# 3.2 Polynomial function  (Page 2/3)\n\n Page 2 / 3\n\n3 : Roots having square root term occur in pairs 1+√3 and 1-√3.\n\n4 : If a polynomial equation involves only even powers of x and all terms are positive, then all roots of polynomial equation are imaginary (complex). For example, roots of the quadratic equation given here are complex.\n\n${x}^{4}+2{x}^{2}+4=0$\n\nDescartes rules of signs\n\nDescartes rules are :\n\n(i) Maximum number of positive real roots of a polynomial equation f(x) is equal to number of sign changes in f(x).\n\n(ii) Maximum number of negative real roots of a polynomial equation f(x) is equal to number of sign changes in f(-x).\n\nThe signs of the terms of polynomial equation $f\\left(x\\right)={x}^{3}+3{x}^{2}-12x+3=0$ are “+ + - +”. There are two sign changes as we move from left to right. Hence, this cubic polynomial can have at most 2 positive real roots. Further, corresponding $f\\left(-x\\right)=-{x}^{3}+3{x}^{2}+12x+3=0$ has signs of term given as “- + + +“. There is one sign change involved here. It means that polynomial equation can have at most one negative root.\n\n## Zero polynomial\n\nThe function is defined as :\n\n$y=\\mathrm{f\\left(x\\right)}=0$\n\nThe polynomial “0”, which has no term at all, is called zero polynomial. The graph of zero polynomial is x-axis itself. Clearly, domain is real number set R, whereas range is a singleton set {0}.\n\n## Constant function\n\nIt is a polynomial of degree 0. The value of constant function is constant irrespective of values of \"x\". The image of the constant function (y) is constant for all values of pre-images (x).\n\n$y=\\mathrm{f\\left(x\\right)}=c$\n\nThe graph of a constant function is a straight line parallel to x-axis. As “y = (f(x) = c” holds for real values of “x”, the domain of constant function is \"R\". On the other hand, the value of “y” is a single valued constant, hence range of constant function is singleton set {c}.We can treat constant function also as a linear function of the form f(x) = c with m=0. Its graph is a straight line like that of linear function.\n\nThere is an interesting aspect about periodicity of constant function. A polynomial function is not periodic in general. A periodic function repeats function values after regular intervals. It is defined as a fuction for which f(x+T) = f(x), where T is the period of the function. In the case of constant function, function value is constant whatever be the value of independent variable. It means that $\\mathrm{f\\left(x}+{a}_{1}\\right)=\\mathrm{f\\left(x}+{a}_{2}\\right)=..........\\mathrm{f\\left(x\\right)}=c$ . Clearly, it meets the requirement with the difference that there is no definite or fixed period like \"T\". The relation of periodicity, however, holds for any change to x. We, therefore, summarize (it is also the accepted position) that constant function is a periodic function with no period.\n\n## Linear function\n\nLinear function is a polynomial of order 1.\n\n$f\\left(x\\right)={a}_{0}x+{a}_{1}$\n\nIt is also expressed as :\n\n$f\\left(x\\right)=mx+c$\n\nThe graph of a linear function is a straight line. The coefficient of “x” i.e. m is slope of the line and c is y-intercept, which is obtained for x = 0 such that f(0) = c. It is clear from the graph that its domain and range both are real number set R.\n\nwhat are the products of Nano chemistry?\nThere are lots of products of nano chemistry... Like nano coatings.....carbon fiber.. And lots of others..\nlearn\nEven nanotechnology is pretty much all about chemistry... Its the chemistry on quantum or atomic level\nlearn\nPreparation and Applications of Nanomaterial for Drug Delivery\nApplication of nanotechnology in medicine\nwhat is variations in raman spectra for nanomaterials\nI only see partial conversation and what's the question here!\nwhat about nanotechnology for water purification\nplease someone correct me if I'm wrong but I think one can use nanoparticles, specially silver nanoparticles for water treatment.\nDamian\nyes that's correct\nProfessor\nI think\nProfessor\nwhat is the stm\nis there industrial application of fullrenes. What is the method to prepare fullrene on large scale.?\nRafiq\nindustrial application...? mmm I think on the medical side as drug carrier, but you should go deeper on your research, I may be wrong\nDamian\nHow we are making nano material?\nwhat is a peer\nWhat is meant by 'nano scale'?\nWhat is STMs full form?\nLITNING\nscanning tunneling microscope\nSahil\nhow nano science is used for hydrophobicity\nSantosh\nDo u think that Graphene and Fullrene fiber can be used to make Air Plane body structure the lightest and strongest. Rafiq\nRafiq\nwhat is differents between GO and RGO?\nMahi\nwhat is simplest way to understand the applications of nano robots used to detect the cancer affected cell of human body.? How this robot is carried to required site of body cell.? what will be the carrier material and how can be detected that correct delivery of drug is done Rafiq\nRafiq\nif virus is killing to make ARTIFICIAL DNA OF GRAPHENE FOR KILLED THE VIRUS .THIS IS OUR ASSUMPTION\nAnam\nanalytical skills graphene is prepared to kill any type viruses .\nAnam\nAny one who tell me about Preparation and application of Nanomaterial for drug Delivery\nHafiz\nwhat is Nano technology ?\nwrite examples of Nano molecule?\nBob\nThe nanotechnology is as new science, to scale nanometric\nbrayan\nnanotechnology is the study, desing, synthesis, manipulation and application of materials and functional systems through control of matter at nanoscale\nDamian\nIs there any normative that regulates the use of silver nanoparticles?\nwhat king of growth are you checking .?\nRenato\nWhat fields keep nano created devices from performing or assimulating ? Magnetic fields ? Are do they assimilate ?\nwhy we need to study biomolecules, molecular biology in nanotechnology?\n?\nKyle\nyes I'm doing my masters in nanotechnology, we are being studying all these domains as well..\nwhy?\nwhat school?\nKyle\nbiomolecules are e building blocks of every organics and inorganic materials.\nJoe\nanyone know any internet site where one can find nanotechnology papers?\nresearch.net\nkanaga\nsciencedirect big data base\nErnesto\nhow did you get the value of 2000N.What calculations are needed to arrive at it\nPrivacy Information Security Software Version 1.1a\nGood\nWhat is power set\nPeriod of sin^6 3x+ cos^6 3x\nPeriod of sin^6 3x+ cos^6 3x", null, "By Rohini Ajay", null, "By Qqq Qqq", null, "By Sean WiffleBoy", null, "By OpenStax", null, "By Brooke Delaney", null, "By Stephen Voron", null, "By Nicole Duquette", null, "By OpenStax", null, "By OpenStax", null, "By Anh Dao" ]
[ null, "https://www.jobilize.com/quiz/thumb/pharmacology-nervous-system-mcq-exam.png;jsessionid=5JYbO6qvI4e-18GURw1ALaMMP7CFTw4l7L5VpbPi.web03", null, "https://www.jobilize.com/quiz/thumb/yokoshii-complaints-in-spanish.png;jsessionid=5JYbO6qvI4e-18GURw1ALaMMP7CFTw4l7L5VpbPi.web03", null, "https://farm8.staticflickr.com/7368/12786955343_fefe41d5a4_t.jpg", null, "https://www.jobilize.com/quiz/thumb/biology-ch-01-the-study-of-life-mcq-quiz-openstax-college.png;jsessionid=5JYbO6qvI4e-18GURw1ALaMMP7CFTw4l7L5VpbPi.web03", null, "https://www.jobilize.com/quiz/thumb/quiz-bod-dermatology-exam-by-brooke-delaney.png;jsessionid=5JYbO6qvI4e-18GURw1ALaMMP7CFTw4l7L5VpbPi.web03", null, "https://www.jobilize.com/quiz/thumb/ch-01-the-cranial-nerves-and-the-circle-of-willis-quiz-by-university.png;jsessionid=5JYbO6qvI4e-18GURw1ALaMMP7CFTw4l7L5VpbPi.web03", null, "https://farm1.staticflickr.com/288/18860755658_8f1c6343ec_t.jpg", null, "https://www.jobilize.com/quiz/thumb/human-body-anatomy-physiology-essay-quiz.png;jsessionid=5JYbO6qvI4e-18GURw1ALaMMP7CFTw4l7L5VpbPi.web03", null, "https://www.jobilize.com/quiz/thumb/biology-ch-01-the-study-of-life-mcq-quiz-openstax-college.png;jsessionid=5JYbO6qvI4e-18GURw1ALaMMP7CFTw4l7L5VpbPi.web03", null, "https://www.jobilize.com/quiz/thumb/nce-theories-in-counseling-helping-relationship-ch-05-exam-by.png;jsessionid=5JYbO6qvI4e-18GURw1ALaMMP7CFTw4l7L5VpbPi.web03", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9255352,"math_prob":0.9830922,"size":2966,"snap":"2020-34-2020-40","text_gpt3_token_len":682,"char_repetition_ratio":0.17184335,"word_repetition_ratio":0.051756006,"special_character_ratio":0.2440998,"punctuation_ratio":0.10508475,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9937542,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,1,null,1,null,null,null,2,null,1,null,1,null,null,null,1,null,2,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-14T05:06:17Z\",\"WARC-Record-ID\":\"<urn:uuid:158341ca-5621-4559-9fbe-ac9abcb1e782>\",\"Content-Length\":\"118131\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8ec50fa8-4e15-4205-a2e0-6110378c8526>\",\"WARC-Concurrent-To\":\"<urn:uuid:f7b08c16-b940-4a24-b43f-4bce88743758>\",\"WARC-IP-Address\":\"207.38.87.179\",\"WARC-Target-URI\":\"https://www.jobilize.com/online/course/3-2-polynomial-function-real-functions-by-openstax?qcr=www.quizover.com&page=1\",\"WARC-Payload-Digest\":\"sha1:2WCC2K3XYW7OZSWL3DJFIJFX5R5ZDVFK\",\"WARC-Block-Digest\":\"sha1:F24GJDELEXLCRPWH4KIG5GBC77LHIWJL\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439739177.25_warc_CC-MAIN-20200814040920-20200814070920-00275.warc.gz\"}"}
https://openreview.net/forum?id=fThfMoV7Ri
[ "## Bandit Phase Retrieval", null, "May 21, 2021 (edited Oct 26, 2021)NeurIPS 2021 PosterReaders: Everyone\n• Keywords: Bandit phase retrieval, minimax regret\n• TL;DR: We study a bandit version of phase retrieval and prove the minimax cumulative regret as well as simple regret.\n• Abstract: We study a bandit version of phase retrieval where the learner chooses actions $(A_t)_{t=1}^n$ in the $d$-dimensional unit ball and the expected reward is $\\langle{A_t, \\theta_\\star \\rangle^2$ with $\\theta_\\star \\in \\mathbb R^d$ an unknown parameter vector. We prove an upper bound on the minimax cumulative regret in this problem of $\\smash{\\tilde \\Theta(d \\sqrt{n})}$, which matches known lower bounds up to logarithmic factors and improves on the best known upper bound by a factor of $\\smash{\\sqrt{d}}$. We also show that the minimax simple regret is $\\smash{\\tilde \\Theta(d / \\sqrt{n})}$ and that this is only achievable by an adaptive algorithm. Our analysis shows that an apparently convincing heuristic for guessing lower bounds can be misleading and that uniform bounds on the information ratio for information-directed sampling (Russo and Van Roy, 2014) are not sufficient for optimal regret.\n• Supplementary Material: pdf\n• Code Of Conduct: I certify that all co-authors of this work have read and commit to adhering to the NeurIPS Statement on Ethics, Fairness, Inclusivity, and Code of Conduct.\n9 Replies" ]
[ null, "https://openreview.net/images/pdf_icon_blue.svg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.837255,"math_prob":0.96779597,"size":1308,"snap":"2021-43-2021-49","text_gpt3_token_len":314,"char_repetition_ratio":0.09969325,"word_repetition_ratio":0.04040404,"special_character_ratio":0.2293578,"punctuation_ratio":0.08050848,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9854641,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-03T03:55:14Z\",\"WARC-Record-ID\":\"<urn:uuid:dac368da-7083-4331-8cee-b46ce81fd9f2>\",\"Content-Length\":\"28521\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ebaf932c-fd0a-40ca-b582-f48b6cd58b67>\",\"WARC-Concurrent-To\":\"<urn:uuid:aba9009c-fc76-4415-a40a-4fd4bb896f8d>\",\"WARC-IP-Address\":\"35.184.86.251\",\"WARC-Target-URI\":\"https://openreview.net/forum?id=fThfMoV7Ri\",\"WARC-Payload-Digest\":\"sha1:SYAC5QURW36FIHCKDKV7TAOV37I4FI64\",\"WARC-Block-Digest\":\"sha1:63M3TY65RMQMJIRKFXCPSFKS4MYNCPOM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362589.37_warc_CC-MAIN-20211203030522-20211203060522-00444.warc.gz\"}"}
https://scicomp.stackexchange.com/questions/17562/solving-kepler-equation-for-true-or-eccentric-anomaly/26980
[ "# Solving Kepler equation for true or eccentric anomaly\n\nIs there any reason to always solve the Kepler equation for the eccentric anomaly, $E$, instead of the more meaningful (at least to me) true anomaly, $\\theta$?\n\nSolving for the eccentric anomaly usually would mean calculating the true anomaly from its solution and maybe even the initial guess of the eccentric anomaly from an initial guess of the true anomaly. So this would require more calculations, however the Kepler equation expressed in the eccentric anomaly is simpler and thus less expensive to calculate. When I search for solving Kepler's equation I only have some approaches which use the eccentric anomaly, however I can imagine that when the error tolerance of the solution is not very tight or the initial guess is good it might be cheaper to solve for the true anomaly. Or are there other reasons for solving for the eccentric anomaly?\n\nThe relevant equations, using Newton's method, are: $$E = 2 \\tan^{-1}\\left(\\sqrt{\\frac{1-e}{1+e}}\\tan\\frac{\\theta}{2}\\right),$$ $$M = E - e \\sin{E},$$ where $M$ is the mean anomaly and $e$ is the eccentricity. Such that using Newton's method results in $$E_{n+1} = E_n - \\frac{E_n - e \\sin{E_n} - M}{1 - e \\cos{E_n}}.$$ And for the true anomaly, $$M = 2\\tan^{-1}\\left(\\sqrt{\\frac{1-e}{1+e}}\\tan{\\frac{\\theta}{2}}\\right)-\\frac{e\\sqrt{1-e^2}\\sin{\\theta}}{1+e\\cos{\\theta}},$$ $$\\theta_{n+1} = \\theta_n - \\left(1 + e \\cos{\\theta_n}\\right)^2 \\frac{2\\tan^{-1}\\left(\\sqrt{\\frac{1-e}{1+e}}\\tan{\\frac{\\theta_n}{2}}\\right)-\\frac{e\\sqrt{1-e^2}\\sin{\\theta_n}}{1+e\\cos{\\theta_n}} - M}{\\sqrt{(1 - e^2)^3}}.$$\n\n• Another KSP question? Are you asking whether to prefer solving the the $(M,E)$ equation or the $(M,\\theta)$? From a computational perspective the answer would be $(M,E)$: when you write down the $\\theta_n\\mapsto\\theta_{n+1}$ monstrosity, you should also consider how your code will be executed on a modern CPU. Also, using Newton's method for $M=E-e\\sin E$ is only the start of it, one can do much better with some other simple ideas. Efficiency (and analysis) is much harder with the second one, but the first one you can analyze quite a lot. – Kirill Dec 29 '14 at 20:49\n• @Kirill KSP has made me curious about orbital motion, but this is not for any immediate application into KSP. I am asking that, but what if only one iteration often is enough, then shouldn't it be possible that solving $(M,\\theta)$ is faster than solving $(M,E)$ when also the initial guess is expressed in $\\theta$ or will $(M,E)$ always be faster (mainly do to the smaller amount of trigonometry functions)? – fibonatic Dec 30 '14 at 2:41\n\nThe most robust way of answering this is to benchmark it. Failing that, there are several things to note (roughly in order of importance).\n\nFirst, the most cheap floating-point operations on a modern CPU are addition and multiplication (both are equally fast; same as fused multiply-adds when available). Division is much slower (by a factor of ~20), trigonometric functions are also slower (~200), square roots and logs similar. In fact, sometimes (depends on architecture) trig functions, roots, logs are implemented in a library. The best reference for this is usually the optimization guide published by the whichever company made your CPU. So as a rule of thumb you want to minimize special functions first, then divisions, then multiplications and additions.\n\nSo by this measure the second formula is much worse: the there is one inverse trig function, one square root (it would be wasteful to implement your formula as written, with three square roots), and one sincos (since they are expensive it is better to evaluate sincos once and then write things like $\\tan\\frac\\theta2$ in terms of those). Your first formula involves the other special functions, apart from sincos, only once at the end.\n\nSecond, you should not stop at Newton's method. For example, if you compare Newton's method with Halley's method, $$\\frac{e \\sin (x)-e x \\cos (x)+M}{1-e \\cos (x)}, \\qquad x-\\frac{(e \\cos (x)-1) (e \\sin (x)+M-x)}{e^2+e (M-x) \\sin (x)-2 e \\cos (x)+1},$$ both evaluate the expensive trigonometric functions at the same arguments, but with a little more algebra Halley's method can converge faster; the extra algebra might not outweigh the savings of evaluating trigonometric fewer times. So Halley's method (and other iterative methods) also need to be checked.\n\nThird, you can precompute some things. For example, if you start by reducing the argument to the range $0<E<2\\pi$, you can experimentally, in advance, find the maximum number of iterations taken by the method. Since the number of iterations is fairly small (depending on precision) and mispredicted branches can be expensive, it may also make sense to unroll the iteration loop by hand to a fixed sufficient number of iterations. Unrolled code can also more easily benefit from vectorization.\n\nFourth, it is difficult to intuitively predict which optimizations will do the best. And since this is just one fairly simple equation, it is probably best to benchmark many different approaches and find the best. When doing this, also consider what optimization flags your compiler supports for floating-point arithmetic (some of them are interesting and important, many people know about -ffast-math, but it actually decomposes into different helpful or harmful optimization flags; here is gcc's list for example). Another thing to do is to look at the assembly output of your compiler to see which CPU instructions it actually ends up using.\n\nFifth, if you need to solve this equation many times for the same eccentricity $e$, it is possible to rewrite the problem. If you consider the function $E = E(M)$, on the range $[0,2\\pi]$, given by the solutions of the equation for fixed known $e$, you can approximate the function $E(M)$ using, for example, Chebyshev series, which takes only a small number of evaluations of $E(M)$ (which can be done with any root-finding method). Once you have a sufficiently close approximation, which might be a 20-term Chebyshev series or something like that, you can evaluate that later without needing to solve the equation again.\n\nThis question now has quite some age, but its subject crops up so repeatedly, that perhaps the following answer and references may still be helpful and not out of place.\n\n(a) 'Is there a reason to ... solve for ... the eccentric anomaly' (when the true anomaly is more meaningful)?'\n\nPractically all of the numerical difficulty is in 'Kepler's equation', i.e. the part of the calculation for an undisturbed elliptical orbit that starts with the mean anomaly and computes the eccentric anomaly. The onward calculation of true anomaly from eccentric, by contrast, can be simple enough and numerically well-behaved when properly arranged. (A better-behaved formula than the traditional 'tangent half-angle' formula quoted in the question is given by R Broucke & P Cefola (1973), [http://adsabs.harvard.edu/cgi-bin/nph-data_query?bibcode=1973CeMec...7..388B].) Direct series evaluations of true anomaly do exist, of course, but the coefficients are usually laborious to compute, except where that can be done once for all, e.g. when only a few predetermined eccentricity values will be used. There are also a few iterative procedures that seem to go direct from mean to true anomaly, but they don't entirely avoid the eccentric anomaly, and it's arguable they only mix and mask difficulties without gaining simplicity or efficiency.) So it's usual to tackle separately the Kepler-equation part of the problem.\n\n(b) There are many published good procedures for solving Kepler's equation, thus arguably little point now in devising one afresh. The subject is entirely 400 years old, but it received renewed interest in the 1960s on, when astrodynamics developed increased demand for procedures for orbit-tracking and control. These demand (as intermediates) unattended automatic computation of many thousands of instances of Kepler's equation. What emerged then were needs not only for computational efficiency, but also for the avoidance of added kinds of numerical misbehavior, such as misconvergence or failure to converge from a minority of pathological input values. Here is a review and a brief selection of solutions from that recent era.\n\n** There's a good explanatory survey of methods up to the mid-80s, and of the problems to be met, (plus some coded Fortran functions), in: A W Odell, R H Gooding, 'Procedures for Solving Kepler's Equation' [http://adsabs.harvard.edu/cgi-bin/nph-data_query?bibcode=1986CeMec..38..307O].\n\n** A very useful paper is that of A Nijenhuis (1991), 'Solving Kepler's equation with high efficiency and accuracy' [substitute the following bibcode in the URL given above: bibcode=1991CeMDA..51..319N], it's accompanied by a complete and workable implementation (in Pascal, from 1991, but easily portable e.g. to C). Methods of generating a starting- approximation are selected according to the input values of M (radians) and e (#), and a recently-devised cubic-approximation (Mikkola, 1987) is used for starting values in the specially-problematic area near to the singularity at (M,e) = (0, 1).\n\n** Another modern method, perhaps even potentially better than the foregoing, is described (without code example) by F L Markley (1995), 'Kepler Equation Solver' [substitute the following bibcode in the URL given above: bibcode=1995CeMDA..63..101M].\n\n** There are various methods that claim to avoid the calculation of trig functions. One class avoids them at run-time, but the cost is a precomputed lookup table (e.g. S A Feinstein, C A McLaughlin, 'Dynamic discretization method for solving Kepler's equation', [substitute the following bibcode in the URL given above: bibcode=2006CeMDA..96...49F]. Another method ingeniously does avoid computing trig functions; it achieves that by evaluating sin E (via sin E/3) rather than E itself:\nS Mikkola, 'A cubic approximation for Kepler's equation', [substitute the following bibcode in the URL given above: bibcode=1987CeMec..40..329M].\n\nHopefully there's something here to respond to most variants of this oft-recurring question.\n\n• Here there is a recent (2013) paper that discusses some of this trade-offs, including a reference to the problems of the universal variable formulation link.springer.com/article/10.1007/s10569-013-9476-9 – astrojuanlu Oct 4 '17 at 15:37\n• @astrojuanlu : Thanks for the useful additional reference. – terry-s Oct 7 '17 at 16:29\n\nThis may be of interest to you: a paper recently (December 2014) published presents a method for computing solutions to Kepler's Equation analytically:\n\nhttp://www.scirp.org/journal/PaperInformation.aspx?PaperID=52772\n\nI haven't worked through the paper myself (it involves a two-dimensional Laplace Transform), but it may be relevant to your work.\n\n• Can you post an explicit formula? I suspect something is amiss there. – Kirill Jan 1 '15 at 21:32\n• The solution presented in the quoted paper unfortunately does not satisfy Kepler's equation or even Newton's Law of Universal Gravity. I've posted a comment there with the details, which is pending approval by the publisher of the paper. – Louis Strous Jan 14 '17 at 9:06" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90196,"math_prob":0.9789413,"size":3523,"snap":"2021-04-2021-17","text_gpt3_token_len":842,"char_repetition_ratio":0.094060816,"word_repetition_ratio":0.0,"special_character_ratio":0.21998297,"punctuation_ratio":0.10391566,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99827,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-16T12:42:03Z\",\"WARC-Record-ID\":\"<urn:uuid:065bea78-b179-4972-a6c5-e84dbf0e5fdd>\",\"Content-Length\":\"177657\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ae57225b-5097-41d8-a48b-5e5f4c17bd94>\",\"WARC-Concurrent-To\":\"<urn:uuid:77c1bf9e-f6a0-4863-9191-af92f2ccb76c>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://scicomp.stackexchange.com/questions/17562/solving-kepler-equation-for-true-or-eccentric-anomaly/26980\",\"WARC-Payload-Digest\":\"sha1:FGTBJQR72Q5QN3O6N2ZFFMIQ6FMOHXP7\",\"WARC-Block-Digest\":\"sha1:DE5PELJ73HNHJQESY3ETXR33PQFMZITE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703506640.22_warc_CC-MAIN-20210116104719-20210116134719-00374.warc.gz\"}"}
https://juliapackages.com/p/numericalintegration
[ "## NumericalIntegration.jl\n\nBasic numerical integration routines for presampled data.\nAuthor dextorious\nPopularity\n32 Stars\nUpdated Last\n1 Year Ago\nStarted In\nMarch 2017\n\n# NumericalIntegration", null, "", null, "", null, "This is a simple package to provide functionality for numerically integrating presampled data (meaning you can't choose arbitrary nodes). If you have the ability to evaluate your integrand at arbitrary points, please consider using better tools for the job (such as the excellent FastGaussQuadrature.jl).\n\nDo note that while the code is trivial, it has not been extensively tested and does not focus on numerical precision. Issues, suggestions and pull requests are welcome.\n\n## Example usage\n\n```# setup some data\nx = collect(-π/2 : π/1000 : π/2)\ny = sin.(x)\n\n# integrate using the default Trapezoidal method\nintegrate(x, y)\n\n# integrate using a specific method\nintegrate(x, y, SimpsonEven())\n\n# compute cumulative integral\nY = cumul_integrate(x, y)\n\n# compute cumulative integral for each column of an array\nz = [sin.(x) cos.(x) exp.(x/pi)]\nZ = cumul_integrate(x, z)\n\n# compute cumulative integral for each line of an array\nzp = permutedims(z)\nZP = cumul_integrate(x, zp, dims=1)\n\n# Multidimensional integration\nY = [i*j for i=x,j=y]\nintegrate((x,y), Y)```\n\nThe currently available methods are:\n\n• Trapezoidal (default)\n• TrapezoidalEven\n• TrapezoidalFast\n• TrapezoidalEvenFast\n• SimpsonEven\n• SimpsonEvenFast\n• RombergEven\n\nCurrently cumulative integrals and multidimensional integrals are restricted to using Trapezoidal methods.\n\nAll methods containing \"Even\" in the name assume evenly spaced data. All methods containing \"Fast\" omit basic correctness checks and focus on performance. Consequently, the fast methods will segfault or produce incorrect results if you supply incorrect data (vectors of different lengths, etc.). RombergEven needs a power of 2 + 1 points (so 9, 17, 33, 65, 129, 257, 513, 1025...) evenly spaced for it to work. Useful when control over accuracy is needed." ]
[ null, "https://camo.githubusercontent.com/59e184ddcb6ee7b1eaee249dd52b80630b7f4318ab3d0890933e499538265d13/68747470733a2f2f7472617669732d63692e6f72672f646578746f72696f75732f4e756d65726963616c496e746567726174696f6e2e6a6c2e7376673f6272616e63683d6d6173746572", null, "https://camo.githubusercontent.com/4c8c39670e945566d6ac1350b59a2202177f45e3bd09e5343f63fc8c17c704c4/68747470733a2f2f636f766572616c6c732e696f2f7265706f732f646578746f72696f75732f4e756d65726963616c496e746567726174696f6e2e6a6c2f62616467652e7376673f6272616e63683d6d617374657226736572766963653d676974687562", null, "https://camo.githubusercontent.com/8f235eb3bf5c1e52046c37cd893a922a444fc28fe09bf0dae89efd8008db56eb/687474703a2f2f636f6465636f762e696f2f6769746875622f646578746f72696f75732f4e756d65726963616c496e746567726174696f6e2e6a6c2f636f7665726167652e7376673f6272616e63683d6d6173746572", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7242409,"math_prob":0.9782194,"size":1789,"snap":"2022-40-2023-06","text_gpt3_token_len":444,"char_repetition_ratio":0.13557424,"word_repetition_ratio":0.015151516,"special_character_ratio":0.23756288,"punctuation_ratio":0.14193548,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9789871,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-03T16:10:30Z\",\"WARC-Record-ID\":\"<urn:uuid:77cc552d-5be2-41be-9b7e-6430b86a23f3>\",\"Content-Length\":\"87937\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:15793154-5e10-4fba-a4b5-4f26d1a35faa>\",\"WARC-Concurrent-To\":\"<urn:uuid:013506f3-5bc6-470d-88e1-a578f7d3c8e6>\",\"WARC-IP-Address\":\"18.160.41.27\",\"WARC-Target-URI\":\"https://juliapackages.com/p/numericalintegration\",\"WARC-Payload-Digest\":\"sha1:ORZRHZ7BRY5FPDIK7TU5GVCRHE7XE4CV\",\"WARC-Block-Digest\":\"sha1:RXGP74EL3CNDWQTN4AMSCK7NOYCRD4C2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500058.1_warc_CC-MAIN-20230203154140-20230203184140-00769.warc.gz\"}"}
https://stacks.math.columbia.edu/tag/02VT
[ "Definition 35.34.9. With $\\mathcal{U} = \\{ U_ i \\to S'\\} _{i \\in I}$, $\\mathcal{V} = \\{ V_ j \\to S\\} _{j \\in J}$, $\\alpha : I \\to J$, $h : S' \\to S$, and $g_ i : U_ i \\to V_{\\alpha (i)}$ as in Lemma 35.34.8 the functor\n\n$(Y_ j, \\varphi _{jj'}) \\longmapsto (g_ i^*Y_{\\alpha (i)}, (g_ i \\times g_{i'})^*\\varphi _{\\alpha (i)\\alpha (i')})$\n\nconstructed in that lemma is called the pullback functor on descent data.\n\nThere are also:\n\n• 3 comment(s) on Section 35.34: Descent data for schemes over schemes\n\nIn your comment you can use Markdown and LaTeX style mathematics (enclose it like $\\pi$). A preview option is available if you wish to see how it works out (just click on the eye in the toolbar)." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.63012093,"math_prob":0.99381953,"size":441,"snap":"2023-40-2023-50","text_gpt3_token_len":186,"char_repetition_ratio":0.13729978,"word_repetition_ratio":0.0,"special_character_ratio":0.46938777,"punctuation_ratio":0.15238096,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9994548,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-08T18:32:46Z\",\"WARC-Record-ID\":\"<urn:uuid:eb05fc26-9636-4fe2-8a2c-b6cf853b7058>\",\"Content-Length\":\"14355\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:370df0b5-ee6c-43d8-9f70-4744d1cf8794>\",\"WARC-Concurrent-To\":\"<urn:uuid:2a71b931-792a-4279-a482-603b8dbf3ee0>\",\"WARC-IP-Address\":\"128.59.222.85\",\"WARC-Target-URI\":\"https://stacks.math.columbia.edu/tag/02VT\",\"WARC-Payload-Digest\":\"sha1:FKY2XGHKPS6YZ2OFJDVHTECP2IGJ5JKA\",\"WARC-Block-Digest\":\"sha1:JZQE4GG6WHLKBPNAAJB3PAPTGHH7KNMI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100769.54_warc_CC-MAIN-20231208180539-20231208210539-00423.warc.gz\"}"}
https://diamondhairclinic.com/vocabulary/statistic/
[ "# statistic\n\nA statistic (singular) is a single measure of some attribute of a sample (e.g., its arithmetic mean value). It is calculated by applying a function (statistical algorithm) to the values of the items of the sample, which are known together as a set of data. More formally, statistical theory defines a statistic as a function of a sample where the function itself is independent of the sample’s distribution; that is, the function can be stated before realization of the data. The term statistic is used both for the function and for the value of the function on a given sample. A statistic is distinct from a statistical parameter, which is not computable because often the population is much too large to examine and measure all its items. However, a statistic, when used to estimate a population parameter, is called an estimator. For instance, the sample mean is a statistic that estimates the population mean, which is a parameter. When a statistic (a function) is being used for a specific purpose, it may be referred to by a name indicating its purpose: in descriptive statistics, a descriptive statistic is used to describe the data; in estimation theory, an estimator is used to estimate a parameter of the distribution (population); in statistical hypothesis testing, a test statistic is used to test a hypothesis. However, a single statistic can be used for multiple purposes – for example the sample mean can be used to describe a data set, to estimate the population mean, or to test a hypothesis." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.91540605,"math_prob":0.99186456,"size":1553,"snap":"2022-27-2022-33","text_gpt3_token_len":306,"char_repetition_ratio":0.17947063,"word_repetition_ratio":0.0,"special_character_ratio":0.19896974,"punctuation_ratio":0.11186441,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9966656,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-18T22:31:03Z\",\"WARC-Record-ID\":\"<urn:uuid:0630860a-345e-4cb0-b525-734b21ef3d8b>\",\"Content-Length\":\"526172\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:807c85b4-a376-497d-8037-a937425e46c9>\",\"WARC-Concurrent-To\":\"<urn:uuid:cde8a43a-6fa7-429e-a456-99b4ccdf6fd4>\",\"WARC-IP-Address\":\"141.193.213.21\",\"WARC-Target-URI\":\"https://diamondhairclinic.com/vocabulary/statistic/\",\"WARC-Payload-Digest\":\"sha1:ONP7VZZNCXXAULF3HDEVXOVBWUXQ5BYT\",\"WARC-Block-Digest\":\"sha1:6RPGNI5HLNF52UAJSK7LCBGFHRDJLQJB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882573533.87_warc_CC-MAIN-20220818215509-20220819005509-00666.warc.gz\"}"}
http://mail.calculus.info/diffeq/first/exact/exact.html
[ "#", null, "Exact and Nonexact Equations", null, "All the techniques we have reviewed so far were not of a general nature since in each case the equations themselves were of a special form. So, we may ask, what to do for the general equation", null, "Let us first rewrite the equation into", null, "This equation will be called exact if", null, ",\n\nand nonexact otherwise. The condition of exactness insures the existence of a function F(x,y) such that", null, "When the equation (E) is exact, we solve it using the following steps:\n\n(1)\nCheck that the equation is indeed exact;\n(2)\nWrite down the system", null, "(3)\nIntegrate either the first equation with respect of the variable x or the second with respect of the variable y. The choice of the equation to be integrated will depend on how easy the calculations are. Let us assume that the first equation was chosen, then we get", null, "The function", null, "should be there, since in our integration, we assumed that the variable y is constant.\n\n(4)\nUse the second equation of the system to find the derivative of", null, ". Indeed, we have", null, ",\n\nwhich implies", null, "Note that", null, "is a function of y only. Therefore, in the expression giving", null, "the variable, x, should disappear. Otherwise something went wrong!\n\n(5)\nIntegrate to find", null, ";\n(6)\nWrite down the function F(x,y);\n(7)\nAll the solutions are given by the implicit equation", null, "(8)\nIf you are given an IVP, plug in the initial condition to find the constant C.\n\nYou may ask, what do we do if the equation is not exact? In this case, one can try to find an integrating factor which makes the given differential equation exact.", null, "[Differential Equations] [Algebra] [Trigonometry ]\n[Calculus] [Complex Variables] [Matrix Algebra]", null, "S.O.S MATHematics home page\n\nDo you need more help? Please post your question on our S.O.S. Mathematics CyberBoard.", null, "Author: Mohamed Amine Khamsi\nLast Update 6-24-98" ]
[ null, "http://mail.calculus.info/logos001.gif", null, "http://mail.calculus.info/gif/bar.gif", null, "http://mail.calculus.info/diffeq/first/exact/img1.gif", null, "http://mail.calculus.info/diffeq/first/exact/img2.gif", null, "http://mail.calculus.info/diffeq/first/exact/img3.gif", null, "http://mail.calculus.info/diffeq/first/exact/img4.gif", null, "http://mail.calculus.info/diffeq/first/exact/img4.gif", null, "http://mail.calculus.info/diffeq/first/exact/img5.gif", null, "http://mail.calculus.info/diffeq/first/exact/img6.gif", null, "http://mail.calculus.info/diffeq/first/exact/img6.gif", null, "http://mail.calculus.info/diffeq/first/exact/img7.gif", null, "http://mail.calculus.info/diffeq/first/exact/img8.gif", null, "http://mail.calculus.info/diffeq/first/exact/img9.gif", null, "http://mail.calculus.info/diffeq/first/exact/img6a.gif", null, "http://mail.calculus.info/diffeq/first/exact/img6.gif", null, "http://mail.calculus.info/diffeq/first/exact/img10.gif", null, "http://mail.calculus.info/gif/bar.gif", null, "http://mail.calculus.info/gif/lighthouse.gif", null, "http://mail.calculus.info/gif/sailbar.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87081337,"math_prob":0.9972496,"size":1980,"snap":"2022-27-2022-33","text_gpt3_token_len":504,"char_repetition_ratio":0.13208503,"word_repetition_ratio":0.0056657223,"special_character_ratio":0.2489899,"punctuation_ratio":0.12276215,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99969995,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38],"im_url_duplicate_count":[null,null,null,null,null,1,null,1,null,1,null,2,null,2,null,1,null,3,null,3,null,1,null,1,null,1,null,1,null,3,null,1,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-10T19:49:46Z\",\"WARC-Record-ID\":\"<urn:uuid:c39123ad-5393-4b0b-a262-4d22bca1c8f3>\",\"Content-Length\":\"7422\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e37a7db4-1d2e-437f-a350-51f928539720>\",\"WARC-Concurrent-To\":\"<urn:uuid:fc9bef29-29d2-4d16-bd26-a2b1347d3bba>\",\"WARC-IP-Address\":\"69.13.193.154\",\"WARC-Target-URI\":\"http://mail.calculus.info/diffeq/first/exact/exact.html\",\"WARC-Payload-Digest\":\"sha1:VKGS3GB34GR6HP6QZ77TB6UXVKMAO53U\",\"WARC-Block-Digest\":\"sha1:ZYNPHFMVWCMSH2RBEU4TLUPIKFJEKOG4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571210.98_warc_CC-MAIN-20220810191850-20220810221850-00772.warc.gz\"}"}
http://unitedstudentsofjarrett.net/images/August-%20Spaghetti%20Other%20Stories%20on%20The%20Total%20Connection.mht
[ "From: \"Saved by Windows Internet Explorer 8\" Subject: Other Stories on The Total Connection Date: Fri, 24 Aug 2012 18:12:00 -0400 MIME-Version: 1.0 Content-Type: multipart/related; type=\"text/html\"; boundary=\"----=_NextPart_000_0000_01CD8223.F4867090\" X-MimeOLE: Produced By Microsoft MimeOLE V6.1.7601.17609 This is a multi-part message in MIME format. ------=_NextPart_000_0000_01CD8223.F4867090 Content-Type: text/html; charset=\"utf-8\" Content-Transfer-Encoding: quoted-printable Content-Location: http://www.thetotalconnection.com/news.php?NewsSectionId=25 =EF=BB=BF Other Stories on The Total Connection =", null, "Welcome=20 VisitorFri, Aug 24, 201237 members currently=20 online.\n Ot= her=20 Stories\n\nBrassfield Elementary divide into = Congruent=20 Halves\nSolving=20 with Shapes\n\nBy Chris Gosek\n\nWorking on problem solving in math through the = use of=20 shapes, Dr. Cansler=E2=80=99s class at Brassfield = Elementary were=20 faced with the task of dividing into congruent halves, = fourths, and eighths.\nThe students were each given two worksheets for = this=20 exercise, using one in planning their methods and the = second=20 to cut out into the separate parts.  The kids = were trying=20 to see how many ways they could fold the squares on = their=20 sheets into equal parts, planning out how they would = arrive at=20 their solution by drawing horizontal and vertical line = segments through the shapes before cutting them out = into the=20 different parts.\n\nBrassfield Elementary testing = different=20 materials\nTesting=20 Acids\n\nBy Chris Gosek\n\nStudents at Brassfield Elementary have been = working with=20 Mr. Danahy in science class, performing tests, using = different=20 minerals to see which contain calcite and sharing = their=20 observations once finished.\nThe kids were split into several groups to = conduct their=20 testing, dropping each mineral in vinegar to gauge the = results.  They used both basalt and sandstone in = this=20 process, watching to see if the liquid = =E2=80=9Cbubbled=E2=80=9D up when they=20 were added.  If they did see bubbles then the = acid was=20 present in each mineral.  Once all groups had = finished=20 observing, they recorded their findings and the entire = class=20 entered a discussion to weigh out the data=20 gathered.\n\nDurant Road Elementary took on = inventor=20 roles\nInventing=20 with Pasta\n\nBy Chris Gosek\n\nMs. Jarrett=E2=80=99s class at Durant Road = Elementary took on the=20 roles of inventors as a part of her annual project = that sees=20 the children create new ways of eating = spaghetti.\nThe creativity of the kids was amazing; with one = student,=20 making a helmet that fed the pasta to him. =  Another=20 invention saw a wooden device that used a spinning = lever to=20 dispense the food.  A basketball hoop was used in = another=20 of the feeding inventions, as spaghetti was scooped = and=20 funneled through the basket and then sucked out by its = creator. One student showed great perseverance after = his dog=20 ate his initial project, creating a second device in = time for=20 the big spaghetti lunch that all the kids enjoyed at = the=20 culmination of the project.\n\nWe=20 Want to Sing\n\nBy Chris Gosek\n\nChorus students at Durant = Road=20 Middle have been preparing with Ms. Boltz, getting = ready for a=20 patriotic performance as a part of the = school=E2=80=99s upcoming=20 =E2=80=9CConstitution Day=E2=80=9D celebration.\nThe talented group was = working on=20 harmonies for the song =E2=80=9CWe Want to = Sing,=E2=80=9D which they will be=20 performing before the entire staff and student body = during=20 =E2=80=9CConstitution Day.=E2=80=9D  In addition, = the chorus will also=20 team up with the school=E2=80=99s band to kick off the = festivities=20 with the National Anthem.  They will also sing = =E2=80=9CAmerica=20 the Beautiful=E2=80=9D at the event.  Many of the = students=20 involved are so excited to take part in = =E2=80=9CConstitution Day=E2=80=9D=20 that they have been coming into school for rehearsal = on their=20 own time despite being currently tracked out, showing=20 dedication to the chorus and their = country.\n\nPatriotic=20 Dance\n\nBy Chris Gosek\n\nThe dance classes with Ms. = Albornoz=20 at Durant Road Middle have been learning several = unique=20 routines as they prepare to strut their stuff in front = of the=20 staff and students as a part of the upcoming = =E2=80=9CConstitution=20 Day=E2=80=9D celebration at the school.\nThe dancers will collaborate = with=20 both the school=E2=80=99s band and chorus during the = event, learning a=20 movement based routine to the tune of =E2=80=9CAmerica = the Beautiful.=E2=80=9D=20  Adding a twist to their number, they will use = hand=20 gestures and sign language during their dance that are = correspondent to the lyrics of the patriotic tune.=20\nIn preparation for their=20 performance, the kids not only learned their moves, = but also=20 were schooled on the history of the song that they = would be=20 dancing too.\n\nStrike=20 up the Band\n\nBy Chris Gosek\n\nThe 8th grade band at Durant Road Middle is = getting back=20 into the swing of things, preparing for several big=20 performances that they will take part in throughout = the=20 2012-13 school year.\nThe first big show for the band will be at the = school=E2=80=99s=20 =E2=80=9CConstitution Day=E2=80=9D event.  Band = Director, Mr. Kuni has=20 not only been teaching the members of the band the = music they=20 will perform, but also brushing the kids up on the = history of=20 bands in America and how they became so involved with = the=20 numerous patriotic celebrations in our = country=E2=80=99s history.=20  The band will combine with the chorus and dance = classes=20 at the school on several pieces, in addition to = playing John=20 Williams=E2=80=99 =E2=80=9COlympic Theme and = Fanfare=E2=80=9D that was created for the=20 1984 Summer Olympics that were hosted in Los=20 Angeles.\nFollowing = =E2=80=9CConstitution Day,=E2=80=9D the=20 band will look ahead to their next big event, the = Durant Fall=20 Band Concert, to be held on November 29, with two more = concerts scheduled at the school later on this=20 spring.\n\nHeritage Elementary prestned \"A Bag = full of=20 them\"\nBag=20 Full of Me\n\nBy Chris Gosek\n\nGetting familiar with their=20 classmates and themselves as well, Ms. = McCluskey=E2=80=99s class at=20 Heritage Elementary stood before their peers and = presented =E2=80=9CA=20 Bag Full of Me.=E2=80=9D\nEach child brought in a bag filled with items = that best=20 described themselves for this project.  The kids=20 displayed things depicting the sports they play, = hobbies,=20 family members, favorite books and movies, and = countless other=20 personal items.  They explained to the class why = each=20 item was important to them and passed them around the = room for=20 viewing once they had described each.  After the=20 presenters were finished, the rest of the children = asked them=20 any questions they had about their = items.\n\nSanford Creek Elementary \"Mystery=20 Tablet\"\n3-2-1....Blast=20 off\n\nBy Chris Gosek\n\nUsing a =E2=80=9Cmystery tablet=E2=80=9D to = propel their creations, Ms.=20 Pufky=E2=80=99s class at Sanford Creek Elementary took = their science=20 lesson outdoors last week to launch  homemade=20 rockets.\nThe students used film canisters and construction = paper=20 in building their air crafts that they placed in water = with=20 their =E2=80=9Cmystery tablets=E2=80=9D that were = provided by their teacher.=20  The reaction of the tablet and the water gave = the kids=20 an up-close look at how matter changes in the liquid=20 eventually powering the rockets to take off and blast = high=20 into the air.\n\nSanford Creek Elementary becoming=20 creative\n\nBy Chris Gosek\n\nFirst grade classes at Sanford Creek Elementary = were=20 getting creative and colorful last week, being = assisted by=20 their parents and teachers in making their very own = tie-dyed=20 t-shirts.\nThe tye-dying project has become an annual = tradition in=20 the first grade classes at Sanford Creek.  Many = parents=20 volunteered to help the children in their designing of = the=20 shirts. The t-shirts were tied up in rubber bands and = the=20 youngsters added their own array of colors to the = material=20 before placing them in a plastic bag to dry. Once = dried, the=20 students had a spectacular new shirt to show off and = bring=20 home.\n\nSanford Creek Elementary during = \"Word=20 Work\"\nWord=20 Families\n\nBy Chris Gosek\n\nThree separate groups were joining forces across = Ms.=20 Propst=E2=80=99s classroom at Sanford Creek Elementary = during =E2=80=9CWord=20 Work=E2=80=9D time to sort their given vocabulary = words into different=20 patterns which they came up with as a unit.\nThe groups had worksheets = containing=20 the words and began the activity by cutting them out. = Each=20 group had a different =E2=80=9Cword family=E2=80=9D to = work with, as one=20 looked at words with short vowels, another had those = with long=20 vowels, and the last group looked at diagraph words. = The kids=20 were asked to sort their words into the patterns, say = them out=20 loud, and then re-sort them again.\n Advertisements", null, "=", null, "=", null, "=", null, "=", null, "=", null, "=", null, "=" ]
[ null, "http://unitedstudentsofjarrett.net/images/3D\"http:/www.thetotalconnection.com/logo.jpg\"", null, "http://unitedstudentsofjarrett.net/images/3D\"http:/www.thetotalconnection.com/mod/adman/photos/Ad350.gif\"", null, "http://unitedstudentsofjarrett.net/images/3D\"http:/www.thetotalconnection.com/mod/adman/photos/Ad157.gif\"", null, "http://unitedstudentsofjarrett.net/images/3D\"http:/www.thetotalconnection.com/mod/adman/photos/Ad330.JPG\"", null, "http://unitedstudentsofjarrett.net/images/3D\"http:/www.thetotalconnection.com/mod/adman/photos/Ad292.JPG\"", null, "http://unitedstudentsofjarrett.net/images/3D\"http:/www.thetotalconnection.com/mod/adman/photos/Ad488.gif\"", null, "http://unitedstudentsofjarrett.net/images/3D\"http:/www.thetotalconnection.com/mod/adman/photos/Ad490.gif\"", null, "http://unitedstudentsofjarrett.net/images/3D\"http:/www.thetotalconnection.com/mod/adman/photos/Ad443.gif\"", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9441992,"math_prob":0.9293739,"size":9160,"snap":"2022-27-2022-33","text_gpt3_token_len":2586,"char_repetition_ratio":0.12756662,"word_repetition_ratio":0.024454726,"special_character_ratio":0.28438863,"punctuation_ratio":0.07589803,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9807213,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16],"im_url_duplicate_count":[null,null,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-25T13:28:04Z\",\"WARC-Record-ID\":\"<urn:uuid:e7ee0a99-d383-4acc-ae37-0725510824d8>\",\"Content-Length\":\"1048912\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3aeb6d2c-9882-4183-ab9b-e5d12b79aec3>\",\"WARC-Concurrent-To\":\"<urn:uuid:4e172482-dd6f-4770-8128-14aa5c6306c0>\",\"WARC-IP-Address\":\"205.233.73.65\",\"WARC-Target-URI\":\"http://unitedstudentsofjarrett.net/images/August-%20Spaghetti%20Other%20Stories%20on%20The%20Total%20Connection.mht\",\"WARC-Payload-Digest\":\"sha1:EDQDZKWQ22DKQNH4WXRZFA3PHGRLHS33\",\"WARC-Block-Digest\":\"sha1:SC4E2QWVAWZLIVPTM4B33OA66YLGUJJJ\",\"WARC-Truncated\":\"length\",\"WARC-Identified-Payload-Type\":\"multipart/related\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103035636.10_warc_CC-MAIN-20220625125944-20220625155944-00294.warc.gz\"}"}
https://atomate.org/gibbs_workflow_tutorial.html
[ "# Running Gibbs Workflows¶\n\n## Introduction¶\n\nStandard density functional theory calculations are 0 K ground state calculations, but most materials are used and modeled at room temperature and above. The Debye model and phonon calculations are two commonly used methods to obtain Gibbs free energies (", null, ") of structures as a function of temperature. Both the Debye model and phonon calculations are supported in atomate, where the Debye model analysis is based on the quasiharmonic technique presented in Moruzzi et al. (Phys. Rev. B 37, 790–799 (1988).) and implemented similar to Toher et al. (Phys. Rev. B 90, 1–14 (2014).. Phonon calculation analysis is performed using phonopy (Togo & Tanaka Scr. Mater. 108, 1–5 (2015).).\n\nThis tutorial will guide you through calculating the Gibbs free energy of diamond Si with atomate. The resulting Gibbs free energies from the calculation will be queried from your Materials database and the heat capacity calculated with NumPy and compared to experimental data.\n\n## Objectives¶\n\n• Run an atomate preset workflow for the Gibbs free energy using Python\n\n• Query for the calculation result in the Gibbs collection of the database\n\n• Visualize the results with matplotlib\n\n## Gibbs Free Energy Workflows¶\n\nGibbs free energies are calculated in DFT based on the following relation:", null, "where", null, "are the total energies calculated with DFT as a function of volume and", null, "is the vibrational contribution to the Helmholz energy. This vibrational energy is calculated using a harmonic approximation, here via the Debye model.\n\nTo calculate the Gibbs free energy, total energies are calculated for several volumes, then vibrational contributions are added for each volume over a range of temperatures to give", null, ". Then an equation of state is fit for each set of energies and volumes at each temperature. Several different equations of state are implemented in pymatgen and several of those are discussed in terms of the Debye model by Shang et al. (Comput. Mater. Sci. 47, 1040–1048 (2010).). Using the fit equation of state, the volume that minimized the energy at a fixed pressure (usually, but not always", null, ") is found. Finding the minimum volume at each temperature and fixed pressure yields the conversion from", null, "to", null, "From the perspective of a workflow, the Gibbs free energy workflow is procedurally similar to the elastic tensor workflow. First the input structure is optimized, then volume of the optimize structure is deformed and energies calculated to yield the points for an E-V curve (or phonon calculations), finally the analysis workflow corresponding to the Debye model or phonon formalism is performed.", null, "Atomate elastic tensor workflow. This uses the same pattern as the Gibbs free energy workflow, but the analysis step (final Firework) calculates the elastic tensor instead of Gibbs free energies.\n\n## Running a Gibbs Free Energy Workflow¶\n\n### Setup¶\n\nMake sure you have completed the installation tutorial. Next, create a folder on your HPC resource for this tutorial. It can be located anywhere. You’ll keep all of the files for this tutorial there.\n\nIf you do not already have important prior results in your atomate environment, start fresh by running:\n\nlpad reset\n\n\nWarning\n\nThis will reset all of your previous Fireworks and Workflows in your LaunchPad. Do not do this if you have actual results that you want to keep!\n\nIf you do not or want to reset your LaunchPad, you can set up a different database to use for tutorials or simply accept mixing your previous results and workflows with the contents of this tutorial in your database.\n\n### Use Python to generate and add the workflow¶\n\nWe’ll use diamond Si as a simple example and get the structure from the Materials Project. This requires that you set up an API key in your .pmgrc.yaml. In the installation tutorial, you set up your FW_config.yaml, you indicated the atomate Fireworks can be found at atomate.vasp.fireworks. Similarly, atomate preset workflows can be imported from atomate.vasp.workflows.presets.core, which thinly wraps the base workflows (atomate.vasp.workflows.base) allowing for common settings to be changed with configuration dictionaries. And we can setup the workflow and add it to our LaunchPad ready to run in just a few lines of Python.\n\nCreate the workflow script\n\nIn the directory you created, make a Python script named gibbs.py with the following contents:\n\n#!/usr/bin/env python\nimport numpy as np\nfrom pymatgen.ext.matproj import MPRester\nfrom atomate.vasp.workflows.presets.core import wf_gibbs_free_energy\n\n# Get the structure from the Materials Project\nwith MPRester() as mpr:\nstruct = mpr.get_structure_by_material_id('mp-149')\n\n# Set up the deformation matricies, where each deformation is a 3x3 list of strains.\n# There will be 7 structures between +/- 10% volume. Note that the 1/3 power is so\n# that we scale each direction by (x+1)^(1/3) and the total volume by (x+1).\ndeformations = [(np.eye(3)*((1+x)**(1.0/3.0))).tolist() for x in np.linspace(-0.1, 0.1, 7)]\n\n# Create the configurations dictionary, defining the temperature range,\n# Poisson ratio (from experiments or the Materials Project), turning on consideration\n# of anharmonic contributions, and finally the deformation matrix describing points\n# on the energy vs. volume curve.\nc = {\"T_MIN\": 10, \"T_STEP\": 10, \"T_MAX\": 2000,\n\"POISSON\": 0.20, \"ANHARMONIC_CONTRIBUTION\": True,\n\"DEFORMATIONS\": deformations}\n\n# Create the workflow\nworkflow = wf_gibbs_free_energy(struct, c)\n\n\n\nNote that here we used a Poisson ratio of 0.2, found at the Materials Project entry for Si. In the Debye model, the Poisson ratio controls the shape and magnitude of the elbow in the heat capacity curve. Typical materials are sometimes idealized to have a Poisson ratio of 0.33, but to have the most accurate ratio will give more accurate heat capacities near the low temperature limit. Poisson ratios can be taken from experimental references, from the Materials Project and are often comparable for chemically similar structures (alternatively, they be first calculated via the elastic tensor workflow).\n\nSince we are potentially interested in the high-temperature thermodynamic behavior of Si, we set the anharmonic contribution to True, so that we can properly deviate from the high-temperature limit of the Debye model of", null, "based on the Gruneisen parameter,", null, ".\n\npython gibbs.py\n\n\n### Running the workflow¶\n\nThe following command will submit a single job to the batch queue configured in my_qadapter.yaml. Assuming the same configuration as in the installation tutorial, the job will launch Fireworks from your LaunchPad until all of them have completed or you run out of walltime. This workflow should only take few minutes.\n\nqlaunch singleshot\n\n\nYou can go to the output files from the batch job (*.out and *.error) at the launch directories to make sure everything went well or check the LaunchPad (lpad get_wflows).\n\n## Analyzing an Equation of State Workflow¶\n\nFinally, we’ll analyze the results of our Gibbs free energy calculation. Here we’ll compare the heat capacity from our DFT calculation with experimental values. Simply add the following Python script (gibbs-analysis.py) to your folder and run it\n\nfrom atomate.vasp.database import VaspCalcDb\nfrom pymatgen.core import Structure\nimport numpy as np\n\nimport matplotlib.pyplot as plt\n\n# create the atomate db from your db.json\nPATH_TO_MY_DB_JSON = '/path/to/my/db.json'\natomate_db = VaspCalcDb.from_db_file(PATH_TO_MY_DB_JSON)\n\n# use the Gibbs collection\n\n# get our task for the formula\ngibbs_entry = gibbs_coll.find_one({'formula_pretty': 'Si'})\n\n# set up the pymatgen structure\nstruct = Structure.from_dict(gibbs_entry['structure'])\neVatom_to_kjmol = 96.485340095*1000/len(struct)\n\n# Gibbs free energy data from Barin for Si:\nT_barin = range(300, 1700, 100)\nCp_barin = [20.050, 22.142, 23.330, 24.154, 24.803, 25.359, 25.874,\n26.338, 26.778, 27.196, 27.614, 28.033, 28.451, 28.870]\n\nT_calc = np.array(gibbs_entry['temperatures'])\nG_calc = np.array(gibbs_entry['gibbs_free_energy'])*eVatom_to_kjmol\n# Numerical derivative of the heat capacity, considering a step size of 10\n# Note: the truncated last two values are to account for the numerical derivative endpoint error\n\n# Plot our calculated Gibbs free energies vs. those from JANAF\nplt.scatter(T_barin, Cp_barin, label='JANAF tables (experiment)')\nplt.plot(T_calc[:-2], Cp_calc, label='Calculated')\nplt.title('Debye model Gibbs free energy of Si')\nplt.xlabel('T (K)')\nplt.ylabel('Cp (J/K-mol)')\nplt.legend()\n\n# save the figure\nplt.savefig('Si-heat-capacity.png')\n\n\nIf you open the saved figure, Si-heat-capacity.png, it should match the one below!", null, "Heat capacity for Si calculated with atomate and compared with experimental values.\n\n## Conclusion¶\n\nIn this tutorial we have further demonstrated the use of atomate preset workflows to easily calculate and analyze interesting materials properties.\n\nTo see what other preset workflows can be run, see the documentation that includes them at atomate.vasp.workflows.presets. They can be set up and run in exactly the same way as this tutorial, by passing in a structure and an optional configuration dictionary.\n\nAt this point, you might:" ]
[ null, "https://atomate.org/_images/math/8a70e68f407c20515867e86ce3c7f9b1d8f74616.png", null, "https://atomate.org/_images/math/15ec8b7a278c8facb18e2385d9c54b5ddeb93f83.png", null, "https://atomate.org/_images/math/b5df63172953a1cc84d31c5fa7d1354eddacf567.png", null, "https://atomate.org/_images/math/893a0496747e918d1a810978ae2ba791433377fe.png", null, "https://atomate.org/_images/math/3db155c5e8565ef9b1c7fb856be369955109eea3.png", null, "https://atomate.org/_images/math/992cf818704e858252c680ccf36abe9d6e03d168.png", null, "https://atomate.org/_images/math/893a0496747e918d1a810978ae2ba791433377fe.png", null, "https://atomate.org/_images/math/aada3e2259c23a06d98be2ee457a29a8e1b73eeb.png", null, "https://atomate.org/_images/elastic_tensor.png", null, "https://atomate.org/_images/math/3ea4fe9c81dae83d151d1e9628cbd4239f37f9ac.png", null, "https://atomate.org/_images/math/34d137cf01c787ecda732761c3f95b0f65a6c3e9.png", null, "https://atomate.org/_images/Si-heat-capacity.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8191976,"math_prob":0.89553887,"size":9301,"snap":"2021-21-2021-25","text_gpt3_token_len":2187,"char_repetition_ratio":0.1296117,"word_repetition_ratio":0.0057720058,"special_character_ratio":0.22857757,"punctuation_ratio":0.13736904,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98589724,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,4,null,4,null,4,null,8,null,4,null,4,null,8,null,4,null,4,null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-08T11:21:09Z\",\"WARC-Record-ID\":\"<urn:uuid:88565bc3-d780-4dbe-b3f7-f3d2d2d18259>\",\"Content-Length\":\"30361\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0218b228-af29-4945-93c7-0c9a332be151>\",\"WARC-Concurrent-To\":\"<urn:uuid:1d3888f2-e946-4c80-8e85-80021059de54>\",\"WARC-IP-Address\":\"185.199.108.153\",\"WARC-Target-URI\":\"https://atomate.org/gibbs_workflow_tutorial.html\",\"WARC-Payload-Digest\":\"sha1:IC6TIEEUDBLOSS3FWCJAXBCJDXAIFIAC\",\"WARC-Block-Digest\":\"sha1:3SFG47LC7JYVVILY3XN72OE5NDK2HNSK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243988858.72_warc_CC-MAIN-20210508091446-20210508121446-00625.warc.gz\"}"}
https://educationexpert.net/mathematics/2557386.html
[ "", null, "Mathematics\n5 September, 18:38\n\n# I was provided with 2 similar triangles, the side lengths of the full triangle was 12,14 and 20. The second triangle was given with side lengths of 18, 21 and I have to figure out x which would be the longest side in the second triangle.\n\n+2\nAnswers (1)\n1.", null, "5 September, 18:58\n0\nAnswer:First you have to know which sideS mach. Put the longest side of the first triangle over X (which is the longest side of the second triangle), then equals to any side of the first triangle over the equivalent side of the second triangle, for example 20/x = 12/18. And after that you can multiply in X form. 12x = 360\n\nX=30\nKnow the Answer?\nNot Sure About the Answer?\nGet an answer to your question ✅ “I was provided with 2 similar triangles, the side lengths of the full triangle was 12,14 and 20. The second triangle was given with side ...” in 📙 Mathematics if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions." ]
[ null, "https://educationexpert.net/templates/educationexpert/images/icons/mathematics.svg", null, "https://educationexpert.net/templates/educationexpert/dleimages/noavatar.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9730872,"math_prob":0.93101,"size":334,"snap":"2021-21-2021-25","text_gpt3_token_len":77,"char_repetition_ratio":0.14242424,"word_repetition_ratio":0.0,"special_character_ratio":0.23652695,"punctuation_ratio":0.11594203,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99612594,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-19T15:03:46Z\",\"WARC-Record-ID\":\"<urn:uuid:ba251dfb-226a-4e87-a425-8994cc86fd40>\",\"Content-Length\":\"22302\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f9e2e779-141e-4cab-8616-5fe65dcb26ab>\",\"WARC-Concurrent-To\":\"<urn:uuid:b0af5755-306a-430a-8a1d-94ddfa4d9896>\",\"WARC-IP-Address\":\"172.67.223.147\",\"WARC-Target-URI\":\"https://educationexpert.net/mathematics/2557386.html\",\"WARC-Payload-Digest\":\"sha1:A57F6EOLBX7PADJDEDPKKL4HF5JNUV3A\",\"WARC-Block-Digest\":\"sha1:WOB5KZGJJRZNEAT6IO2XV7IEGGXKPCDW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487648373.45_warc_CC-MAIN-20210619142022-20210619172022-00484.warc.gz\"}"}
https://metanumbers.com/30028
[ "# 30028 (number)\n\n30,028 (thirty thousand twenty-eight) is an even five-digits composite number following 30027 and preceding 30029. In scientific notation, it is written as 3.0028 × 104. The sum of its digits is 13. It has a total of 3 prime factors and 6 positive divisors. There are 15,012 positive integers (up to 30028) that are relatively prime to 30028.\n\n## Basic properties\n\n• Is Prime? No\n• Number parity Even\n• Number length 5\n• Sum of Digits 13\n• Digital Root 4\n\n## Name\n\nShort name 30 thousand 28 thirty thousand twenty-eight\n\n## Notation\n\nScientific notation 3.0028 × 104 30.028 × 103\n\n## Prime Factorization of 30028\n\nPrime Factorization 22 × 7507\n\nComposite number\nDistinct Factors Total Factors Radical ω(n) 2 Total number of distinct prime factors Ω(n) 3 Total number of prime factors rad(n) 15014 Product of the distinct prime numbers λ(n) -1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) 0 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 0 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 30,028 is 22 × 7507. Since it has a total of 3 prime factors, 30,028 is a composite number.\n\n## Divisors of 30028\n\n1, 2, 4, 7507, 15014, 30028\n\n6 divisors\n\n Even divisors 4 2 1 1\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 6 Total number of the positive divisors of n σ(n) 52556 Sum of all the positive divisors of n s(n) 22528 Sum of the proper positive divisors of n A(n) 8759.33 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 173.286 Returns the nth root of the product of n divisors H(n) 3.42811 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 30,028 can be divided by 6 positive divisors (out of which 4 are even, and 2 are odd). The sum of these divisors (counting 30,028) is 52,556, the average is 87,59.,333.\n\n## Other Arithmetic Functions (n = 30028)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 15012 Total number of positive integers not greater than n that are coprime to n λ(n) 7506 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 3252 Total number of primes less than or equal to n r2(n) 0 The number of ways n can be represented as the sum of 2 squares\n\nThere are 15,012 positive integers (less than 30,028) that are coprime with 30,028. And there are approximately 3,252 prime numbers less than or equal to 30,028.\n\n## Divisibility of 30028\n\n m n mod m 2 3 4 5 6 7 8 9 0 1 0 3 4 5 4 4\n\nThe number 30,028 is divisible by 2 and 4.\n\n## Classification of 30028\n\n• Deficient\n\n### Expressible via specific sums\n\n• Polite\n• Non-hypotenuse\n\n## Base conversion (30028)\n\nBase System Value\n2 Binary 111010101001100\n3 Ternary 1112012011\n4 Quaternary 13111030\n5 Quinary 1430103\n6 Senary 351004\n8 Octal 72514\n10 Decimal 30028\n12 Duodecimal 15464\n20 Vigesimal 3f18\n36 Base36 n64\n\n## Basic calculations (n = 30028)\n\n### Multiplication\n\nn×y\n n×2 60056 90084 120112 150140\n\n### Division\n\nn÷y\n n÷2 15014 10009.3 7507 6005.6\n\n### Exponentiation\n\nny\n n2 901680784 27075670581952 813028236234854656 24413611877660215610368\n\n### Nth Root\n\ny√n\n 2√n 173.286 31.082 13.1638 7.8615\n\n## 30028 as geometric shapes\n\n### Circle\n\n Diameter 60056 188671 2.83271e+09\n\n### Sphere\n\n Volume 1.13414e+14 1.13309e+10 188671\n\n### Square\n\nLength = n\n Perimeter 120112 9.01681e+08 42466\n\n### Cube\n\nLength = n\n Surface area 5.41008e+09 2.70757e+13 52010\n\n### Equilateral Triangle\n\nLength = n\n Perimeter 90084 3.90439e+08 26005\n\n### Triangular Pyramid\n\nLength = n\n Surface area 1.56176e+09 3.1909e+12 24517.8\n\n## Cryptographic Hash Functions\n\nmd5 e387385ebe0dbeefed3e8e9f3968aaba aa5cb807f6bd34288fff6fd6c4b452830b3de843 edb35f5bf1737dfcd4472f8a487e3e8a3833ebdcdf94f2b0864c2396a2d183d0 9599d377581f6c7b9ef1e573e5957f5f3394f163fb25ebc36cd9794b01df462ae2ddfe526f5330158f8a115bd41e0156b1345f3f7ea41b6c66fd9b022a96ecb2 6559f79434bcd44494948151d68352a62c224685" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.62424105,"math_prob":0.9867651,"size":4466,"snap":"2021-43-2021-49","text_gpt3_token_len":1593,"char_repetition_ratio":0.12057374,"word_repetition_ratio":0.025757575,"special_character_ratio":0.45476937,"punctuation_ratio":0.08031088,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.99510324,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-04T08:17:31Z\",\"WARC-Record-ID\":\"<urn:uuid:3605b839-f091-4c5a-a861-e3b7ee0c2b69>\",\"Content-Length\":\"39083\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6ddb7ada-e377-42e1-915f-e7630c568ffc>\",\"WARC-Concurrent-To\":\"<urn:uuid:aa3b5ae3-5363-483d-9e92-e16abb378372>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/30028\",\"WARC-Payload-Digest\":\"sha1:BIHEJ5HCKIAQZJBCQNYNOZ6XDOGDOSMQ\",\"WARC-Block-Digest\":\"sha1:5ERM7PAUVQX3ZQ2AVZVLUX5SOK7AUUDO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362952.24_warc_CC-MAIN-20211204063651-20211204093651-00530.warc.gz\"}"}
https://forum.yoyogames.com/index.php?threads/changing-sprites-when-level-increases.47912/
[ "# GM:S 1.4 changing sprites when level increases!\n\nDiscussion in 'Programming' started by EZTALES, May 25, 2018.\n\nTags:\n1. ### EZTALESMember\n\nJoined:\nApr 15, 2018\nPosts:\n166\nhey gang.\njust wondering if anyone could help me out with a little problem on my hands. i want to change the players sprite when his level goes up. the code is down below so please help me out!\nOBJ PLAYER\nCREATE\n/// set fixed rotation\nphy_fixed_rotation = true;\nspd = 2;\nimage_speed = 0;\nSTEP\n\n/// movement code (organize time)\n// right\nif (keyboard_check(vk_right)) {\nphy_position_x += spd;\nsprite_index = spr_player_R;\n}\n// up\nif (keyboard_check(vk_up)) {\nphy_position_y -= spd;\nsprite_index = spr_player_U;\n}\n// left\nif (keyboard_check(vk_left)) {\nphy_position_x -= spd;\nsprite_index = spr_player_L;\n}\n// down\nif (keyboard_check(vk_down)) {\nphy_position_y += spd;\nsprite_index = spr_player_D;\n}\nCOLLIDE WITH XP:\n/// collect exp\nwith (other) {instance_destroy();}\nwith (obj_player_stats) {\nexpr += 1;\n/// Level Up Code\nif (expr >= maxexpr) {\nlevel += 1;\nexpr = expr-maxexpr;\nmaxexpr *= 2;\n}\n\n}\nok now the player stats...\nPLAYER STATS\nCREATE\n/// stats\nlevel = 1;\nexpr = 0;\nmaxexpr = 2;\nDRAW_GUI\n/// draw_stats\nif (room != rm_start) && (room!= rm_load){\ndraw_set_color(c_black);\ndraw_set_halign(fa_center);\ndraw_set_font(font_score);\ndraw_text(68, 33, \"LEVEL: \" + string(level));\n}\nOk thats all. somebody plz help!\n\nJoined:\nJan 16, 2018\nPosts:\n129\nHi, maybe like this:\n\nCode:\n```with (obj_Check)\n{\nif !collision_line(x, y, other.x, other.y, obj_Wall, false, true)\n{\nsprite_index = spr_spotted;\n}\nelse\n{\nsprite_index = spr_clear;\n}\n}```\n\nJoined:\nApr 13, 2016\nPosts:\n7,046\nStore the sprites to be used in each section of your code in variables, so that when the instance is created it'd have something like this:\n\nCode:\n```sprite_left = spr_player_L;\nsprite_right = spr_player_R;\nsprite_up = spr_player_U;\nsprite_down = spr_player_D;```\n\nYou'd then change the rest of the code to use these variables, eg:\n\nCode:\n```if (keyboard_check(vk_down)) {\nphy_position_y += spd;\nsprite_index = sprite_down;\n}```\n\nOnce you have that, you can change the sprites at any time by simply changing the resource the variable points to, so when the player levels up you'd call some code like:\n\nCode:\n```with (obj_Player)\n{\nsprite_left = spr_player_L_Level2;\nsprite_right = spr_player_R_Level2;\nsprite_up = spr_player_U_level2;\nsprite_down = spr_player_D_level2;\n}```\n\nHope that helps!\n\npoinl and TimothyAllen like this.\n4. ### TimothyAllenMember\n\nJoined:\nAug 7, 2016\nPosts:\n429\nA modified version of Nocturne's suggestion. (Or maybe more of an extension)\n\nWhen setting the sprite_ variables, use asset_get_index. For instance:\nCode:\n```sprite_left = asset_get_index(\"spr_player_L_level\" + string(other.level));\n```\nAnother option is making the sprite_ variables arrays and index them using the player's level.\n\nNocturne likes this." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9003872,"math_prob":0.9226493,"size":321,"snap":"2019-51-2020-05","text_gpt3_token_len":78,"char_repetition_ratio":0.009463723,"word_repetition_ratio":0.0,"special_character_ratio":0.23987539,"punctuation_ratio":0.1641791,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9660158,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-15T06:37:28Z\",\"WARC-Record-ID\":\"<urn:uuid:7ff50a37-4ab9-47a8-80f6-9c6b64a1cadd>\",\"Content-Length\":\"33685\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ca433172-85ba-42f9-a5df-0c335ff7f33a>\",\"WARC-Concurrent-To\":\"<urn:uuid:92c96751-498c-432b-be0f-fdb98edf7975>\",\"WARC-IP-Address\":\"109.169.18.3\",\"WARC-Target-URI\":\"https://forum.yoyogames.com/index.php?threads/changing-sprites-when-level-increases.47912/\",\"WARC-Payload-Digest\":\"sha1:NNI4OHZAG4SB57FJLSFM6LGXPFAZLQMI\",\"WARC-Block-Digest\":\"sha1:B5YAAXWZO5NXT5XDCMWSUAMAAPGNMUXU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575541301598.62_warc_CC-MAIN-20191215042926-20191215070926-00559.warc.gz\"}"}
https://jmm.guilan.ac.ir/article_5561.html
[ "# Numerical solution of space-time variable fractional order advection-dispersion equation using radial basis functions\n\nDocument Type : Research Article\n\nAuthors\n\n1 Department of Mathematics, University of Sistan and Baluchestan, Zahedan, Iran\n\n2 Department of Mathematics and Computer Science, Sirjan University of Technology, Sirjan, Iran\n\nAbstract\n\nThis paper aims to advance the radial basis function method for solving space-time variable-order fractional partial differential equations. The fractional derivatives for time and space are considered in the Coimbra and the Riemann-Liouville sense, respectively. First, the time-variable fractional derivative is discretized through a finite difference approach. Then, the space-variable fractional derivative is approximated by radial basis functions. Also, we advance the Rippa algorithm to obtain a good value for the shape parameter of the radial basis functions. Results obtained from numerical experiments have been compared to the analytical solutions, which indicate high accuracy and efficiency for the proposed scheme.\n\nKeywords" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.69582516,"math_prob":0.87715906,"size":1822,"snap":"2022-40-2023-06","text_gpt3_token_len":468,"char_repetition_ratio":0.12761275,"word_repetition_ratio":0.22477064,"special_character_ratio":0.25740945,"punctuation_ratio":0.2346041,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9864925,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-29T22:02:18Z\",\"WARC-Record-ID\":\"<urn:uuid:21c13e5b-00d7-4e21-b8b3-854cdf1e3593>\",\"Content-Length\":\"43434\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7b74eef8-11a9-4575-b6db-e4d831095c10>\",\"WARC-Concurrent-To\":\"<urn:uuid:b11450b4-0d5c-426e-818e-2190b1ea5f58>\",\"WARC-IP-Address\":\"89.144.141.248\",\"WARC-Target-URI\":\"https://jmm.guilan.ac.ir/article_5561.html\",\"WARC-Payload-Digest\":\"sha1:LHTGEJ2CM77SBAEVAS2CFG7IGAMBLLJT\",\"WARC-Block-Digest\":\"sha1:EBKDXYRRFSBAN2EU7YC45PHBQZNUB7SP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499768.15_warc_CC-MAIN-20230129211612-20230130001612-00815.warc.gz\"}"}
https://speakerdeck.com/gpeyre/des-mathematiques-appliquees-appliquables-et-une-application-a-limagerie
[ "500\n\n# Des mathématiques appliquées, appliquables, et une application à l’imagerie\n\nExposé en l'honneur de Michel Pierre\n\nJune 27, 2014\n\n## Transcript\n\n1. ### c J. Malick Des mathématiques appliquées, appliquables, et une application\n\nà l’imagerie Gabriel Peyré www.numerical-tours.com\n\n8. ### Overview • Approximation in an Ortho-Basis • Compression and Denoising\n\n• Sparse Inverse Problem Regularization\n9. ### Orthogonal basis { m }m of L2([0, 1]d) Continuous signal/image\n\nf L2([0, 1]d). Orthogonal Decompositions\n10. ### Orthogonal basis { m }m of L2([0, 1]d) f =\n\nm f, m m ||f|| = |f(x)|2dx = m | f, m ⇥|2 Continuous signal/image f L2([0, 1]d). Orthogonal Decompositions\n11. ### Orthogonal basis { m }m of L2([0, 1]d) f =\n\nm f, m m ||f|| = |f(x)|2dx = m | f, m ⇥|2 Continuous signal/image f L2([0, 1]d). Orthogonal Decompositions m\n12. ### 1-D Wavelet Basis Wavelets: j,n (x) = 1 2j/2 x\n\n2jn 2j Position n, scale 2j, m = (n, j).\n13. ### 1-D Wavelet Basis Wavelets: j,n (x) = 1 2j/2 x\n\n2jn 2j Position n, scale 2j, m = (n, j).\n14. ### m1,m2 Basis { m1,m2 (x1, x2 )}m1,m2 of L2([0, 1]2)\n\nm1,m2 (x1, x2 ) = m1 (x1 ) m2 (x2 ) tensor product 2-D Fourier Basis Basis { m (x)}m of L2([0, 1]) m1 m2\n15. ### m1,m2 Basis { m1,m2 (x1, x2 )}m1,m2 of L2([0, 1]2)\n\nm1,m2 (x1, x2 ) = m1 (x1 ) m2 (x2 ) tensor product 2-D Fourier Basis Basis { m (x)}m of L2([0, 1]) m1 m2 f(x) f, m1,m2 Fourier transform x m\n16. ### 3 elementary wavelets { H, V , D}. Orthogonal basis\n\nof L2([0, 1]2): k j,n (x) = 2 j (2 jx n) k=H,V,D j<0,2j n [0,1]2 2-D Wavelet Basis V (x) H(x) D(x)\n17. ### 3 elementary wavelets { H, V , D}. Orthogonal basis\n\nof L2([0, 1]2): k j,n (x) = 2 j (2 jx n) k=H,V,D j<0,2j n [0,1]2 2-D Wavelet Basis V (x) H(x) D(x)\n\nx (j, n, k)\n\n22. ### Overview • Approximation in an Ortho-Basis • Compression and Denoising\n\n• Sparse Inverse Problem Regularization\n23. ### Compression by Transform-coding Image f f forward a[m] = ⇥f,\n\nm ⇤ R transform ˜ a[m]\n24. ### Compression by Transform-coding Image f f forward a[m] = ⇥f,\n\nm ⇤ R transform Quantization: q[m] = sign(a[m]) |a[m]| T ⇥ Z ˜ a[m] T T 2T 2T a[m] bin T q[m] Z ˜ a[m]\n25. ### Compression by Transform-coding Image f f forward a[m] = ⇥f,\n\nm ⇤ R coding transform Entropic coding: use statistical redundancy (many 0’s). Quantization: q[m] = sign(a[m]) |a[m]| T ⇥ Z ˜ a[m] T T 2T 2T a[m] bin T q[m] Z ˜ a[m]\n26. ### Compression by Transform-coding Image f f forward a[m] = ⇥f,\n\nm ⇤ R coding decoding q[m] Z transform Entropic coding: use statistical redundancy (many 0’s). Quantization: q[m] = sign(a[m]) |a[m]| T ⇥ Z ˜ a[m] T T 2T 2T a[m] bin T q[m] Z ˜ a[m]\n27. ### Compression by Transform-coding Image f f forward Dequantization: ˜ a[m]\n\n= sign(q[m]) |q[m] + 1 2 ⇥ T a[m] = ⇥f, m ⇤ R coding decoding q[m] Z ˜ a[m] dequantization transform Entropic coding: use statistical redundancy (many 0’s). Quantization: q[m] = sign(a[m]) |a[m]| T ⇥ Z ˜ a[m] T T 2T 2T a[m] bin T q[m] Z ˜ a[m]\n28. ### Compression by Transform-coding Image f f forward Dequantization: ˜ a[m]\n\n= sign(q[m]) |q[m] + 1 2 ⇥ T a[m] = ⇥f, m ⇤ R coding decoding q[m] Z ˜ a[m] dequantization transform backward fR = m IT ˜ a[m] m transform Entropic coding: use statistical redundancy (many 0’s). Quantization: q[m] = sign(a[m]) |a[m]| T ⇥ Z ˜ a[m] T T 2T 2T a[m] bin T q[m] Z Zoom on f ˜ a[m] fR , R =0.2 bit/pixel\n29. ### Compression by Transform-coding Image f f forward Dequantization: ˜ a[m]\n\n= sign(q[m]) |q[m] + 1 2 ⇥ T a[m] = ⇥f, m ⇤ R coding decoding q[m] Z ˜ a[m] dequantization transform backward fR = m IT ˜ a[m] m transform Entropic coding: use statistical redundancy (many 0’s). Quantization: q[m] = sign(a[m]) |a[m]| T ⇥ Z ˜ a[m] T T 2T 2T a[m] bin T q[m] Z ||f fM ||2 = O(M ) =⇥ ||f fR ||2 = O(log (R)R ) Theorem: Zoom on f ˜ a[m] fR , R =0.2 bit/pixel\n\n32. ### Noisy f Denoising thresh. f = N 1 m=0 f,\n\nm ⇥ m ˜ f = | f, m ⇥|>T f, m ⇥ m\n33. ### Noisy f Denoising thresh. f = N 1 m=0 f,\n\nm ⇥ m ˜ f = | f, m ⇥|>T f, m ⇥ m In practice: T 3 for T = 2 log(N) Theorem: if ||f0 f0,M ||2 = O(M ), E(|| ˜ f f0 ||2) = O( 2 +1 )\n34. ### Overview • Approximation in an Ortho-Basis • Compression and Denoising\n\n• Sparse Inverse Problems Regularization\n35. ### Recovering f0 2 RN from noisy observations: y = Kf0\n\n+ w 2 RP K : RN ! RP with P ⌧ N (missing information) Inverse Problems\n36. ### Examples: Inpainting, super-resolution, . . . Recovering f0 2 RN\n\nfrom noisy observations: y = Kf0 + w 2 RP K : RN ! RP with P ⌧ N (missing information) Inverse Problems f0 K K\n\nRQ\n39. ### L1 Regularization observations w coe cients image K x0 RN\n\nf0 = x0 RQ y = Kf0 + w RP\n40. ### y = K f0 + w = x0 + w\n\n2 RP Equivalent model: L1 Regularization observations = K ⇥ ⇥ RP N w coe cients image K x0 RN f0 = x0 RQ y = Kf0 + w RP\n41. ### y = K f0 + w = x0 + w\n\n2 RP Equivalent model: If is invertible: 1 y = x0 + 1 w L1 Regularization observations = K ⇥ ⇥ RP N w coe cients image K x0 RN f0 = x0 RQ y = Kf0 + w RP\n42. ### y = K f0 + w = x0 + w\n\n2 RP Equivalent model: If is invertible: 1 y = x0 + 1 w L1 Regularization observations = K ⇥ ⇥ RP N w coe cients image K x0 RN f0 = x0 RQ y = Kf0 + w RP Problems: 1w can “explose”. can even be non-invertible.\n43. ### Inverse Problem Regularization observations y parameter Estimator: x(y) depends only\n\non Observations: y = x0 + w 2 RP .\n44. ### Inverse Problem Regularization observations y parameter Example: variational methods Estimator:\n\nx(y) depends only on x ( y ) 2 argmin x 2RN 1 2 || y x ||2 + J ( x ) Data fidelity Regularity Observations: y = x0 + w 2 RP .\n45. ### J ( x0) Regularity of x0 Inverse Problem Regularization observations\n\ny parameter Example: variational methods Estimator: x(y) depends only on x ( y ) 2 argmin x 2RN 1 2 || y x ||2 + J ( x ) Data fidelity Regularity Observations: y = x0 + w 2 RP . Choice of : tradeo ||w|| Noise level\n46. ### J ( x0) Regularity of x0 x ( y )\n\n2 argmin x = y J ( x ) Inverse Problem Regularization observations y parameter Example: variational methods Estimator: x(y) depends only on x ( y ) 2 argmin x 2RN 1 2 || y x ||2 + J ( x ) Data fidelity Regularity Observations: y = x0 + w 2 RP . No noise: 0+, minimize Choice of : tradeo ||w|| Noise level\n47. ### J0( x ) = # { m ; xm 6=\n\n0} “Ideal” sparsity: Sparse Priors\n48. ### Sparse regularization: x? 2 argmin x 1 2 || y\n\nx ||2 + J0( x ) J0( x ) = # { m ; xm 6= 0} “Ideal” sparsity: Sparse Priors\n49. ### Sparse regularization: Denoising in ortho-basis: K = Id, 2 =\n\nId, ⇤ = Id x? 2 argmin x 1 2 || y x ||2 + J0( x ) J0( x ) = # { m ; xm 6= 0} “Ideal” sparsity: Sparse Priors\n50. ### Sparse regularization: Denoising in ortho-basis: K = Id, 2 =\n\nId, ⇤ = Id x? 2 argmin x 1 2 || y x ||2 + J0( x ) J0( x ) = # { m ; xm 6= 0} “Ideal” sparsity: where ˜ x = ⇤ y = {h y, m i}m, T 2 = 2 min x || ⇤ y x ||2 + T 2 J0( x ) = P m |˜ xm xm |2 + T 2 ( xm ) Sparse Priors\n51. ### Sparse regularization: Denoising in ortho-basis: K = Id, 2 =\n\nId, ⇤ = Id x? 2 argmin x 1 2 || y x ||2 + J0( x ) J0( x ) = # { m ; xm 6= 0} “Ideal” sparsity: where ˜ x = ⇤ y = {h y, m i}m, T 2 = 2 min x || ⇤ y x ||2 + T 2 J0( x ) = P m |˜ xm xm |2 + T 2 ( xm ) Solution: x ? m = ⇢ xm if | ˜ xm | > T, 0 otherwise. Sparse Priors y ?y x ?\n52. ### Sparse regularization: Denoising in ortho-basis: K = Id, 2 =\n\nId, ⇤ = Id Non-orthogonal : NP-hard to solve. x? 2 argmin x 1 2 || y x ||2 + J0( x ) J0( x ) = # { m ; xm 6= 0} “Ideal” sparsity: where ˜ x = ⇤ y = {h y, m i}m, T 2 = 2 min x || ⇤ y x ||2 + T 2 J0( x ) = P m |˜ xm xm |2 + T 2 ( xm ) Solution: x ? m = ⇢ xm if | ˜ xm | > T, 0 otherwise. Sparse Priors y ?y x ?\n53. ### Image with 2 pixels: q = 0 J0 (x) =\n\n# {m \\ xm = 0} J0 (x) = 0 null image. J0 (x) = 1 sparse image. J0 (x) = 2 non-sparse image. x2 Convex Relaxation: L1 Prior x1\n54. ### Image with 2 pixels: q = 0 q = 1\n\nq = 2 q = 3/2 q = 1/2 Jq (x) = m |xm |q J0 (x) = # {m \\ xm = 0} J0 (x) = 0 null image. J0 (x) = 1 sparse image. J0 (x) = 2 non-sparse image. x2 Convex Relaxation: L1 Prior q priors: (convex for q 1) x1\n55. ### Image with 2 pixels: q = 0 q = 1\n\nq = 2 q = 3/2 q = 1/2 Jq (x) = m |xm |q J0 (x) = # {m \\ xm = 0} J0 (x) = 0 null image. J0 (x) = 1 sparse image. J0 (x) = 2 non-sparse image. x2 J1 (x) = m |xm | Convex Relaxation: L1 Prior Sparse 1 prior: q priors: (convex for q 1) x1\n56. ### x argmin x=y m |xm | x x = y\n\nNoiseless Sparse Regularization Noiseless measurements: y = x0\n57. ### x argmin x=y m |xm | x x = y\n\nx argmin x=y m |xm |2 Noiseless Sparse Regularization x x = y Noiseless measurements: y = x0\n58. ### x argmin x=y m |xm | x x = y\n\nx argmin x=y m |xm |2 Noiseless Sparse Regularization Convex linear program. Interior points, cf. [Chen, Donoho, Saunders] “basis pursuit”. Douglas-Rachford splitting, see [Combettes, Pesquet]. x x = y Noiseless measurements: y = x0\n59. ### y = Kf0 + w (Kf)i = ⇢ 0 if\n\ni 2 ⌦, fi if i / 2 ⌦. Original f0 . Original Measures Inpainting Problem\n60. ### y = Kf0 + w (Kf)i = ⇢ 0 if\n\ni 2 ⌦, fi if i / 2 ⌦. Original f0 . Original Measures Inpainting Problem f ? = x ? Recovered\n\n63. ### • Mathematical challenges: – Theoretical performance guarantees. – Fast algorithms.\n\nConclusion • Sparse regularization: denoising ! inverse problems." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5231953,"math_prob":0.99905676,"size":2683,"snap":"2021-31-2021-39","text_gpt3_token_len":1126,"char_repetition_ratio":0.122433744,"word_repetition_ratio":0.7351598,"special_character_ratio":0.43458813,"punctuation_ratio":0.11912226,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996284,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-26T22:30:49Z\",\"WARC-Record-ID\":\"<urn:uuid:76f88dbc-149d-41da-bed4-823a93df2dd0>\",\"Content-Length\":\"117671\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5a6fd4d0-d93f-483c-b3e0-c251a1e31944>\",\"WARC-Concurrent-To\":\"<urn:uuid:ee4f58bd-f347-4374-9fb7-0de804b68d84>\",\"WARC-IP-Address\":\"23.22.5.68\",\"WARC-Target-URI\":\"https://speakerdeck.com/gpeyre/des-mathematiques-appliquees-appliquables-et-une-application-a-limagerie\",\"WARC-Payload-Digest\":\"sha1:52GRUI3AEN2MBECGDFBIVSACI3O4PANO\",\"WARC-Block-Digest\":\"sha1:EQABVTMA55ZJZL4NPOXNNK4FYB6ZUVKH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057973.90_warc_CC-MAIN-20210926205414-20210926235414-00156.warc.gz\"}"}
http://mizar.org/version/current/html/proofs/ami_6/22
[ "let il, k be Nat; :: thesis: NIC ((),il) = {k}\nnow :: thesis: for x being object holds\n( x in {k} iff x in { (IC (Exec ((),s))) where s is Element of product : IC s = il } )\nlet x be object ; :: thesis: ( x in {k} iff x in { (IC (Exec ((),s))) where s is Element of product : IC s = il } )\nA1: now :: thesis: ( x = k implies x in { (IC (Exec ((),s))) where s is Element of product : IC s = il } )\nil in NAT by ORDINAL1:def 12;\nthen reconsider il1 = il as Element of Values () by MEMSTR_0:def 6;\nset I = SCM-goto k;\nset t = the State of SCM;\nset Q = the Instruction-Sequence of SCM;\nassume A2: x = k ; :: thesis: x in { (IC (Exec ((),s))) where s is Element of product : IC s = il }\nreconsider n = il as Element of NAT by ORDINAL1:def 12;\nreconsider u = the State of SCM +* ((),il1) as Element of product by CARD_3:107;\nreconsider P = the Instruction-Sequence of SCM +* (il,()) as Instruction-Sequence of SCM ;\nreconsider ill = il as Element of NAT by ORDINAL1:def 12;\nA3: P /. ill = P . ill by PBOOLE:143;\nIC in dom the State of SCM by MEMSTR_0:2;\nthen A4: IC u = n by FUNCT_7:31;\nil in NAT by ORDINAL1:def 12;\nthen il in dom the Instruction-Sequence of SCM by PARTFUN1:def 2;\nthen A5: P . n = SCM-goto k by FUNCT_7:31;\nthen IC (Following (P,u)) = k by ;\nhence x in { (IC (Exec ((),s))) where s is Element of product : IC s = il } by A2, A4, A3, A5; :: thesis: verum\nend;\nnow :: thesis: ( x in { (IC (Exec ((),s))) where s is Element of product : IC s = il } implies x = k )\nassume x in { (IC (Exec ((),s))) where s is Element of product : IC s = il } ; :: thesis: x = k\nthen ex s being Element of product st\n( x = IC (Exec ((),s)) & IC s = il ) ;\nhence x = k by AMI_3:7; :: thesis: verum\nend;\nhence ( x in {k} iff x in { (IC (Exec ((),s))) where s is Element of product : IC s = il } ) by ; :: thesis: verum\nend;\nhence NIC ((),il) = {k} by TARSKI:2; :: thesis: verum" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6538583,"math_prob":0.9993697,"size":1733,"snap":"2022-40-2023-06","text_gpt3_token_len":678,"char_repetition_ratio":0.14806247,"word_repetition_ratio":0.39071038,"special_character_ratio":0.3831506,"punctuation_ratio":0.17073171,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999236,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-25T08:03:10Z\",\"WARC-Record-ID\":\"<urn:uuid:b465bc04-f0d3-4fa1-92ac-61f7bbb96d43>\",\"Content-Length\":\"25796\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1f9e15c8-c842-4d1c-a1c5-04be8f8e9170>\",\"WARC-Concurrent-To\":\"<urn:uuid:a7047d40-be4a-4149-8a15-fa50fb16b42e>\",\"WARC-IP-Address\":\"193.219.28.149\",\"WARC-Target-URI\":\"http://mizar.org/version/current/html/proofs/ami_6/22\",\"WARC-Payload-Digest\":\"sha1:CHAKHXINU2G73BDUB2JLQVEVTLKX7D2L\",\"WARC-Block-Digest\":\"sha1:BQWABC7RKOHXRCQKFURBUDJLOJEY2LJ7\",\"WARC-Identified-Payload-Type\":\"application/xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334515.14_warc_CC-MAIN-20220925070216-20220925100216-00447.warc.gz\"}"}
https://www.physicsforums.com/threads/magnitude-and-direction-of-net-force-acting-on-a-charge.639390/
[ "# Magnitude and direction of net force acting on a charge.\n\n## Homework Statement\n\nFour charges,\nq1 = +195 µC, q2 = +60 µC, q3 = −145 µC, and q4 = +21 µC,\nare fixed at the corners of a 4 m by 5 m rectangle, as illustrated in the figure below. What are the magnitude and the direction of the net force acting on q1? (Assume the x-axis extends from q1 to the right.)\n\nq3--------------------q2\n| |\n| |\n| |\nq4--------------------q1\n\nF = k q1q2/r2\n\n## The Attempt at a Solution\n\nI have followed the steps outlined here. http://dev.physicslab.org/Document....lectrostatics_AdvancedCoulombsLawProblems.xml\n\nFor Fq1q2 I get 26.30N\nFq1q4 I get 5.89N\nand for Fq1q3 I get 24.82\n\nI proceed to chart it as shown F X Y\nq1q2 0 -26.30\nq1q4 5.89 0\nq1q3 24.82cos135°=-17.55 24.82sin135°=17.55\n-11.66 8.75\n\nThen F = sqr.rt(-11.66)^2+(8.75)^2\n=14.58\n\nThen a=tan-1|8.75 /-11.66|\n=-36.89\nθ=180-36.89\n=143.11°\n\nNeither of which are the proper answers apparently. What am I doing wrong? Any help would be greatly appreciated.\n\n## The Attempt at a Solution\n\nRelated Introductory Physics Homework Help News on Phys.org\nRectangle is 4 by 5, so diagonal is not at 45o angle\n\nehild\nHomework Helper\nThe problems are different. Do you understand what Coulomb's Law states? What is the magnitude and the direction of a force, one charge exerts on an other one?\n\nehild" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7298716,"math_prob":0.8570595,"size":960,"snap":"2020-45-2020-50","text_gpt3_token_len":364,"char_repetition_ratio":0.10983264,"word_repetition_ratio":0.012578616,"special_character_ratio":0.44479167,"punctuation_ratio":0.1790393,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99783504,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-31T04:35:04Z\",\"WARC-Record-ID\":\"<urn:uuid:b4c9ea21-06ae-4259-959c-09f977b44b89>\",\"Content-Length\":\"55935\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:03409c55-53c3-499a-93b8-e8c23d0b3afb>\",\"WARC-Concurrent-To\":\"<urn:uuid:91b229d7-dff4-413b-a2d9-12758ef0ad16>\",\"WARC-IP-Address\":\"23.111.143.85\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/magnitude-and-direction-of-net-force-acting-on-a-charge.639390/\",\"WARC-Payload-Digest\":\"sha1:3RWWGUZNJNG2BS6SI6S4ZJAAXBKOOX7V\",\"WARC-Block-Digest\":\"sha1:K5YX7KZ3TZAXYQWBVQHJML6ID4DPLP5T\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107912807.78_warc_CC-MAIN-20201031032847-20201031062847-00699.warc.gz\"}"}
https://mathoverflow.net/questions/358686/definition-of-1st-degree-obstruction-class
[ "# Definition of 1st degree obstruction class\n\nRecently I go through obstruction class illustrated by Milnor. He defined $$\\mathfrak{o}_i$$by an element in $$H^i(M; \\pi_{i-1}(V_{n-i+1}(F))$$, which is cohomology with local coefficients.\n\nBut the 0th homotopy group has no group structure, and the definition for $$\\mathfrak{o}_1$$ doesn’t work. So does 1st degree obstruction class exist and if exists, how do you define it?\n\nWhen $$i=1$$, the Stiefel manifold is $$V_n({\\mathbb R})$$ which is the bundle of $$n$$-frames in an $$n$$-dimensional vector space. As such it is homeomorphic to $$GL(n,{\\mathbb R})$$ and hence $$\\pi_0$$ has a group structure. It has two components and it is easy to see that $${\\mathfrak o}_1$$ measures orientability in the way that you might expect.\n• Then $\\pi_0 (V_n(R^n)) = Z/2$, right? – XT Chen Apr 27 '20 at 17:44" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9180242,"math_prob":0.99974865,"size":370,"snap":"2021-31-2021-39","text_gpt3_token_len":106,"char_repetition_ratio":0.10655738,"word_repetition_ratio":0.0,"special_character_ratio":0.26216215,"punctuation_ratio":0.103896104,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999933,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-29T02:30:59Z\",\"WARC-Record-ID\":\"<urn:uuid:cf2e9b7e-6653-49c6-80e5-f03d4b57f09b>\",\"Content-Length\":\"133654\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:307c8f9d-11e9-4e10-a9c5-5427a213a884>\",\"WARC-Concurrent-To\":\"<urn:uuid:48cbf88b-879c-4d02-b25b-370ee21173d2>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://mathoverflow.net/questions/358686/definition-of-1st-degree-obstruction-class\",\"WARC-Payload-Digest\":\"sha1:Q7YOGYPNLKL7PQYSP3KOZVYCUM7VGDXA\",\"WARC-Block-Digest\":\"sha1:V4UUEPQEE7G3OPXVFIPRU2KQC5HOVXOD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046153814.37_warc_CC-MAIN-20210729011903-20210729041903-00442.warc.gz\"}"}
https://www.reference.com/world-view/many-watts-equal-one-amp-2ab83fd02741ea27
[ "# How Many Watts Equal One Amp?", null, "Credit: Carla Wosniak/CC-BY 2.0\n\nAt 115 volts of current, 115 watts is equal to one amp, but the number of watts to equal an amp varies based on the current. If using a 12-volt battery to power the circuit, 12 watts is equal to one amp.\n\nThe formula for electricity is I=P/V, where I is the current in amps, P is the power in watts and V is the voltage of the circuit. Increasing the voltage in a circuit decreases the number of amps required, thus operating a 115-watt load at 230 volts requires only half the current. This decrease in demand for current increases the capacity of the circuit.\n\nSimilar Articles" ]
[ null, "https://images.reference.com/amg-cms-reference-images/media/many-watts-equal-one-amp_2ab83fd02741ea27.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9034197,"math_prob":0.9968113,"size":560,"snap":"2019-51-2020-05","text_gpt3_token_len":129,"char_repetition_ratio":0.16546762,"word_repetition_ratio":0.019607844,"special_character_ratio":0.24285714,"punctuation_ratio":0.09090909,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999749,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-22T10:33:18Z\",\"WARC-Record-ID\":\"<urn:uuid:fc15c18d-f698-4e75-9a77-7c8b180aa060>\",\"Content-Length\":\"89378\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:69c9b62a-8018-4abe-b94b-1618023f2b6e>\",\"WARC-Concurrent-To\":\"<urn:uuid:61e95372-58fd-43e0-b9b4-7d168c5554f1>\",\"WARC-IP-Address\":\"151.101.250.114\",\"WARC-Target-URI\":\"https://www.reference.com/world-view/many-watts-equal-one-amp-2ab83fd02741ea27\",\"WARC-Payload-Digest\":\"sha1:OQIOO7JALBC6DOCLHYXRFX6MITAWX77F\",\"WARC-Block-Digest\":\"sha1:HNEKUU4TLUDB5MNNYX3F7CO3KWNGAM2W\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250606975.49_warc_CC-MAIN-20200122101729-20200122130729-00555.warc.gz\"}"}
https://www.ssi.shimadzu.com/products/uv-vis-spectrophotometers/faqs/reflection-spectroscopy.html
[ "UV-Vis Frequently Asked Questions - Reflection Spectroscopy\n\nWhat are the different types of reflection?", null, "Reflectance is measured by shining light on a sample and measuring the light reflected from the sample. Reflected light consists of specular reflected light and diffuse reflected light, which when combined is referred to as total reflected light (specular reflected light plus diffuse reflected light). The figure here shows a diagram of these types of reflected light. The light shone onto the sample is called the incident light and the angle formed between the incident light and sample is called the angle of incidence. The incident angle is represented with the symbol θ.\n\nSpecular reflected light is the light reflected from shiny mirror-like surfaces at the same angle as the incident angle. Diffuse reflected light is the diffuse light reflected in all directions from rough surfaces, such as paper and powder surfaces. Total reflected light is the total combination of specular and diffuse reflected light. Total reflected light is often measured when measuring samples that have both rough and shiny characteristics, such as plastic and painted samples. The methods used to measure specular, diffuse, and total reflected light are referred to as specular, diffuse, and total reflected light measurement methods, respectively.\n\nWhat are the different modes of measuring reflection?", null, "Reflectance measurements measure either the relative or absolute reflected light, with measurement values expressed in terms of reflectance.\n\nRelative reflectance measurements calculate the proportional amount of reflected light measured from a sample surface, relative to the amount of reflected light measured from a reference plate, such as barium sulfate or a mirror. The relative reflectance is calculated based on assuming the reference plate has a reflectance of 100 %. Therefore, it is very important to manage reference plates properly because different reflectance values can be obtained if reference plates are substituted or if they become contaminated or change characteristics.\n\nIn contrast, absolute reflectance measurements calculate the proportional amount of reflected light relative to the amount of light measured directly from a light source, not using a reference plate such as barium sulfate or a mirror. Reflectance measurement values are based on assuming a 100 % reflectance for air. Absolute reflectance measurements allow for the quantification of the true reflectance of samples, which is referred to as absolute reflectance." ]
[ null, "https://www.ssi.shimadzu.com/sites/ssi.shimadzu.com/files/Products/Images/Spectroscopy/faq/uv-vis-faq-reflection-spectroscopy-different-types.png", null, "https://www.ssi.shimadzu.com/sites/ssi.shimadzu.com/files/Products/Images/Spectroscopy/faq/uv-vis-faq-reflection-spectroscopy-different-modes-of-measuring.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92253584,"math_prob":0.976048,"size":2545,"snap":"2022-05-2022-21","text_gpt3_token_len":445,"char_repetition_ratio":0.22707595,"word_repetition_ratio":0.074270554,"special_character_ratio":0.16777997,"punctuation_ratio":0.082125604,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9867769,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-22T23:41:29Z\",\"WARC-Record-ID\":\"<urn:uuid:e7ab0d01-9fd1-43e2-afe2-38fe364d4179>\",\"Content-Length\":\"28323\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:066716a4-7d8a-4923-88c4-354d729dc310>\",\"WARC-Concurrent-To\":\"<urn:uuid:8a581898-d343-417a-b542-4963a6994165>\",\"WARC-IP-Address\":\"104.105.87.107\",\"WARC-Target-URI\":\"https://www.ssi.shimadzu.com/products/uv-vis-spectrophotometers/faqs/reflection-spectroscopy.html\",\"WARC-Payload-Digest\":\"sha1:6HB43ZGQ2UCLLULQFR2QGEXC4CJREKIQ\",\"WARC-Block-Digest\":\"sha1:PGK2GAPPVPUZ4UI5V5EXCDZPEJZHYXFP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320303917.24_warc_CC-MAIN-20220122224904-20220123014904-00021.warc.gz\"}"}
https://support.nag.com/numeric/nl/nagdoc_27.1/flhtml/d01/d01fbf.html
[ "# NAG FL Interfaced01fbf (md_​gauss)\n\n## ▸▿ Contents\n\nSettings help\n\nFL Name Style:\n\nFL Specification Language:\n\n## 1Purpose\n\nd01fbf computes an estimate of a multidimensional integral (from $1$ to $20$ dimensions), given the analytic form of the integrand and suitable Gaussian weights and abscissae.\n\n## 2Specification\n\nFortran Interface\n Function d01fbf ( ndim, lwa, f,\n Real (Kind=nag_wp) :: d01fbf Integer, Intent (In) :: ndim, nptvec(ndim), lwa Integer, Intent (Inout) :: ifail Real (Kind=nag_wp), External :: f Real (Kind=nag_wp), Intent (In) :: weight(lwa), abscis(lwa)\n#include <nag.h>\n double d01fbf_ (const Integer *ndim, const Integer nptvec[], const Integer *lwa, const double weight[], const double abscis[], double (NAG_CALL *f)(const Integer *ndim, const double x[]),Integer *ifail)\nThe routine may be called by the names d01fbf or nagf_quad_md_gauss.\n\n## 3Description\n\nd01fbf approximates a multidimensional integral by evaluating the summation\n $∑i1=1l1 w 1,i1 ∑i2=1l2 w2,i2 ⋯ ∑in=1ln wn,in f ( x 1 , i1 , x 2 , i2 ,…, x n , in )$\ngiven the weights ${w}_{j,{i}_{j}}$ and abscissae ${x}_{j,{i}_{j}}$ for a multidimensional product integration rule (see Davis and Rabinowitz (1975)). The number of dimensions may be anything from $1$ to $20$.\nThe weights and abscissae for each dimension must have been placed in successive segments of the arrays weight and abscis; for example, by calling d01tbf or d01tcf once for each dimension using a quadrature formula and number of abscissae appropriate to the range of each ${x}_{j}$ and to the functional dependence of $f$ on ${x}_{j}$.\nIf normal weights are used, the summation will approximate the integral\n $∫w1(x1)∫w2(x2)⋯∫wn(xn)f (x1,x2,…,xn) dxn⋯dx2dx1$\nwhere ${w}_{j}\\left(x\\right)$ is the weight function associated with the quadrature formula chosen for the $j$th dimension; while if adjusted weights are used, the summation will approximate the integral\n $∫∫⋯∫f(x1,x2,…,xn)dxn⋯dx2dx1.$\nYou must supply a subroutine to evaluate\n $f(x1,x2,…,xn)$\nat any values of ${x}_{1},{x}_{2},\\dots ,{x}_{n}$ within the range of integration.\nDavis P J and Rabinowitz P (1975) Methods of Numerical Integration Academic Press\n\n## 5Arguments\n\n1: $\\mathbf{ndim}$Integer Input\nOn entry: $n$, the number of dimensions of the integral.\nConstraint: $1\\le {\\mathbf{ndim}}\\le 20$.\n2: $\\mathbf{nptvec}\\left({\\mathbf{ndim}}\\right)$Integer array Input\nOn entry: ${\\mathbf{nptvec}}\\left(\\mathit{j}\\right)$ must specify the number of points in the $\\mathit{j}$th dimension of the summation, for $\\mathit{j}=1,2,\\dots ,n$.\n3: $\\mathbf{lwa}$Integer Input\nOn entry: the dimension of the arrays weight and abscis as declared in the (sub)program from which d01fbf is called.\nConstraint: ${\\mathbf{lwa}}\\ge {\\mathbf{nptvec}}\\left(1\\right)+{\\mathbf{nptvec}}\\left(2\\right)+\\cdots +{\\mathbf{nptvec}}\\left({\\mathbf{ndim}}\\right)$.\n4: $\\mathbf{weight}\\left({\\mathbf{lwa}}\\right)$Real (Kind=nag_wp) array Input\nOn entry: must contain in succession the weights for the various dimensions, i.e., ${\\mathbf{weight}}\\left(k\\right)$ contains the $i$th weight for the $j$th dimension, with\n $k=nptvec(1)+nptvec(2)+⋯+nptvec(j-1)+i.$\n5: $\\mathbf{abscis}\\left({\\mathbf{lwa}}\\right)$Real (Kind=nag_wp) array Input\nOn entry: must contain in succession the abscissae for the various dimensions, i.e., ${\\mathbf{abscis}}\\left(k\\right)$ contains the $i$th abscissa for the $j$th dimension, with\n $k=nptvec(1)+nptvec(2)+⋯+nptvec(j-1)+i.$\n6: $\\mathbf{f}$real (Kind=nag_wp) Function, supplied by the user. External Procedure\nf must return the value of the integrand at a given point.\nThe specification of f is:\nFortran Interface\n Function f ( ndim, x)\n Real (Kind=nag_wp) :: f Integer, Intent (In) :: ndim Real (Kind=nag_wp), Intent (In) :: x(ndim)\n double f (const Integer *ndim, const double x[])\n1: $\\mathbf{ndim}$Integer Input\nOn entry: $n$, the number of dimensions of the integral.\n2: $\\mathbf{x}\\left({\\mathbf{ndim}}\\right)$Real (Kind=nag_wp) array Input\nOn entry: the coordinates of the point at which the integrand $f$ must be evaluated.\nf must either be a module subprogram USEd by, or declared as EXTERNAL in, the (sub)program from which d01fbf is called. Arguments denoted as Input must not be changed by this procedure.\nNote: f should not return floating-point NaN (Not a Number) or infinity values, since these are not handled by d01fbf. If your code inadvertently does return any NaNs or infinities, d01fbf is likely to produce unexpected results.\n7: $\\mathbf{ifail}$Integer Input/Output\nOn entry: ifail must be set to $0$, $-1$ or $1$ to set behaviour on detection of an error; these values have no effect when no error is detected.\nA value of $0$ causes the printing of an error message and program execution will be halted; otherwise program execution continues. A value of $-1$ means that an error message is printed while a value of $1$ means that it is not.\nIf halting is not appropriate, the value $-1$ or $1$ is recommended. If message printing is undesirable, then the value $1$ is recommended. Otherwise, the value $0$ is recommended. When the value $-\\mathbf{1}$ or $\\mathbf{1}$ is used it is essential to test the value of ifail on exit.\nOn exit: ${\\mathbf{ifail}}={\\mathbf{0}}$ unless the routine detects an error or a warning has been flagged (see Section 6).\n\n## 6Error Indicators and Warnings\n\nIf on entry ${\\mathbf{ifail}}=0$ or $-1$, explanatory error messages are output on the current error message unit (as defined by x04aaf).\nErrors or warnings detected by the routine:\n${\\mathbf{ifail}}=1$\nOn entry, lwa is too small. ${\\mathbf{lwa}}=⟨\\mathit{\\text{value}}⟩$. Minimum possible dimension: $⟨\\mathit{\\text{value}}⟩$.\nOn entry, ${\\mathbf{ndim}}=⟨\\mathit{\\text{value}}⟩$.\nConstraint: ${\\mathbf{ndim}}\\le 20$.\nOn entry, ${\\mathbf{ndim}}=⟨\\mathit{\\text{value}}⟩$.\nConstraint: ${\\mathbf{ndim}}\\ge 1$.\n${\\mathbf{ifail}}=-99$\nSee Section 7 in the Introduction to the NAG Library FL Interface for further information.\n${\\mathbf{ifail}}=-399$\nYour licence key may have expired or may not have been installed correctly.\nSee Section 8 in the Introduction to the NAG Library FL Interface for further information.\n${\\mathbf{ifail}}=-999$\nDynamic memory allocation failed.\nSee Section 9 in the Introduction to the NAG Library FL Interface for further information.\n\n## 7Accuracy\n\nThe accuracy of the computed multidimensional sum depends on the weights and the integrand values at the abscissae. If these numbers vary significantly in size and sign then considerable accuracy could be lost. If these numbers are all positive, then little accuracy will be lost in computing the sum.\n\n## 8Parallelism and Performance\n\nd01fbf is not threaded in any implementation.\n\nThe total time taken by d01fbf will be proportional to\n $T×nptvec(1)×nptvec(2)×⋯×nptvec(ndim),$\nwhere $T$ is the time taken for one evaluation of f.\n\n## 10Example\n\nThis example evaluates the integral\n $∫12∫0∞∫-∞∞∫1∞ (x1x2x3) 6 (x4+2) 8e-2x2e-0.5x32dx4dx3dx2dx1$\n• ${x}_{1}$: Gauss–Legendre, $a=1.0$, $b=2.0$,\n• ${x}_{2}$: Gauss–Laguerre, $a=0.0$, $b=2.0$,\n• ${x}_{3}$: Gauss–Hermite, $a=0.0$, $b=0.5$,\n• ${x}_{4}$: rational Gauss, $a=1.0$, $b=2.0$.\nFour points are sufficient in each dimension, as this integral is in fact a product of four one-dimensional integrals, for each of which the chosen four-point formula is exact.\n\n### 10.1Program Text\n\nProgram Text (d01fbfe.f90)\n\nNone.\n\n### 10.3Program Results\n\nProgram Results (d01fbfe.r)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8435592,"math_prob":0.99907273,"size":4413,"snap":"2023-40-2023-50","text_gpt3_token_len":991,"char_repetition_ratio":0.13018826,"word_repetition_ratio":0.11618257,"special_character_ratio":0.20915477,"punctuation_ratio":0.12576313,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995409,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T10:27:55Z\",\"WARC-Record-ID\":\"<urn:uuid:67eda0bf-8171-4ea1-bbe8-e303c7dbfe00>\",\"Content-Length\":\"43062\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cfbcf9eb-17b4-48ea-8a9b-aa68b6215830>\",\"WARC-Concurrent-To\":\"<urn:uuid:29b07e08-2eae-4619-91f8-df04d5d0dbd7>\",\"WARC-IP-Address\":\"78.129.168.4\",\"WARC-Target-URI\":\"https://support.nag.com/numeric/nl/nagdoc_27.1/flhtml/d01/d01fbf.html\",\"WARC-Payload-Digest\":\"sha1:DGOS33Y3G24G52CSBXGEN7ND6T3QNELP\",\"WARC-Block-Digest\":\"sha1:AKA3PZQZGN6NJOOPF2QERVGRWCTJRLLX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511075.63_warc_CC-MAIN-20231003092549-20231003122549-00616.warc.gz\"}"}
https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/accuracy-of-approximation-schemes.html
[ "# Accuracy of Approximation Schemes\n\n#### Consider a vector-valued Ito process with components", null, "and", null, "and convert it to a standard Ito process.\n\n In:=", null, "Xpr = ItoProcess[ ItoProcess[{0, 1, {w[t], w[t]^4 - 6 w[t]^2 t + 3 t^2}}, w, t]]\n Out=", null, "#### Sample from the standard Ito process using different approximation schemes, and measure the residuals with the exact function of the Wiener process.\n\n In:=", null, "Xresiduals[mthd_] := Block[{td}, td = RandomFunction[pr, {0., 1, .01}, 1250, Method -> mthd]; Histogram[ Function[{x, y}, y - (x^4 - 6 x^2 + 3)] @@@ Part[td[\"States\"], All, -1], ImageSize -> 250, PlotRange -> {{-1, 1}, Automatic}, PlotRangeClipping -> True, PlotLabel -> mthd, Frame -> True, Axes -> False]]\n In:=", null, "X{{residuals[\"EulerMaruyama\"], residuals[Automatic]}, {residuals[\"Milstein\"], residuals[\"StochasticRungeKutta\"]}, {residuals[\"KloedenPlatenSchurz\"], residuals[\"StochasticRungeKuttaScalarNoise\"]}} // Grid\n Out=", null, "" ]
[ null, "https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/HTMLImages.en/index.en/IM_17.gif", null, "https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/HTMLImages.en/index.en/IM_18.gif", null, "https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/HTMLImages.en/accuracy-of-approximation-schemes/In_89.png", null, "https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/HTMLImages.en/accuracy-of-approximation-schemes/O_77.png", null, "https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/HTMLImages.en/accuracy-of-approximation-schemes/In_90.png", null, "https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/HTMLImages.en/accuracy-of-approximation-schemes/In_91.png", null, "https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/HTMLImages.en/accuracy-of-approximation-schemes/O_78.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.54270786,"math_prob":0.941346,"size":1182,"snap":"2020-45-2020-50","text_gpt3_token_len":374,"char_repetition_ratio":0.1179966,"word_repetition_ratio":0.0,"special_character_ratio":0.30287647,"punctuation_ratio":0.1902439,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9760622,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-27T12:22:41Z\",\"WARC-Record-ID\":\"<urn:uuid:787effc5-dced-4aed-9f54-e2e03ae4e32a>\",\"Content-Length\":\"5256\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e43b0c70-d047-4e66-96b8-36d6d1e7fb7b>\",\"WARC-Concurrent-To\":\"<urn:uuid:9de9d7aa-5614-4aba-b9ee-2eb48b5f1510>\",\"WARC-IP-Address\":\"140.177.205.134\",\"WARC-Target-URI\":\"https://www.wolfram.com/mathematica/new-in-9/time-series-and-stochastic-differential-equations/accuracy-of-approximation-schemes.html\",\"WARC-Payload-Digest\":\"sha1:RYIGX3XNVHXUEFEDMRTFXMNZUPQKW4T5\",\"WARC-Block-Digest\":\"sha1:IHMHJDIKJL7OJMGPXYW4R5ZUJQ3UCFQH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141191692.20_warc_CC-MAIN-20201127103102-20201127133102-00436.warc.gz\"}"}
https://www.triangle-calculator.com/?what=sss&a=3&b=4&c=5&submit=1
[ "# Triangle calculator SSS - result\n\nPlease enter the triangle sides:\n\n### Right scalene Pythagorean triangle.\n\nSides: a = 3   b = 4   c = 5\n\nArea: T = 6\nPerimeter: p = 12\nSemiperimeter: s = 6\n\nAngle ∠ A = α = 36.87698976458° = 36°52'12″ = 0.64435011088 rad\nAngle ∠ B = β = 53.13301023542° = 53°7'48″ = 0.9277295218 rad\nAngle ∠ C = γ = 90° = 1.57107963268 rad\n\nHeight: ha = 4\nHeight: hb = 3\nHeight: hc = 2.4\n\nMedian: ma = 4.27220018727\nMedian: mb = 3.60655512755\nMedian: mc = 2.5\n\nInradius: r = 1\nCircumradius: R = 2.5\n\nVertex coordinates: A[5; 0] B[0; 0] C[1.8; 2.4]\nCentroid: CG[2.26766666667; 0.8]\nCoordinates of the circumscribed circle: U[2.5; 0]\nCoordinates of the inscribed circle: I[2; 1]\n\nExterior(or external, outer) angles of the triangle:\n∠ A' = α' = 143.1330102354° = 143°7'48″ = 0.64435011088 rad\n∠ B' = β' = 126.8769897646° = 126°52'12″ = 0.9277295218 rad\n∠ C' = γ' = 90° = 1.57107963268 rad\n\n# How did we calculate this triangle?", null, "### 1. The triangle circumference is the sum of the lengths of its three sides", null, "### 2. Semiperimeter of the triangle", null, "### 3. The triangle area using Heron's formula", null, "### 4. Calculate the heights of the triangle from its area.", null, "### 5. Calculation of the inner angles of the triangle using a Law of Cosines", null, "### 6. Inradius", null, "### 7. Circumradius", null, "### 8. Calculation of medians", null, "#### Look also our friend's collection of math examples and problems:\n\nSee more informations about triangles or more information about solving triangles." ]
[ null, "https://www.triangle-calculator.com/tex/724/724ffb8040009.png", null, "https://www.triangle-calculator.com/tex/acf/acf534d8bd058.png", null, "https://www.triangle-calculator.com/tex/72e/72e5976414372.png", null, "https://www.triangle-calculator.com/tex/198/19895611ca7f0.png", null, "https://www.triangle-calculator.com/tex/1ec/1ec585b90a3c8.png", null, "https://www.triangle-calculator.com/tex/eaa/eaa6d949c1eda.png", null, "https://www.triangle-calculator.com/tex/b7f/b7f8c80055f24.png", null, "https://www.triangle-calculator.com/tex/4b7/4b786bc78b50c.png", null, "https://www.triangle-calculator.com/tex/c9e/c9e87bf234574.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.64138526,"math_prob":0.99890757,"size":1276,"snap":"2019-13-2019-22","text_gpt3_token_len":490,"char_repetition_ratio":0.15172955,"word_repetition_ratio":0.008888889,"special_character_ratio":0.45768026,"punctuation_ratio":0.20220588,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996842,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-19T10:50:52Z\",\"WARC-Record-ID\":\"<urn:uuid:a8839826-94f2-47f5-9948-a427e3e6b12d>\",\"Content-Length\":\"18491\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:233cbcdf-0833-46d6-8faf-f87449ff6d0b>\",\"WARC-Concurrent-To\":\"<urn:uuid:f3c1310a-06cd-4d7c-921d-a423b276dfe1>\",\"WARC-IP-Address\":\"104.28.13.22\",\"WARC-Target-URI\":\"https://www.triangle-calculator.com/?what=sss&a=3&b=4&c=5&submit=1\",\"WARC-Payload-Digest\":\"sha1:2RR32AR2LABRX6Y56YU4HFJN724Z4CUJ\",\"WARC-Block-Digest\":\"sha1:J73BVNS7DBNH4GBDD2QWQEKHO7JAOWT2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232254751.58_warc_CC-MAIN-20190519101512-20190519123512-00492.warc.gz\"}"}
https://klarose.savingadvice.com/2020/10/14/losing-my-job_221427/
[ "User Real IP - 54.211.101.93\n```Array\n(\n => Array\n(\n => 182.68.68.92\n)\n\n => Array\n(\n => 101.0.41.201\n)\n\n => Array\n(\n => 43.225.98.123\n)\n\n => Array\n(\n => 2.58.194.139\n)\n\n => Array\n(\n => 46.119.197.104\n)\n\n => Array\n(\n => 45.249.8.93\n)\n\n => Array\n(\n => 103.12.135.72\n)\n\n => Array\n(\n => 157.35.243.216\n)\n\n => Array\n(\n => 209.107.214.176\n)\n\n => Array\n(\n => 5.181.233.166\n)\n\n => Array\n(\n => 106.201.10.100\n)\n\n => Array\n(\n => 36.90.55.39\n)\n\n => Array\n(\n => 119.154.138.47\n)\n\n => Array\n(\n => 51.91.31.157\n)\n\n => Array\n(\n => 182.182.65.216\n)\n\n => Array\n(\n => 157.35.252.63\n)\n\n => Array\n(\n => 14.142.34.163\n)\n\n => Array\n(\n => 178.62.43.135\n)\n\n => Array\n(\n => 43.248.152.148\n)\n\n => Array\n(\n => 222.252.104.114\n)\n\n => Array\n(\n => 209.107.214.168\n)\n\n => Array\n(\n => 103.99.199.250\n)\n\n => Array\n(\n => 178.62.72.160\n)\n\n => Array\n(\n => 27.6.1.170\n)\n\n => Array\n(\n => 182.69.249.219\n)\n\n => Array\n(\n => 110.93.228.86\n)\n\n => Array\n(\n => 72.255.1.98\n)\n\n => Array\n(\n => 182.73.111.98\n)\n\n => Array\n(\n => 45.116.117.11\n)\n\n => Array\n(\n => 122.15.78.189\n)\n\n => Array\n(\n => 14.167.188.234\n)\n\n => Array\n(\n => 223.190.4.202\n)\n\n => Array\n(\n => 202.173.125.19\n)\n\n => Array\n(\n => 103.255.5.32\n)\n\n => Array\n(\n => 39.37.145.103\n)\n\n => Array\n(\n => 140.213.26.249\n)\n\n => Array\n(\n => 45.118.166.85\n)\n\n => Array\n(\n => 102.166.138.255\n)\n\n => Array\n(\n => 77.111.246.234\n)\n\n => Array\n(\n => 45.63.6.196\n)\n\n => Array\n(\n => 103.250.147.115\n)\n\n => Array\n(\n => 223.185.30.99\n)\n\n => Array\n(\n => 103.122.168.108\n)\n\n => Array\n(\n => 123.136.203.21\n)\n\n => Array\n(\n => 171.229.243.63\n)\n\n => Array\n(\n => 153.149.98.149\n)\n\n => Array\n(\n => 223.238.93.15\n)\n\n => Array\n(\n => 178.62.113.166\n)\n\n => Array\n(\n => 101.162.0.153\n)\n\n => Array\n(\n => 121.200.62.114\n)\n\n => Array\n(\n => 14.248.77.252\n)\n\n => Array\n(\n => 95.142.117.29\n)\n\n => Array\n(\n => 150.129.60.107\n)\n\n => Array\n(\n => 94.205.243.22\n)\n\n => Array\n(\n => 115.42.71.143\n)\n\n => Array\n(\n => 117.217.195.59\n)\n\n => Array\n(\n => 182.77.112.56\n)\n\n => Array\n(\n => 182.77.112.108\n)\n\n => Array\n(\n => 41.80.69.10\n)\n\n => Array\n(\n => 117.5.222.121\n)\n\n => Array\n(\n => 103.11.0.38\n)\n\n => Array\n(\n => 202.173.127.140\n)\n\n => Array\n(\n => 49.249.249.50\n)\n\n => Array\n(\n => 116.72.198.211\n)\n\n => Array\n(\n => 223.230.54.53\n)\n\n => Array\n(\n => 102.69.228.74\n)\n\n => Array\n(\n => 39.37.251.89\n)\n\n => Array\n(\n => 39.53.246.141\n)\n\n => Array\n(\n => 39.57.182.72\n)\n\n => Array\n(\n => 209.58.130.210\n)\n\n => Array\n(\n => 104.131.75.86\n)\n\n => Array\n(\n => 106.212.131.255\n)\n\n => Array\n(\n => 106.212.132.127\n)\n\n => Array\n(\n => 223.190.4.60\n)\n\n => Array\n(\n => 103.252.116.252\n)\n\n => Array\n(\n => 103.76.55.182\n)\n\n => Array\n(\n => 45.118.166.70\n)\n\n => Array\n(\n => 103.93.174.215\n)\n\n => Array\n(\n => 5.62.62.142\n)\n\n => Array\n(\n => 182.179.158.156\n)\n\n => Array\n(\n => 39.57.255.12\n)\n\n => Array\n(\n => 39.37.178.37\n)\n\n => Array\n(\n => 182.180.165.211\n)\n\n => Array\n(\n => 119.153.135.17\n)\n\n => Array\n(\n => 72.255.15.244\n)\n\n => Array\n(\n => 139.180.166.181\n)\n\n => Array\n(\n => 70.119.147.111\n)\n\n => Array\n(\n => 106.210.40.83\n)\n\n => Array\n(\n => 14.190.70.91\n)\n\n => Array\n(\n => 202.125.156.82\n)\n\n => Array\n(\n => 115.42.68.38\n)\n\n => Array\n(\n => 102.167.13.108\n)\n\n => Array\n(\n => 117.217.192.130\n)\n\n => Array\n(\n => 205.185.223.156\n)\n\n => Array\n(\n => 171.224.180.29\n)\n\n => Array\n(\n => 45.127.45.68\n)\n\n => Array\n(\n => 195.206.183.232\n)\n\n => Array\n(\n => 49.32.52.115\n)\n\n => Array\n(\n => 49.207.49.223\n)\n\n => Array\n(\n => 45.63.29.61\n)\n\n => Array\n(\n => 103.245.193.214\n)\n\n => Array\n(\n => 39.40.236.69\n)\n\n => Array\n(\n => 62.80.162.111\n)\n\n => Array\n(\n => 45.116.232.56\n)\n\n => Array\n(\n => 45.118.166.91\n)\n\n => Array\n(\n => 180.92.230.234\n)\n\n => Array\n(\n => 157.40.57.160\n)\n\n => Array\n(\n => 110.38.38.130\n)\n\n => Array\n(\n => 72.255.57.183\n)\n\n => Array\n(\n => 182.68.81.85\n)\n\n => Array\n(\n => 39.57.202.122\n)\n\n => Array\n(\n => 119.152.154.36\n)\n\n => Array\n(\n => 5.62.62.141\n)\n\n => Array\n(\n => 119.155.54.232\n)\n\n => Array\n(\n => 39.37.141.22\n)\n\n => Array\n(\n => 183.87.12.225\n)\n\n => Array\n(\n => 107.170.127.117\n)\n\n => Array\n(\n => 125.63.124.49\n)\n\n => Array\n(\n => 39.42.191.3\n)\n\n => Array\n(\n => 116.74.24.72\n)\n\n => Array\n(\n => 46.101.89.227\n)\n\n => Array\n(\n => 202.173.125.247\n)\n\n => Array\n(\n => 39.42.184.254\n)\n\n => Array\n(\n => 115.186.165.132\n)\n\n => Array\n(\n => 39.57.206.126\n)\n\n => Array\n(\n => 103.245.13.145\n)\n\n => Array\n(\n => 202.175.246.43\n)\n\n => Array\n(\n => 192.140.152.150\n)\n\n => Array\n(\n => 202.88.250.103\n)\n\n => Array\n(\n => 103.248.94.207\n)\n\n => Array\n(\n => 77.73.66.101\n)\n\n => Array\n(\n => 104.131.66.8\n)\n\n => Array\n(\n => 113.186.161.97\n)\n\n => Array\n(\n => 222.254.5.7\n)\n\n => Array\n(\n => 223.233.67.247\n)\n\n => Array\n(\n => 171.249.116.146\n)\n\n => Array\n(\n => 47.30.209.71\n)\n\n => Array\n(\n => 202.134.13.130\n)\n\n => Array\n(\n => 27.6.135.7\n)\n\n => Array\n(\n => 107.170.186.79\n)\n\n => Array\n(\n => 103.212.89.171\n)\n\n => Array\n(\n => 117.197.9.77\n)\n\n => Array\n(\n => 122.176.206.233\n)\n\n => Array\n(\n => 192.227.253.222\n)\n\n => Array\n(\n => 182.188.224.119\n)\n\n => Array\n(\n => 14.248.70.74\n)\n\n => Array\n(\n => 42.118.219.169\n)\n\n => Array\n(\n => 110.39.146.170\n)\n\n => Array\n(\n => 119.160.66.143\n)\n\n => Array\n(\n => 103.248.95.130\n)\n\n => Array\n(\n => 27.63.152.208\n)\n\n => Array\n(\n => 49.207.114.96\n)\n\n => Array\n(\n => 102.166.23.214\n)\n\n => Array\n(\n => 175.107.254.73\n)\n\n => Array\n(\n => 103.10.227.214\n)\n\n => Array\n(\n => 202.143.115.89\n)\n\n => Array\n(\n => 110.93.227.187\n)\n\n => Array\n(\n => 103.140.31.60\n)\n\n => Array\n(\n => 110.37.231.46\n)\n\n => Array\n(\n => 39.36.99.238\n)\n\n => Array\n(\n => 157.37.140.26\n)\n\n => Array\n(\n => 43.246.202.226\n)\n\n => Array\n(\n => 137.97.8.143\n)\n\n => Array\n(\n => 182.65.52.242\n)\n\n => Array\n(\n => 115.42.69.62\n)\n\n => Array\n(\n => 14.143.254.58\n)\n\n => Array\n(\n => 223.179.143.236\n)\n\n => Array\n(\n => 223.179.143.249\n)\n\n => Array\n(\n => 103.143.7.54\n)\n\n => Array\n(\n => 223.179.139.106\n)\n\n => Array\n(\n => 39.40.219.90\n)\n\n => Array\n(\n => 45.115.141.231\n)\n\n => Array\n(\n => 120.29.100.33\n)\n\n => Array\n(\n => 112.196.132.5\n)\n\n => Array\n(\n => 202.163.123.153\n)\n\n => Array\n(\n => 5.62.58.146\n)\n\n => Array\n(\n => 39.53.216.113\n)\n\n => Array\n(\n => 42.111.160.73\n)\n\n => Array\n(\n => 107.182.231.213\n)\n\n => Array\n(\n => 119.82.94.120\n)\n\n => Array\n(\n => 178.62.34.82\n)\n\n => Array\n(\n => 203.122.6.18\n)\n\n => Array\n(\n => 157.42.38.251\n)\n\n => Array\n(\n => 45.112.68.222\n)\n\n => Array\n(\n => 49.206.212.122\n)\n\n => Array\n(\n => 104.236.70.228\n)\n\n => Array\n(\n => 42.111.34.243\n)\n\n => Array\n(\n => 84.241.19.186\n)\n\n => Array\n(\n => 89.187.180.207\n)\n\n => Array\n(\n => 104.243.212.118\n)\n\n => Array\n(\n => 104.236.55.136\n)\n\n => Array\n(\n => 106.201.16.163\n)\n\n => Array\n(\n => 46.101.40.25\n)\n\n => Array\n(\n => 45.118.166.94\n)\n\n => Array\n(\n => 49.36.128.102\n)\n\n => Array\n(\n => 14.142.193.58\n)\n\n => Array\n(\n => 212.79.124.176\n)\n\n => Array\n(\n => 45.32.191.194\n)\n\n => Array\n(\n => 105.112.107.46\n)\n\n => Array\n(\n => 106.201.14.8\n)\n\n => Array\n(\n => 110.93.240.65\n)\n\n => Array\n(\n => 27.96.95.177\n)\n\n => Array\n(\n => 45.41.134.35\n)\n\n => Array\n(\n => 180.151.13.110\n)\n\n => Array\n(\n => 101.53.242.89\n)\n\n => Array\n(\n => 115.186.3.110\n)\n\n => Array\n(\n => 171.49.185.242\n)\n\n => Array\n(\n => 115.42.70.24\n)\n\n => Array\n(\n => 45.128.188.43\n)\n\n => Array\n(\n => 103.140.129.63\n)\n\n => Array\n(\n => 101.50.113.147\n)\n\n => Array\n(\n => 103.66.73.30\n)\n\n => Array\n(\n => 117.247.193.169\n)\n\n => Array\n(\n => 120.29.100.94\n)\n\n => Array\n(\n => 42.109.154.39\n)\n\n => Array\n(\n => 122.173.155.150\n)\n\n => Array\n(\n => 45.115.104.53\n)\n\n => Array\n(\n => 116.74.29.84\n)\n\n => Array\n(\n => 101.50.125.34\n)\n\n => Array\n(\n => 45.118.166.80\n)\n\n => Array\n(\n => 91.236.184.27\n)\n\n => Array\n(\n => 113.167.185.120\n)\n\n => Array\n(\n => 27.97.66.222\n)\n\n => Array\n(\n => 43.247.41.117\n)\n\n => Array\n(\n => 23.229.16.227\n)\n\n => Array\n(\n => 14.248.79.209\n)\n\n => Array\n(\n => 117.5.194.26\n)\n\n => Array\n(\n => 117.217.205.41\n)\n\n => Array\n(\n => 114.79.169.99\n)\n\n => Array\n(\n => 103.55.60.97\n)\n\n => Array\n(\n => 182.75.89.210\n)\n\n => Array\n(\n => 77.73.66.109\n)\n\n => Array\n(\n => 182.77.126.139\n)\n\n => Array\n(\n => 14.248.77.166\n)\n\n => Array\n(\n => 157.35.224.133\n)\n\n => Array\n(\n => 183.83.38.27\n)\n\n => Array\n(\n => 182.68.4.77\n)\n\n => Array\n(\n => 122.177.130.234\n)\n\n => Array\n(\n => 103.24.99.99\n)\n\n => Array\n(\n => 103.91.127.66\n)\n\n => Array\n(\n => 41.90.34.240\n)\n\n => Array\n(\n => 49.205.77.102\n)\n\n => Array\n(\n => 103.248.94.142\n)\n\n => Array\n(\n => 104.143.92.170\n)\n\n => Array\n(\n => 219.91.157.114\n)\n\n => Array\n(\n => 223.190.88.22\n)\n\n => Array\n(\n => 223.190.86.232\n)\n\n => Array\n(\n => 39.41.172.80\n)\n\n => Array\n(\n => 124.107.206.5\n)\n\n => Array\n(\n => 139.167.180.224\n)\n\n => Array\n(\n => 93.76.64.248\n)\n\n => Array\n(\n => 65.216.227.119\n)\n\n => Array\n(\n => 223.190.119.141\n)\n\n => Array\n(\n => 110.93.237.179\n)\n\n => Array\n(\n => 41.90.7.85\n)\n\n => Array\n(\n => 103.100.6.26\n)\n\n => Array\n(\n => 104.140.83.13\n)\n\n => Array\n(\n => 223.190.119.133\n)\n\n => Array\n(\n => 119.152.150.87\n)\n\n => Array\n(\n => 103.125.130.147\n)\n\n => Array\n(\n => 27.6.5.52\n)\n\n => Array\n(\n => 103.98.188.26\n)\n\n => Array\n(\n => 39.35.121.81\n)\n\n => Array\n(\n => 74.119.146.182\n)\n\n => Array\n(\n => 5.181.233.162\n)\n\n => Array\n(\n => 157.39.18.60\n)\n\n => Array\n(\n => 1.187.252.25\n)\n\n => Array\n(\n => 39.42.145.59\n)\n\n => Array\n(\n => 39.35.39.198\n)\n\n => Array\n(\n => 49.36.128.214\n)\n\n => Array\n(\n => 182.190.20.56\n)\n\n => Array\n(\n => 122.180.249.189\n)\n\n => Array\n(\n => 117.217.203.107\n)\n\n => Array\n(\n => 103.70.82.241\n)\n\n => Array\n(\n => 45.118.166.68\n)\n\n => Array\n(\n => 122.180.168.39\n)\n\n => Array\n(\n => 149.28.67.254\n)\n\n => Array\n(\n => 223.233.73.8\n)\n\n => Array\n(\n => 122.167.140.0\n)\n\n => Array\n(\n => 95.158.51.55\n)\n\n => Array\n(\n => 27.96.95.134\n)\n\n => Array\n(\n => 49.206.214.53\n)\n\n => Array\n(\n => 212.103.49.92\n)\n\n => Array\n(\n => 122.177.115.101\n)\n\n => Array\n(\n => 171.50.187.124\n)\n\n => Array\n(\n => 122.164.55.107\n)\n\n => Array\n(\n => 98.114.217.204\n)\n\n => Array\n(\n => 106.215.10.54\n)\n\n => Array\n(\n => 115.42.68.28\n)\n\n => Array\n(\n => 104.194.220.87\n)\n\n => Array\n(\n => 103.137.84.170\n)\n\n => Array\n(\n => 61.16.142.110\n)\n\n => Array\n(\n => 212.103.49.85\n)\n\n => Array\n(\n => 39.53.248.162\n)\n\n => Array\n(\n => 203.122.40.214\n)\n\n => Array\n(\n => 117.217.198.72\n)\n\n => Array\n(\n => 115.186.191.203\n)\n\n => Array\n(\n => 120.29.100.199\n)\n\n => Array\n(\n => 45.151.237.24\n)\n\n => Array\n(\n => 223.190.125.232\n)\n\n => Array\n(\n => 41.80.151.17\n)\n\n => Array\n(\n => 23.111.188.5\n)\n\n => Array\n(\n => 223.190.125.216\n)\n\n => Array\n(\n => 103.217.133.119\n)\n\n => Array\n(\n => 103.198.173.132\n)\n\n => Array\n(\n => 47.31.155.89\n)\n\n => Array\n(\n => 223.190.20.253\n)\n\n => Array\n(\n => 104.131.92.125\n)\n\n => Array\n(\n => 223.190.19.152\n)\n\n => Array\n(\n => 103.245.193.191\n)\n\n => Array\n(\n => 106.215.58.255\n)\n\n => Array\n(\n => 119.82.83.238\n)\n\n => Array\n(\n => 106.212.128.138\n)\n\n => Array\n(\n => 139.167.237.36\n)\n\n => Array\n(\n => 222.124.40.250\n)\n\n => Array\n(\n => 134.56.185.169\n)\n\n => Array\n(\n => 54.255.226.31\n)\n\n => Array\n(\n => 137.97.162.31\n)\n\n => Array\n(\n => 95.185.21.191\n)\n\n => Array\n(\n => 171.61.168.151\n)\n\n => Array\n(\n => 137.97.184.4\n)\n\n => Array\n(\n => 106.203.151.202\n)\n\n => Array\n(\n => 39.37.137.0\n)\n\n => Array\n(\n => 45.118.166.66\n)\n\n => Array\n(\n => 14.248.105.100\n)\n\n => Array\n(\n => 106.215.61.185\n)\n\n => Array\n(\n => 202.83.57.179\n)\n\n => Array\n(\n => 89.187.182.176\n)\n\n => Array\n(\n => 49.249.232.198\n)\n\n => Array\n(\n => 132.154.95.236\n)\n\n => Array\n(\n => 223.233.83.230\n)\n\n => Array\n(\n => 183.83.153.14\n)\n\n => Array\n(\n => 125.63.72.210\n)\n\n => Array\n(\n => 207.174.202.11\n)\n\n => Array\n(\n => 119.95.88.59\n)\n\n => Array\n(\n => 122.170.14.150\n)\n\n => Array\n(\n => 45.118.166.75\n)\n\n => Array\n(\n => 103.12.135.37\n)\n\n => Array\n(\n => 49.207.120.225\n)\n\n => Array\n(\n => 182.64.195.207\n)\n\n => Array\n(\n => 103.99.37.16\n)\n\n => Array\n(\n => 46.150.104.221\n)\n\n => Array\n(\n => 104.236.195.147\n)\n\n => Array\n(\n => 103.104.192.43\n)\n\n => Array\n(\n => 24.242.159.118\n)\n\n => Array\n(\n => 39.42.179.143\n)\n\n => Array\n(\n => 111.93.58.131\n)\n\n => Array\n(\n => 193.176.84.127\n)\n\n => Array\n(\n => 209.58.142.218\n)\n\n => Array\n(\n => 69.243.152.129\n)\n\n => Array\n(\n => 117.97.131.249\n)\n\n => Array\n(\n => 103.230.180.89\n)\n\n => Array\n(\n => 106.212.170.192\n)\n\n => Array\n(\n => 171.224.180.95\n)\n\n => Array\n(\n => 158.222.11.87\n)\n\n => Array\n(\n => 119.155.60.246\n)\n\n => Array\n(\n => 41.90.43.129\n)\n\n => Array\n(\n => 185.183.104.170\n)\n\n => Array\n(\n => 14.248.67.65\n)\n\n => Array\n(\n => 117.217.205.82\n)\n\n => Array\n(\n => 111.88.7.209\n)\n\n => Array\n(\n => 49.36.132.244\n)\n\n => Array\n(\n => 171.48.40.2\n)\n\n => Array\n(\n => 119.81.105.2\n)\n\n => Array\n(\n => 49.36.128.114\n)\n\n => Array\n(\n => 213.200.31.93\n)\n\n => Array\n(\n => 2.50.15.110\n)\n\n => Array\n(\n => 120.29.104.67\n)\n\n => Array\n(\n => 223.225.32.221\n)\n\n => Array\n(\n => 14.248.67.195\n)\n\n => Array\n(\n => 119.155.36.13\n)\n\n => Array\n(\n => 101.50.95.104\n)\n\n => Array\n(\n => 104.236.205.233\n)\n\n => Array\n(\n => 122.164.36.150\n)\n\n => Array\n(\n => 157.45.93.209\n)\n\n => Array\n(\n => 182.77.118.100\n)\n\n => Array\n(\n => 182.74.134.218\n)\n\n => Array\n(\n => 183.82.128.146\n)\n\n => Array\n(\n => 112.196.170.234\n)\n\n => Array\n(\n => 122.173.230.178\n)\n\n => Array\n(\n => 122.164.71.199\n)\n\n => Array\n(\n => 51.79.19.31\n)\n\n => Array\n(\n => 58.65.222.20\n)\n\n => Array\n(\n => 103.27.203.97\n)\n\n => Array\n(\n => 111.88.7.242\n)\n\n => Array\n(\n => 14.171.232.77\n)\n\n => Array\n(\n => 46.101.22.182\n)\n\n => Array\n(\n => 103.94.219.19\n)\n\n => Array\n(\n => 139.190.83.30\n)\n\n => Array\n(\n => 223.190.27.184\n)\n\n => Array\n(\n => 182.185.183.34\n)\n\n => Array\n(\n => 91.74.181.242\n)\n\n => Array\n(\n => 222.252.107.14\n)\n\n => Array\n(\n => 137.97.8.28\n)\n\n => Array\n(\n => 46.101.16.229\n)\n\n => Array\n(\n => 122.53.254.229\n)\n\n => Array\n(\n => 106.201.17.180\n)\n\n => Array\n(\n => 123.24.170.129\n)\n\n => Array\n(\n => 182.185.180.79\n)\n\n => Array\n(\n => 223.190.17.4\n)\n\n => Array\n(\n => 213.108.105.1\n)\n\n => Array\n(\n => 171.22.76.9\n)\n\n => Array\n(\n => 202.66.178.164\n)\n\n => Array\n(\n => 178.62.97.171\n)\n\n => Array\n(\n => 167.179.110.209\n)\n\n => Array\n(\n => 223.230.147.172\n)\n\n => Array\n(\n => 76.218.195.160\n)\n\n => Array\n(\n => 14.189.186.178\n)\n\n => Array\n(\n => 157.41.45.143\n)\n\n => Array\n(\n => 223.238.22.53\n)\n\n => Array\n(\n => 111.88.7.244\n)\n\n => Array\n(\n => 5.62.57.19\n)\n\n => Array\n(\n => 106.201.25.216\n)\n\n => Array\n(\n => 117.217.205.33\n)\n\n => Array\n(\n => 111.88.7.215\n)\n\n => Array\n(\n => 106.201.13.77\n)\n\n => Array\n(\n => 50.7.93.29\n)\n\n => Array\n(\n => 123.201.70.112\n)\n\n => Array\n(\n => 39.42.108.226\n)\n\n => Array\n(\n => 27.5.198.29\n)\n\n => Array\n(\n => 223.238.85.187\n)\n\n => Array\n(\n => 171.49.176.32\n)\n\n => Array\n(\n => 14.248.79.242\n)\n\n => Array\n(\n => 46.219.211.183\n)\n\n => Array\n(\n => 185.244.212.251\n)\n\n => Array\n(\n => 14.102.84.126\n)\n\n => Array\n(\n => 106.212.191.52\n)\n\n => Array\n(\n => 154.72.153.203\n)\n\n => Array\n(\n => 14.175.82.64\n)\n\n => Array\n(\n => 141.105.139.131\n)\n\n => Array\n(\n => 182.156.103.98\n)\n\n => Array\n(\n => 117.217.204.75\n)\n\n => Array\n(\n => 104.140.83.115\n)\n\n => Array\n(\n => 119.152.62.8\n)\n\n => Array\n(\n => 45.125.247.94\n)\n\n => Array\n(\n => 137.97.37.252\n)\n\n => Array\n(\n => 117.217.204.73\n)\n\n => Array\n(\n => 14.248.79.133\n)\n\n => Array\n(\n => 39.37.152.52\n)\n\n => Array\n(\n => 103.55.60.54\n)\n\n => Array\n(\n => 102.166.183.88\n)\n\n => Array\n(\n => 5.62.60.162\n)\n\n => Array\n(\n => 5.62.60.163\n)\n\n => Array\n(\n => 160.202.38.131\n)\n\n => Array\n(\n => 106.215.20.253\n)\n\n => Array\n(\n => 39.37.160.54\n)\n\n => Array\n(\n => 119.152.59.186\n)\n\n => Array\n(\n => 183.82.0.164\n)\n\n => Array\n(\n => 41.90.54.87\n)\n\n => Array\n(\n => 157.36.85.158\n)\n\n => Array\n(\n => 110.37.229.162\n)\n\n => Array\n(\n => 203.99.180.148\n)\n\n => Array\n(\n => 117.97.132.91\n)\n\n => Array\n(\n => 171.61.147.105\n)\n\n => Array\n(\n => 14.98.147.214\n)\n\n => Array\n(\n => 209.234.253.191\n)\n\n => Array\n(\n => 92.38.148.60\n)\n\n => Array\n(\n => 178.128.104.139\n)\n\n => Array\n(\n => 212.154.0.176\n)\n\n => Array\n(\n => 103.41.24.141\n)\n\n => Array\n(\n => 2.58.194.132\n)\n\n => Array\n(\n => 180.190.78.169\n)\n\n => Array\n(\n => 106.215.45.182\n)\n\n => Array\n(\n => 125.63.100.222\n)\n\n => Array\n(\n => 110.54.247.17\n)\n\n => Array\n(\n => 103.26.85.105\n)\n\n => Array\n(\n => 39.42.147.3\n)\n\n => Array\n(\n => 137.97.51.41\n)\n\n => Array\n(\n => 71.202.72.27\n)\n\n => Array\n(\n => 119.155.35.10\n)\n\n => Array\n(\n => 202.47.43.120\n)\n\n => Array\n(\n => 183.83.64.101\n)\n\n => Array\n(\n => 182.68.106.141\n)\n\n => Array\n(\n => 171.61.187.87\n)\n\n => Array\n(\n => 178.162.198.118\n)\n\n => Array\n(\n => 115.97.151.218\n)\n\n => Array\n(\n => 196.207.184.210\n)\n\n => Array\n(\n => 198.16.70.51\n)\n\n => Array\n(\n => 41.60.237.33\n)\n\n => Array\n(\n => 47.11.86.26\n)\n\n => Array\n(\n => 117.217.201.183\n)\n\n => Array\n(\n => 203.192.241.79\n)\n\n => Array\n(\n => 122.165.119.85\n)\n\n => Array\n(\n => 23.227.142.218\n)\n\n => Array\n(\n => 178.128.104.221\n)\n\n => Array\n(\n => 14.192.54.163\n)\n\n => Array\n(\n => 139.5.253.218\n)\n\n => Array\n(\n => 117.230.140.127\n)\n\n => Array\n(\n => 195.114.149.199\n)\n\n => Array\n(\n => 14.239.180.220\n)\n\n => Array\n(\n => 103.62.155.94\n)\n\n => Array\n(\n => 118.71.97.14\n)\n\n => Array\n(\n => 137.97.55.163\n)\n\n => Array\n(\n => 202.47.49.198\n)\n\n => Array\n(\n => 171.61.177.85\n)\n\n => Array\n(\n => 137.97.190.224\n)\n\n => Array\n(\n => 117.230.34.142\n)\n\n => Array\n(\n => 103.41.32.5\n)\n\n => Array\n(\n => 203.90.82.237\n)\n\n => Array\n(\n => 125.63.124.238\n)\n\n => Array\n(\n => 103.232.128.78\n)\n\n => Array\n(\n => 106.197.14.227\n)\n\n => Array\n(\n => 81.17.242.244\n)\n\n => Array\n(\n => 81.19.210.179\n)\n\n => Array\n(\n => 103.134.94.98\n)\n\n => Array\n(\n => 110.38.0.86\n)\n\n => Array\n(\n => 103.10.224.195\n)\n\n => Array\n(\n => 45.118.166.89\n)\n\n => Array\n(\n => 115.186.186.68\n)\n\n => Array\n(\n => 138.197.129.237\n)\n\n => Array\n(\n => 14.247.162.52\n)\n\n => Array\n(\n => 103.255.4.5\n)\n\n => Array\n(\n => 14.167.188.254\n)\n\n => Array\n(\n => 5.62.59.54\n)\n\n => Array\n(\n => 27.122.14.80\n)\n\n => Array\n(\n => 39.53.240.21\n)\n\n => Array\n(\n => 39.53.241.243\n)\n\n => Array\n(\n => 117.230.130.161\n)\n\n => Array\n(\n => 118.71.191.149\n)\n\n => Array\n(\n => 5.188.95.54\n)\n\n => Array\n(\n => 66.45.250.27\n)\n\n => Array\n(\n => 106.215.6.175\n)\n\n => Array\n(\n => 27.122.14.86\n)\n\n => Array\n(\n => 103.255.4.51\n)\n\n => Array\n(\n => 101.50.93.119\n)\n\n => Array\n(\n => 137.97.183.51\n)\n\n => Array\n(\n => 117.217.204.185\n)\n\n => Array\n(\n => 95.104.106.82\n)\n\n => Array\n(\n => 5.62.56.211\n)\n\n => Array\n(\n => 103.104.181.214\n)\n\n => Array\n(\n => 36.72.214.243\n)\n\n => Array\n(\n => 5.62.62.219\n)\n\n => Array\n(\n => 110.36.202.4\n)\n\n => Array\n(\n => 103.255.4.253\n)\n\n => Array\n(\n => 110.172.138.61\n)\n\n => Array\n(\n => 159.203.24.195\n)\n\n => Array\n(\n => 13.229.88.42\n)\n\n => Array\n(\n => 59.153.235.20\n)\n\n => Array\n(\n => 171.236.169.32\n)\n\n => Array\n(\n => 14.231.85.206\n)\n\n => Array\n(\n => 119.152.54.103\n)\n\n => Array\n(\n => 103.80.117.202\n)\n\n => Array\n(\n => 223.179.157.75\n)\n\n => Array\n(\n => 122.173.68.249\n)\n\n => Array\n(\n => 188.163.72.113\n)\n\n => Array\n(\n => 119.155.20.164\n)\n\n => Array\n(\n => 103.121.43.68\n)\n\n => Array\n(\n => 5.62.58.6\n)\n\n => Array\n(\n => 203.122.40.154\n)\n\n => Array\n(\n => 222.254.96.203\n)\n\n => Array\n(\n => 103.83.148.167\n)\n\n => Array\n(\n => 103.87.251.226\n)\n\n => Array\n(\n => 123.24.129.24\n)\n\n => Array\n(\n => 137.97.83.8\n)\n\n => Array\n(\n => 223.225.33.132\n)\n\n => Array\n(\n => 128.76.175.190\n)\n\n => Array\n(\n => 195.85.219.32\n)\n\n => Array\n(\n => 139.167.102.93\n)\n\n => Array\n(\n => 49.15.198.253\n)\n\n => Array\n(\n => 45.152.183.172\n)\n\n => Array\n(\n => 42.106.180.136\n)\n\n => Array\n(\n => 95.142.120.9\n)\n\n => Array\n(\n => 139.167.236.4\n)\n\n => Array\n(\n => 159.65.72.167\n)\n\n => Array\n(\n => 49.15.89.2\n)\n\n => Array\n(\n => 42.201.161.195\n)\n\n => Array\n(\n => 27.97.210.38\n)\n\n => Array\n(\n => 171.241.45.19\n)\n\n => Array\n(\n => 42.108.2.18\n)\n\n => Array\n(\n => 171.236.40.68\n)\n\n => Array\n(\n => 110.93.82.102\n)\n\n => Array\n(\n => 43.225.24.186\n)\n\n => Array\n(\n => 117.230.189.119\n)\n\n => Array\n(\n => 124.123.147.187\n)\n\n => Array\n(\n => 216.151.184.250\n)\n\n => Array\n(\n => 49.15.133.16\n)\n\n => Array\n(\n => 49.15.220.74\n)\n\n => Array\n(\n => 157.37.221.246\n)\n\n => Array\n(\n => 176.124.233.112\n)\n\n => Array\n(\n => 118.71.167.40\n)\n\n => Array\n(\n => 182.185.213.161\n)\n\n => Array\n(\n => 47.31.79.248\n)\n\n => Array\n(\n => 223.179.238.192\n)\n\n => Array\n(\n => 79.110.128.219\n)\n\n => Array\n(\n => 106.210.42.111\n)\n\n => Array\n(\n => 47.247.214.229\n)\n\n => Array\n(\n => 193.0.220.108\n)\n\n => Array\n(\n => 1.39.206.254\n)\n\n => Array\n(\n => 123.201.77.38\n)\n\n => Array\n(\n => 115.178.207.21\n)\n\n => Array\n(\n => 37.111.202.92\n)\n\n => Array\n(\n => 49.14.179.243\n)\n\n => Array\n(\n => 117.230.145.171\n)\n\n => Array\n(\n => 171.229.242.96\n)\n\n => Array\n(\n => 27.59.174.209\n)\n\n => Array\n(\n => 1.38.202.211\n)\n\n => Array\n(\n => 157.37.128.46\n)\n\n => Array\n(\n => 49.15.94.80\n)\n\n => Array\n(\n => 123.25.46.147\n)\n\n => Array\n(\n => 117.230.170.185\n)\n\n => Array\n(\n => 5.62.16.19\n)\n\n => Array\n(\n => 103.18.22.25\n)\n\n => Array\n(\n => 103.46.200.132\n)\n\n => Array\n(\n => 27.97.165.126\n)\n\n => Array\n(\n => 117.230.54.241\n)\n\n => Array\n(\n => 27.97.209.76\n)\n\n => Array\n(\n => 47.31.182.109\n)\n\n => Array\n(\n => 47.30.223.221\n)\n\n => Array\n(\n => 103.31.94.82\n)\n\n => Array\n(\n => 103.211.14.45\n)\n\n => Array\n(\n => 171.49.233.58\n)\n\n => Array\n(\n => 65.49.126.95\n)\n\n => Array\n(\n => 69.255.101.170\n)\n\n => Array\n(\n => 27.56.224.67\n)\n\n => Array\n(\n => 117.230.146.86\n)\n\n => Array\n(\n => 27.59.154.52\n)\n\n => Array\n(\n => 132.154.114.10\n)\n\n => Array\n(\n => 182.186.77.60\n)\n\n => Array\n(\n => 117.230.136.74\n)\n\n => Array\n(\n => 43.251.94.253\n)\n\n => Array\n(\n => 103.79.168.225\n)\n\n => Array\n(\n => 117.230.56.51\n)\n\n => Array\n(\n => 27.97.187.45\n)\n\n => Array\n(\n => 137.97.190.61\n)\n\n => Array\n(\n => 193.0.220.26\n)\n\n => Array\n(\n => 49.36.137.62\n)\n\n => Array\n(\n => 47.30.189.248\n)\n\n => Array\n(\n => 109.169.23.84\n)\n\n => Array\n(\n => 111.119.185.46\n)\n\n => Array\n(\n => 103.83.148.246\n)\n\n => Array\n(\n => 157.32.119.138\n)\n\n => Array\n(\n => 5.62.41.53\n)\n\n => Array\n(\n => 47.8.243.236\n)\n\n => Array\n(\n => 112.79.158.69\n)\n\n => Array\n(\n => 180.92.148.218\n)\n\n => Array\n(\n => 157.36.162.154\n)\n\n => Array\n(\n => 39.46.114.47\n)\n\n => Array\n(\n => 117.230.173.250\n)\n\n => Array\n(\n => 117.230.155.188\n)\n\n => Array\n(\n => 193.0.220.17\n)\n\n => Array\n(\n => 117.230.171.166\n)\n\n => Array\n(\n => 49.34.59.228\n)\n\n => Array\n(\n => 111.88.197.247\n)\n\n => Array\n(\n => 47.31.156.112\n)\n\n => Array\n(\n => 137.97.64.180\n)\n\n => Array\n(\n => 14.244.227.18\n)\n\n => Array\n(\n => 113.167.158.8\n)\n\n => Array\n(\n => 39.37.175.189\n)\n\n => Array\n(\n => 139.167.211.8\n)\n\n => Array\n(\n => 73.120.85.235\n)\n\n => Array\n(\n => 104.236.195.72\n)\n\n => Array\n(\n => 27.97.190.71\n)\n\n => Array\n(\n => 79.46.170.222\n)\n\n => Array\n(\n => 102.185.244.207\n)\n\n => Array\n(\n => 37.111.136.30\n)\n\n => Array\n(\n => 50.7.93.28\n)\n\n => Array\n(\n => 110.54.251.43\n)\n\n => Array\n(\n => 49.36.143.40\n)\n\n => Array\n(\n => 103.130.112.185\n)\n\n => Array\n(\n => 37.111.139.202\n)\n\n => Array\n(\n => 49.36.139.108\n)\n\n => Array\n(\n => 37.111.136.179\n)\n\n => Array\n(\n => 123.17.165.77\n)\n\n => Array\n(\n => 49.207.143.206\n)\n\n => Array\n(\n => 39.53.80.149\n)\n\n => Array\n(\n => 223.188.71.214\n)\n\n => Array\n(\n => 1.39.222.233\n)\n\n => Array\n(\n => 117.230.9.85\n)\n\n => Array\n(\n => 103.251.245.216\n)\n\n => Array\n(\n => 122.169.133.145\n)\n\n => Array\n(\n => 43.250.165.57\n)\n\n => Array\n(\n => 39.44.13.235\n)\n\n => Array\n(\n => 157.47.181.2\n)\n\n => Array\n(\n => 27.56.203.50\n)\n\n => Array\n(\n => 191.96.97.58\n)\n\n => Array\n(\n => 111.88.107.172\n)\n\n => Array\n(\n => 113.193.198.136\n)\n\n => Array\n(\n => 117.230.172.175\n)\n\n => Array\n(\n => 191.96.182.239\n)\n\n => Array\n(\n => 2.58.46.28\n)\n\n => Array\n(\n => 183.83.253.87\n)\n\n => Array\n(\n => 49.15.139.242\n)\n\n => Array\n(\n => 42.107.220.236\n)\n\n => Array\n(\n => 14.192.53.196\n)\n\n => Array\n(\n => 42.119.212.202\n)\n\n => Array\n(\n => 192.158.234.45\n)\n\n => Array\n(\n => 49.149.102.192\n)\n\n => Array\n(\n => 47.8.170.17\n)\n\n => Array\n(\n => 117.197.13.247\n)\n\n => Array\n(\n => 116.74.34.44\n)\n\n => Array\n(\n => 103.79.249.163\n)\n\n => Array\n(\n => 182.189.95.70\n)\n\n => Array\n(\n => 137.59.218.118\n)\n\n => Array\n(\n => 103.79.170.243\n)\n\n => Array\n(\n => 39.40.54.25\n)\n\n => Array\n(\n => 119.155.40.170\n)\n\n => Array\n(\n => 1.39.212.157\n)\n\n => Array\n(\n => 70.127.59.89\n)\n\n => Array\n(\n => 14.171.22.58\n)\n\n => Array\n(\n => 194.44.167.141\n)\n\n => Array\n(\n => 111.88.179.154\n)\n\n => Array\n(\n => 117.230.140.232\n)\n\n => Array\n(\n => 137.97.96.128\n)\n\n => Array\n(\n => 198.16.66.123\n)\n\n => Array\n(\n => 106.198.44.193\n)\n\n => Array\n(\n => 119.153.45.75\n)\n\n => Array\n(\n => 49.15.242.208\n)\n\n => Array\n(\n => 119.155.241.20\n)\n\n => Array\n(\n => 106.223.109.155\n)\n\n => Array\n(\n => 119.160.119.245\n)\n\n => Array\n(\n => 106.215.81.160\n)\n\n => Array\n(\n => 1.39.192.211\n)\n\n => Array\n(\n => 223.230.35.208\n)\n\n => Array\n(\n => 39.59.4.158\n)\n\n => Array\n(\n => 43.231.57.234\n)\n\n => Array\n(\n => 60.254.78.193\n)\n\n => Array\n(\n => 122.170.224.87\n)\n\n => Array\n(\n => 117.230.22.141\n)\n\n => Array\n(\n => 119.152.107.211\n)\n\n => Array\n(\n => 103.87.192.206\n)\n\n => Array\n(\n => 39.45.244.47\n)\n\n => Array\n(\n => 50.72.141.94\n)\n\n => Array\n(\n => 39.40.6.128\n)\n\n => Array\n(\n => 39.45.180.186\n)\n\n => Array\n(\n => 49.207.131.233\n)\n\n => Array\n(\n => 139.59.69.142\n)\n\n => Array\n(\n => 111.119.187.29\n)\n\n => Array\n(\n => 119.153.40.69\n)\n\n => Array\n(\n => 49.36.133.64\n)\n\n => Array\n(\n => 103.255.4.249\n)\n\n => Array\n(\n => 198.144.154.15\n)\n\n => Array\n(\n => 1.22.46.172\n)\n\n => Array\n(\n => 103.255.5.46\n)\n\n => Array\n(\n => 27.56.195.188\n)\n\n => Array\n(\n => 203.101.167.53\n)\n\n => Array\n(\n => 117.230.62.195\n)\n\n => Array\n(\n => 103.240.194.186\n)\n\n => Array\n(\n => 107.170.166.118\n)\n\n => Array\n(\n => 101.53.245.80\n)\n\n => Array\n(\n => 157.43.13.208\n)\n\n => Array\n(\n => 137.97.100.77\n)\n\n => Array\n(\n => 47.31.150.208\n)\n\n => Array\n(\n => 137.59.222.65\n)\n\n => Array\n(\n => 103.85.127.250\n)\n\n => Array\n(\n => 103.214.119.32\n)\n\n => Array\n(\n => 182.255.49.52\n)\n\n => Array\n(\n => 103.75.247.72\n)\n\n => Array\n(\n => 103.85.125.250\n)\n\n => Array\n(\n => 183.83.253.167\n)\n\n => Array\n(\n => 1.39.222.111\n)\n\n => Array\n(\n => 111.119.185.9\n)\n\n => Array\n(\n => 111.119.187.10\n)\n\n => Array\n(\n => 39.37.147.144\n)\n\n => Array\n(\n => 103.200.198.183\n)\n\n => Array\n(\n => 1.39.222.18\n)\n\n => Array\n(\n => 198.8.80.103\n)\n\n => Array\n(\n => 42.108.1.243\n)\n\n => Array\n(\n => 111.119.187.16\n)\n\n => Array\n(\n => 39.40.241.8\n)\n\n => Array\n(\n => 122.169.150.158\n)\n\n => Array\n(\n => 39.40.215.119\n)\n\n => Array\n(\n => 103.255.5.77\n)\n\n => Array\n(\n => 157.38.108.196\n)\n\n => Array\n(\n => 103.255.4.67\n)\n\n => Array\n(\n => 5.62.60.62\n)\n\n => Array\n(\n => 39.37.146.202\n)\n\n => Array\n(\n => 110.138.6.221\n)\n\n => Array\n(\n => 49.36.143.88\n)\n\n => Array\n(\n => 37.1.215.39\n)\n\n => Array\n(\n => 27.106.59.190\n)\n\n => Array\n(\n => 139.167.139.41\n)\n\n => Array\n(\n => 114.142.166.179\n)\n\n => Array\n(\n => 223.225.240.112\n)\n\n => Array\n(\n => 103.255.5.36\n)\n\n => Array\n(\n => 175.136.1.48\n)\n\n => Array\n(\n => 103.82.80.166\n)\n\n => Array\n(\n => 182.185.196.126\n)\n\n => Array\n(\n => 157.43.45.76\n)\n\n => Array\n(\n => 119.152.132.49\n)\n\n => Array\n(\n => 5.62.62.162\n)\n\n => Array\n(\n => 103.255.4.39\n)\n\n => Array\n(\n => 202.5.144.153\n)\n\n => Array\n(\n => 1.39.223.210\n)\n\n => Array\n(\n => 92.38.176.154\n)\n\n => Array\n(\n => 117.230.186.142\n)\n\n => Array\n(\n => 183.83.39.123\n)\n\n => Array\n(\n => 182.185.156.76\n)\n\n => Array\n(\n => 104.236.74.212\n)\n\n => Array\n(\n => 107.170.145.187\n)\n\n => Array\n(\n => 117.102.7.98\n)\n\n => Array\n(\n => 137.59.220.0\n)\n\n => Array\n(\n => 157.47.222.14\n)\n\n => Array\n(\n => 47.15.206.82\n)\n\n => Array\n(\n => 117.230.159.99\n)\n\n => Array\n(\n => 117.230.175.151\n)\n\n => Array\n(\n => 157.50.97.18\n)\n\n => Array\n(\n => 117.230.47.164\n)\n\n => Array\n(\n => 77.111.244.34\n)\n\n => Array\n(\n => 139.167.189.131\n)\n\n => Array\n(\n => 1.39.204.103\n)\n\n => Array\n(\n => 117.230.58.0\n)\n\n => Array\n(\n => 182.185.226.66\n)\n\n => Array\n(\n => 115.42.70.119\n)\n\n => Array\n(\n => 171.48.114.134\n)\n\n => Array\n(\n => 144.34.218.75\n)\n\n => Array\n(\n => 199.58.164.135\n)\n\n => Array\n(\n => 101.53.228.151\n)\n\n => Array\n(\n => 117.230.50.57\n)\n\n => Array\n(\n => 223.225.138.84\n)\n\n => Array\n(\n => 110.225.67.65\n)\n\n => Array\n(\n => 47.15.200.39\n)\n\n => Array\n(\n => 39.42.20.127\n)\n\n => Array\n(\n => 117.97.241.81\n)\n\n => Array\n(\n => 111.119.185.11\n)\n\n => Array\n(\n => 103.100.5.94\n)\n\n => Array\n(\n => 103.25.137.69\n)\n\n => Array\n(\n => 47.15.197.159\n)\n\n => Array\n(\n => 223.188.176.122\n)\n\n => Array\n(\n => 27.4.175.80\n)\n\n => Array\n(\n => 181.215.43.82\n)\n\n => Array\n(\n => 27.56.228.157\n)\n\n => Array\n(\n => 117.230.19.19\n)\n\n => Array\n(\n => 47.15.208.71\n)\n\n => Array\n(\n => 119.155.21.176\n)\n\n => Array\n(\n => 47.15.234.202\n)\n\n => Array\n(\n => 117.230.144.135\n)\n\n => Array\n(\n => 112.79.139.199\n)\n\n => Array\n(\n => 116.75.246.41\n)\n\n => Array\n(\n => 117.230.177.126\n)\n\n => Array\n(\n => 212.103.48.134\n)\n\n => Array\n(\n => 102.69.228.78\n)\n\n => Array\n(\n => 117.230.37.118\n)\n\n => Array\n(\n => 175.143.61.75\n)\n\n => Array\n(\n => 139.167.56.138\n)\n\n => Array\n(\n => 58.145.189.250\n)\n\n => Array\n(\n => 103.255.5.65\n)\n\n => Array\n(\n => 39.37.153.182\n)\n\n => Array\n(\n => 157.43.85.106\n)\n\n => Array\n(\n => 185.209.178.77\n)\n\n => Array\n(\n => 1.39.212.45\n)\n\n => Array\n(\n => 103.72.7.16\n)\n\n => Array\n(\n => 117.97.185.244\n)\n\n => Array\n(\n => 117.230.59.106\n)\n\n => Array\n(\n => 137.97.121.103\n)\n\n => Array\n(\n => 103.82.123.215\n)\n\n => Array\n(\n => 103.68.217.248\n)\n\n => Array\n(\n => 157.39.27.175\n)\n\n => Array\n(\n => 47.31.100.249\n)\n\n => Array\n(\n => 14.171.232.139\n)\n\n => Array\n(\n => 103.31.93.208\n)\n\n => Array\n(\n => 117.230.56.77\n)\n\n => Array\n(\n => 124.182.25.124\n)\n\n => Array\n(\n => 106.66.191.242\n)\n\n => Array\n(\n => 175.107.237.25\n)\n\n => Array\n(\n => 119.155.1.27\n)\n\n => Array\n(\n => 72.255.6.24\n)\n\n => Array\n(\n => 192.140.152.223\n)\n\n => Array\n(\n => 212.103.48.136\n)\n\n => Array\n(\n => 39.45.134.56\n)\n\n => Array\n(\n => 139.167.173.30\n)\n\n => Array\n(\n => 117.230.63.87\n)\n\n => Array\n(\n => 182.189.95.203\n)\n\n => Array\n(\n => 49.204.183.248\n)\n\n => Array\n(\n => 47.31.125.188\n)\n\n => Array\n(\n => 103.252.171.13\n)\n\n => Array\n(\n => 112.198.74.36\n)\n\n => Array\n(\n => 27.109.113.152\n)\n\n => Array\n(\n => 42.112.233.44\n)\n\n => Array\n(\n => 47.31.68.193\n)\n\n => Array\n(\n => 103.252.171.134\n)\n\n => Array\n(\n => 77.123.32.114\n)\n\n => Array\n(\n => 1.38.189.66\n)\n\n => Array\n(\n => 39.37.181.108\n)\n\n => Array\n(\n => 42.106.44.61\n)\n\n => Array\n(\n => 157.36.8.39\n)\n\n => Array\n(\n => 223.238.41.53\n)\n\n => Array\n(\n => 202.89.77.10\n)\n\n => Array\n(\n => 117.230.150.68\n)\n\n => Array\n(\n => 175.176.87.60\n)\n\n => Array\n(\n => 137.97.117.87\n)\n\n => Array\n(\n => 132.154.123.11\n)\n\n => Array\n(\n => 45.113.124.141\n)\n\n => Array\n(\n => 103.87.56.203\n)\n\n => Array\n(\n => 159.89.171.156\n)\n\n => Array\n(\n => 119.155.53.88\n)\n\n => Array\n(\n => 222.252.107.215\n)\n\n => Array\n(\n => 132.154.75.238\n)\n\n => Array\n(\n => 122.183.41.168\n)\n\n => Array\n(\n => 42.106.254.158\n)\n\n => Array\n(\n => 103.252.171.37\n)\n\n => Array\n(\n => 202.59.13.180\n)\n\n => Array\n(\n => 37.111.139.137\n)\n\n => Array\n(\n => 39.42.93.25\n)\n\n => Array\n(\n => 118.70.177.156\n)\n\n => Array\n(\n => 117.230.148.64\n)\n\n => Array\n(\n => 39.42.15.194\n)\n\n => Array\n(\n => 137.97.176.86\n)\n\n => Array\n(\n => 106.210.102.113\n)\n\n => Array\n(\n => 39.59.84.236\n)\n\n => Array\n(\n => 49.206.187.177\n)\n\n => Array\n(\n => 117.230.133.11\n)\n\n => Array\n(\n => 42.106.253.173\n)\n\n => Array\n(\n => 178.62.102.23\n)\n\n => Array\n(\n => 111.92.76.175\n)\n\n => Array\n(\n => 132.154.86.45\n)\n\n => Array\n(\n => 117.230.128.39\n)\n\n => Array\n(\n => 117.230.53.165\n)\n\n => Array\n(\n => 49.37.200.171\n)\n\n => Array\n(\n => 104.236.213.230\n)\n\n => Array\n(\n => 103.140.30.81\n)\n\n => Array\n(\n => 59.103.104.117\n)\n\n => Array\n(\n => 65.49.126.79\n)\n\n => Array\n(\n => 202.59.12.251\n)\n\n => Array\n(\n => 37.111.136.17\n)\n\n => Array\n(\n => 163.53.85.67\n)\n\n => Array\n(\n => 123.16.240.73\n)\n\n => Array\n(\n => 103.211.14.183\n)\n\n => Array\n(\n => 103.248.93.211\n)\n\n => Array\n(\n => 116.74.59.127\n)\n\n => Array\n(\n => 137.97.169.254\n)\n\n => Array\n(\n => 113.177.79.100\n)\n\n => Array\n(\n => 74.82.60.187\n)\n\n => Array\n(\n => 117.230.157.66\n)\n\n => Array\n(\n => 169.149.194.241\n)\n\n => Array\n(\n => 117.230.156.11\n)\n\n => Array\n(\n => 202.59.12.157\n)\n\n => Array\n(\n => 42.106.181.25\n)\n\n => Array\n(\n => 202.59.13.78\n)\n\n => Array\n(\n => 39.37.153.32\n)\n\n => Array\n(\n => 177.188.216.175\n)\n\n => Array\n(\n => 222.252.53.165\n)\n\n => Array\n(\n => 37.139.23.89\n)\n\n => Array\n(\n => 117.230.139.150\n)\n\n => Array\n(\n => 104.131.176.234\n)\n\n => Array\n(\n => 42.106.181.117\n)\n\n => Array\n(\n => 117.230.180.94\n)\n\n => Array\n(\n => 180.190.171.5\n)\n\n => Array\n(\n => 150.129.165.185\n)\n\n => Array\n(\n => 51.15.0.150\n)\n\n => Array\n(\n => 42.111.4.84\n)\n\n => Array\n(\n => 74.82.60.116\n)\n\n => Array\n(\n => 137.97.121.165\n)\n\n => Array\n(\n => 64.62.187.194\n)\n\n => Array\n(\n => 137.97.106.162\n)\n\n => Array\n(\n => 137.97.92.46\n)\n\n => Array\n(\n => 137.97.170.25\n)\n\n => Array\n(\n => 103.104.192.100\n)\n\n => Array\n(\n => 185.246.211.34\n)\n\n => Array\n(\n => 119.160.96.78\n)\n\n => Array\n(\n => 212.103.48.152\n)\n\n => Array\n(\n => 183.83.153.90\n)\n\n => Array\n(\n => 117.248.150.41\n)\n\n => Array\n(\n => 185.240.246.180\n)\n\n => Array\n(\n => 162.253.131.125\n)\n\n => Array\n(\n => 117.230.153.217\n)\n\n => Array\n(\n => 117.230.169.1\n)\n\n => Array\n(\n => 49.15.138.247\n)\n\n => Array\n(\n => 117.230.37.110\n)\n\n => Array\n(\n => 14.167.188.75\n)\n\n => Array\n(\n => 169.149.239.93\n)\n\n => Array\n(\n => 103.216.176.91\n)\n\n => Array\n(\n => 117.230.12.126\n)\n\n => Array\n(\n => 184.75.209.110\n)\n\n => Array\n(\n => 117.230.6.60\n)\n\n => Array\n(\n => 117.230.135.132\n)\n\n => Array\n(\n => 31.179.29.109\n)\n\n => Array\n(\n => 74.121.188.186\n)\n\n => Array\n(\n => 117.230.35.5\n)\n\n => Array\n(\n => 111.92.74.239\n)\n\n => Array\n(\n => 104.245.144.236\n)\n\n => Array\n(\n => 39.50.22.100\n)\n\n => Array\n(\n => 47.31.190.23\n)\n\n => Array\n(\n => 157.44.73.187\n)\n\n => Array\n(\n => 117.230.8.91\n)\n\n => Array\n(\n => 157.32.18.2\n)\n\n => Array\n(\n => 111.119.187.43\n)\n\n => Array\n(\n => 203.101.185.246\n)\n\n => Array\n(\n => 5.62.34.22\n)\n\n => Array\n(\n => 122.8.143.76\n)\n\n => Array\n(\n => 115.186.2.187\n)\n\n => Array\n(\n => 202.142.110.89\n)\n\n => Array\n(\n => 157.50.61.254\n)\n\n => Array\n(\n => 223.182.211.185\n)\n\n => Array\n(\n => 103.85.125.210\n)\n\n => Array\n(\n => 103.217.133.147\n)\n\n => Array\n(\n => 103.60.196.217\n)\n\n => Array\n(\n => 157.44.238.6\n)\n\n => Array\n(\n => 117.196.225.68\n)\n\n => Array\n(\n => 104.254.92.52\n)\n\n => Array\n(\n => 39.42.46.72\n)\n\n => Array\n(\n => 221.132.119.36\n)\n\n => Array\n(\n => 111.92.77.47\n)\n\n => Array\n(\n => 223.225.19.152\n)\n\n => Array\n(\n => 159.89.121.217\n)\n\n => Array\n(\n => 39.53.221.205\n)\n\n => Array\n(\n => 193.34.217.28\n)\n\n => Array\n(\n => 139.167.206.36\n)\n\n => Array\n(\n => 96.40.10.7\n)\n\n => Array\n(\n => 124.29.198.123\n)\n\n => Array\n(\n => 117.196.226.1\n)\n\n => Array\n(\n => 106.200.85.135\n)\n\n => Array\n(\n => 106.223.180.28\n)\n\n => Array\n(\n => 103.49.232.110\n)\n\n => Array\n(\n => 139.167.208.50\n)\n\n => Array\n(\n => 139.167.201.102\n)\n\n => Array\n(\n => 14.244.224.237\n)\n\n => Array\n(\n => 103.140.31.187\n)\n\n => Array\n(\n => 49.36.134.136\n)\n\n => Array\n(\n => 160.16.61.75\n)\n\n => Array\n(\n => 103.18.22.228\n)\n\n => Array\n(\n => 47.9.74.121\n)\n\n => Array\n(\n => 47.30.216.159\n)\n\n => Array\n(\n => 117.248.150.78\n)\n\n => Array\n(\n => 5.62.34.17\n)\n\n => Array\n(\n => 139.167.247.181\n)\n\n => Array\n(\n => 193.176.84.29\n)\n\n => Array\n(\n => 103.195.201.121\n)\n\n => Array\n(\n => 89.187.175.115\n)\n\n => Array\n(\n => 137.97.81.251\n)\n\n => Array\n(\n => 157.51.147.62\n)\n\n => Array\n(\n => 103.104.192.42\n)\n\n => Array\n(\n => 14.171.235.26\n)\n\n => Array\n(\n => 178.62.89.121\n)\n\n => Array\n(\n => 119.155.4.164\n)\n\n => Array\n(\n => 43.250.241.89\n)\n\n => Array\n(\n => 103.31.100.80\n)\n\n => Array\n(\n => 119.155.7.44\n)\n\n => Array\n(\n => 106.200.73.114\n)\n\n => Array\n(\n => 77.111.246.18\n)\n\n => Array\n(\n => 157.39.99.247\n)\n\n => Array\n(\n => 103.77.42.132\n)\n\n => Array\n(\n => 74.115.214.133\n)\n\n => Array\n(\n => 117.230.49.224\n)\n\n => Array\n(\n => 39.50.108.238\n)\n\n => Array\n(\n => 47.30.221.45\n)\n\n => Array\n(\n => 95.133.164.235\n)\n\n => Array\n(\n => 212.103.48.141\n)\n\n => Array\n(\n => 104.194.218.147\n)\n\n => Array\n(\n => 106.200.88.241\n)\n\n => Array\n(\n => 182.189.212.211\n)\n\n => Array\n(\n => 39.50.142.129\n)\n\n => Array\n(\n => 77.234.43.133\n)\n\n => Array\n(\n => 49.15.192.58\n)\n\n => Array\n(\n => 119.153.37.55\n)\n\n => Array\n(\n => 27.56.156.128\n)\n\n => Array\n(\n => 168.211.4.33\n)\n\n => Array\n(\n => 203.81.236.239\n)\n\n => Array\n(\n => 157.51.149.61\n)\n\n => Array\n(\n => 117.230.45.255\n)\n\n => Array\n(\n => 39.42.106.169\n)\n\n => Array\n(\n => 27.71.89.76\n)\n\n => Array\n(\n => 123.27.109.167\n)\n\n => Array\n(\n => 106.202.21.91\n)\n\n => Array\n(\n => 103.85.125.206\n)\n\n => Array\n(\n => 122.173.250.229\n)\n\n => Array\n(\n => 106.210.102.77\n)\n\n => Array\n(\n => 134.209.47.156\n)\n\n => Array\n(\n => 45.127.232.12\n)\n\n => Array\n(\n => 45.134.224.11\n)\n\n => Array\n(\n => 27.71.89.122\n)\n\n => Array\n(\n => 157.38.105.117\n)\n\n => Array\n(\n => 191.96.73.215\n)\n\n => Array\n(\n => 171.241.92.31\n)\n\n => Array\n(\n => 49.149.104.235\n)\n\n => Array\n(\n => 104.229.247.252\n)\n\n => Array\n(\n => 111.92.78.42\n)\n\n => Array\n(\n => 47.31.88.183\n)\n\n => Array\n(\n => 171.61.203.234\n)\n\n => Array\n(\n => 183.83.226.192\n)\n\n => Array\n(\n => 119.157.107.45\n)\n\n => Array\n(\n => 91.202.163.205\n)\n\n => Array\n(\n => 157.43.62.108\n)\n\n => Array\n(\n => 182.68.248.92\n)\n\n => Array\n(\n => 157.32.251.234\n)\n\n => Array\n(\n => 110.225.196.188\n)\n\n => Array\n(\n => 27.71.89.98\n)\n\n => Array\n(\n => 175.176.87.3\n)\n\n => Array\n(\n => 103.55.90.208\n)\n\n => Array\n(\n => 47.31.41.163\n)\n\n => Array\n(\n => 223.182.195.5\n)\n\n => Array\n(\n => 122.52.101.166\n)\n\n => Array\n(\n => 103.207.82.154\n)\n\n => Array\n(\n => 171.224.178.84\n)\n\n => Array\n(\n => 110.225.235.187\n)\n\n => Array\n(\n => 119.160.97.248\n)\n\n => Array\n(\n => 116.90.101.121\n)\n\n => Array\n(\n => 182.255.48.154\n)\n\n => Array\n(\n => 180.149.221.140\n)\n\n => Array\n(\n => 194.44.79.13\n)\n\n => Array\n(\n => 47.247.18.3\n)\n\n => Array\n(\n => 27.56.242.95\n)\n\n => Array\n(\n => 41.60.236.83\n)\n\n => Array\n(\n => 122.164.162.7\n)\n\n => Array\n(\n => 71.136.154.5\n)\n\n => Array\n(\n => 132.154.119.122\n)\n\n => Array\n(\n => 110.225.80.135\n)\n\n => Array\n(\n => 84.17.61.143\n)\n\n => Array\n(\n => 119.160.102.244\n)\n\n => Array\n(\n => 47.31.27.44\n)\n\n => Array\n(\n => 27.71.89.160\n)\n\n => Array\n(\n => 107.175.38.101\n)\n\n => Array\n(\n => 195.211.150.152\n)\n\n => Array\n(\n => 157.35.250.255\n)\n\n => Array\n(\n => 111.119.187.53\n)\n\n => Array\n(\n => 119.152.97.213\n)\n\n => Array\n(\n => 180.92.143.145\n)\n\n => Array\n(\n => 72.255.61.46\n)\n\n => Array\n(\n => 47.8.183.6\n)\n\n => Array\n(\n => 92.38.148.53\n)\n\n => Array\n(\n => 122.173.194.72\n)\n\n => Array\n(\n => 183.83.226.97\n)\n\n => Array\n(\n => 122.173.73.231\n)\n\n => Array\n(\n => 119.160.101.101\n)\n\n => Array\n(\n => 93.177.75.174\n)\n\n => Array\n(\n => 115.97.196.70\n)\n\n => Array\n(\n => 111.119.187.35\n)\n\n => Array\n(\n => 103.226.226.154\n)\n\n => Array\n(\n => 103.244.172.73\n)\n\n => Array\n(\n => 119.155.61.222\n)\n\n => Array\n(\n => 157.37.184.92\n)\n\n => Array\n(\n => 119.160.103.204\n)\n\n => Array\n(\n => 175.176.87.21\n)\n\n => Array\n(\n => 185.51.228.246\n)\n\n => Array\n(\n => 103.250.164.255\n)\n\n => Array\n(\n => 122.181.194.16\n)\n\n => Array\n(\n => 157.37.230.232\n)\n\n => Array\n(\n => 103.105.236.6\n)\n\n => Array\n(\n => 111.88.128.174\n)\n\n => Array\n(\n => 37.111.139.82\n)\n\n => Array\n(\n => 39.34.133.52\n)\n\n => Array\n(\n => 113.177.79.80\n)\n\n => Array\n(\n => 180.183.71.184\n)\n\n => Array\n(\n => 116.72.218.255\n)\n\n => Array\n(\n => 119.160.117.26\n)\n\n => Array\n(\n => 158.222.0.252\n)\n\n => Array\n(\n => 23.227.142.146\n)\n\n => Array\n(\n => 122.162.152.152\n)\n\n => Array\n(\n => 103.255.149.106\n)\n\n => Array\n(\n => 104.236.53.155\n)\n\n => Array\n(\n => 119.160.119.155\n)\n\n => Array\n(\n => 175.107.214.244\n)\n\n => Array\n(\n => 102.7.116.7\n)\n\n => Array\n(\n => 111.88.91.132\n)\n\n => Array\n(\n => 119.157.248.108\n)\n\n => Array\n(\n => 222.252.36.107\n)\n\n => Array\n(\n => 157.46.209.227\n)\n\n => Array\n(\n => 39.40.54.1\n)\n\n => Array\n(\n => 223.225.19.254\n)\n\n => Array\n(\n => 154.72.150.8\n)\n\n => Array\n(\n => 107.181.177.130\n)\n\n => Array\n(\n => 101.50.75.31\n)\n\n => Array\n(\n => 84.17.58.69\n)\n\n => Array\n(\n => 178.62.5.157\n)\n\n => Array\n(\n => 112.206.175.147\n)\n\n => Array\n(\n => 137.97.113.137\n)\n\n => Array\n(\n => 103.53.44.154\n)\n\n => Array\n(\n => 180.92.143.129\n)\n\n => Array\n(\n => 14.231.223.7\n)\n\n => Array\n(\n => 167.88.63.201\n)\n\n => Array\n(\n => 103.140.204.8\n)\n\n => Array\n(\n => 221.121.135.108\n)\n\n => Array\n(\n => 119.160.97.129\n)\n\n => Array\n(\n => 27.5.168.249\n)\n\n => Array\n(\n => 119.160.102.191\n)\n\n => Array\n(\n => 122.162.219.12\n)\n\n => Array\n(\n => 157.50.141.122\n)\n\n => Array\n(\n => 43.245.8.17\n)\n\n => Array\n(\n => 113.181.198.179\n)\n\n => Array\n(\n => 47.30.221.59\n)\n\n => Array\n(\n => 110.38.29.246\n)\n\n => Array\n(\n => 14.192.140.199\n)\n\n => Array\n(\n => 24.68.10.106\n)\n\n => Array\n(\n => 47.30.209.179\n)\n\n => Array\n(\n => 106.223.123.21\n)\n\n => Array\n(\n => 103.224.48.30\n)\n\n => Array\n(\n => 104.131.19.173\n)\n\n => Array\n(\n => 119.157.100.206\n)\n\n => Array\n(\n => 103.10.226.73\n)\n\n => Array\n(\n => 162.208.51.163\n)\n\n => Array\n(\n => 47.30.221.227\n)\n\n => Array\n(\n => 119.160.116.210\n)\n\n => Array\n(\n => 198.16.78.43\n)\n\n => Array\n(\n => 39.44.201.151\n)\n\n => Array\n(\n => 71.63.181.84\n)\n\n => Array\n(\n => 14.142.192.218\n)\n\n => Array\n(\n => 39.34.147.178\n)\n\n => Array\n(\n => 111.92.75.25\n)\n\n => Array\n(\n => 45.135.239.58\n)\n\n => Array\n(\n => 14.232.235.1\n)\n\n => Array\n(\n => 49.144.100.155\n)\n\n => Array\n(\n => 62.182.99.33\n)\n\n => Array\n(\n => 104.243.212.187\n)\n\n => Array\n(\n => 59.97.132.214\n)\n\n => Array\n(\n => 47.9.15.179\n)\n\n => Array\n(\n => 39.44.103.186\n)\n\n => Array\n(\n => 183.83.241.132\n)\n\n => Array\n(\n => 103.41.24.180\n)\n\n => Array\n(\n => 104.238.46.39\n)\n\n => Array\n(\n => 103.79.170.78\n)\n\n => Array\n(\n => 59.103.138.81\n)\n\n => Array\n(\n => 106.198.191.146\n)\n\n => Array\n(\n => 106.198.255.122\n)\n\n => Array\n(\n => 47.31.46.37\n)\n\n => Array\n(\n => 109.169.23.76\n)\n\n => Array\n(\n => 103.143.7.55\n)\n\n => Array\n(\n => 49.207.114.52\n)\n\n => Array\n(\n => 198.54.106.250\n)\n\n => Array\n(\n => 39.50.64.18\n)\n\n => Array\n(\n => 222.252.48.132\n)\n\n => Array\n(\n => 42.201.186.53\n)\n\n => Array\n(\n => 115.97.198.95\n)\n\n => Array\n(\n => 93.76.134.244\n)\n\n => Array\n(\n => 122.173.15.189\n)\n\n => Array\n(\n => 39.62.38.29\n)\n\n => Array\n(\n => 103.201.145.254\n)\n\n => Array\n(\n => 111.119.187.23\n)\n\n => Array\n(\n => 157.50.66.33\n)\n\n => Array\n(\n => 157.49.68.163\n)\n\n => Array\n(\n => 103.85.125.215\n)\n\n => Array\n(\n => 103.255.4.16\n)\n\n => Array\n(\n => 223.181.246.206\n)\n\n => Array\n(\n => 39.40.109.226\n)\n\n => Array\n(\n => 43.225.70.157\n)\n\n => Array\n(\n => 103.211.18.168\n)\n\n => Array\n(\n => 137.59.221.60\n)\n\n => Array\n(\n => 103.81.214.63\n)\n\n => Array\n(\n => 39.35.163.2\n)\n\n => Array\n(\n => 106.205.124.39\n)\n\n => Array\n(\n => 209.99.165.216\n)\n\n => Array\n(\n => 103.75.247.187\n)\n\n => Array\n(\n => 157.46.217.41\n)\n\n => Array\n(\n => 75.186.73.80\n)\n\n => Array\n(\n => 212.103.48.153\n)\n\n => Array\n(\n => 47.31.61.167\n)\n\n => Array\n(\n => 119.152.145.131\n)\n\n => Array\n(\n => 171.76.177.244\n)\n\n => Array\n(\n => 103.135.78.50\n)\n\n => Array\n(\n => 103.79.170.75\n)\n\n => Array\n(\n => 105.160.22.74\n)\n\n => Array\n(\n => 47.31.20.153\n)\n\n => Array\n(\n => 42.107.204.65\n)\n\n => Array\n(\n => 49.207.131.35\n)\n\n => Array\n(\n => 92.38.148.61\n)\n\n => Array\n(\n => 183.83.255.206\n)\n\n => Array\n(\n => 107.181.177.131\n)\n\n => Array\n(\n => 39.40.220.157\n)\n\n => Array\n(\n => 39.41.133.176\n)\n\n => Array\n(\n => 103.81.214.61\n)\n\n => Array\n(\n => 223.235.108.46\n)\n\n => Array\n(\n => 171.241.52.118\n)\n\n => Array\n(\n => 39.57.138.47\n)\n\n => Array\n(\n => 106.204.196.172\n)\n\n => Array\n(\n => 39.53.228.40\n)\n\n => Array\n(\n => 185.242.5.99\n)\n\n => Array\n(\n => 103.255.5.96\n)\n\n => Array\n(\n => 157.46.212.120\n)\n\n => Array\n(\n => 107.181.177.138\n)\n\n => Array\n(\n => 47.30.193.65\n)\n\n => Array\n(\n => 39.37.178.33\n)\n\n => Array\n(\n => 157.46.173.29\n)\n\n => Array\n(\n => 39.57.238.211\n)\n\n => Array\n(\n => 157.37.245.113\n)\n\n => Array\n(\n => 47.30.201.138\n)\n\n => Array\n(\n => 106.204.193.108\n)\n\n => Array\n(\n => 212.103.50.212\n)\n\n => Array\n(\n => 58.65.221.187\n)\n\n => Array\n(\n => 178.62.92.29\n)\n\n => Array\n(\n => 111.92.77.166\n)\n\n => Array\n(\n => 47.30.223.158\n)\n\n => Array\n(\n => 103.224.54.83\n)\n\n => Array\n(\n => 119.153.43.22\n)\n\n => Array\n(\n => 223.181.126.251\n)\n\n => Array\n(\n => 39.42.175.202\n)\n\n => Array\n(\n => 103.224.54.190\n)\n\n => Array\n(\n => 49.36.141.210\n)\n\n => Array\n(\n => 5.62.63.218\n)\n\n => Array\n(\n => 39.59.9.18\n)\n\n => Array\n(\n => 111.88.86.45\n)\n\n => Array\n(\n => 178.54.139.5\n)\n\n => Array\n(\n => 116.68.105.241\n)\n\n => Array\n(\n => 119.160.96.187\n)\n\n => Array\n(\n => 182.189.192.103\n)\n\n => Array\n(\n => 119.160.96.143\n)\n\n => Array\n(\n => 110.225.89.98\n)\n\n => Array\n(\n => 169.149.195.134\n)\n\n => Array\n(\n => 103.238.104.54\n)\n\n => Array\n(\n => 47.30.208.142\n)\n\n => Array\n(\n => 157.46.179.209\n)\n\n => Array\n(\n => 223.235.38.119\n)\n\n => Array\n(\n => 42.106.180.165\n)\n\n => Array\n(\n => 154.122.240.239\n)\n\n => Array\n(\n => 106.223.104.191\n)\n\n => Array\n(\n => 111.93.110.218\n)\n\n => Array\n(\n => 182.183.161.171\n)\n\n => Array\n(\n => 157.44.184.211\n)\n\n => Array\n(\n => 157.50.185.193\n)\n\n => Array\n(\n => 117.230.19.194\n)\n\n => Array\n(\n => 162.243.246.160\n)\n\n => Array\n(\n => 106.223.143.53\n)\n\n => Array\n(\n => 39.59.41.15\n)\n\n => Array\n(\n => 106.210.65.42\n)\n\n => Array\n(\n => 180.243.144.208\n)\n\n => Array\n(\n => 116.68.105.22\n)\n\n => Array\n(\n => 115.42.70.46\n)\n\n => Array\n(\n => 99.72.192.148\n)\n\n => Array\n(\n => 182.183.182.48\n)\n\n => Array\n(\n => 171.48.58.97\n)\n\n => Array\n(\n => 37.120.131.188\n)\n\n => Array\n(\n => 117.99.167.177\n)\n\n => Array\n(\n => 111.92.76.210\n)\n\n => Array\n(\n => 14.192.144.245\n)\n\n => Array\n(\n => 169.149.242.87\n)\n\n => Array\n(\n => 47.30.198.149\n)\n\n => Array\n(\n => 59.103.57.140\n)\n\n => Array\n(\n => 117.230.161.168\n)\n\n => Array\n(\n => 110.225.88.173\n)\n\n => Array\n(\n => 169.149.246.95\n)\n\n => Array\n(\n => 42.106.180.52\n)\n\n => Array\n(\n => 14.231.160.157\n)\n\n => Array\n(\n => 123.27.109.47\n)\n\n => Array\n(\n => 157.46.130.54\n)\n\n => Array\n(\n => 39.42.73.194\n)\n\n => Array\n(\n => 117.230.18.147\n)\n\n => Array\n(\n => 27.59.231.98\n)\n\n => Array\n(\n => 125.209.78.227\n)\n\n => Array\n(\n => 157.34.80.145\n)\n\n => Array\n(\n => 42.201.251.86\n)\n\n => Array\n(\n => 117.230.129.158\n)\n\n => Array\n(\n => 103.82.80.103\n)\n\n => Array\n(\n => 47.9.171.228\n)\n\n => Array\n(\n => 117.230.24.92\n)\n\n => Array\n(\n => 103.129.143.119\n)\n\n => Array\n(\n => 39.40.213.45\n)\n\n => Array\n(\n => 178.92.188.214\n)\n\n => Array\n(\n => 110.235.232.191\n)\n\n => Array\n(\n => 5.62.34.18\n)\n\n => Array\n(\n => 47.30.212.134\n)\n\n => Array\n(\n => 157.42.34.196\n)\n\n => Array\n(\n => 157.32.169.9\n)\n\n => Array\n(\n => 103.255.4.11\n)\n\n => Array\n(\n => 117.230.13.69\n)\n\n => Array\n(\n => 117.230.58.97\n)\n\n => Array\n(\n => 92.52.138.39\n)\n\n => Array\n(\n => 221.132.119.63\n)\n\n => Array\n(\n => 117.97.167.188\n)\n\n => Array\n(\n => 119.153.56.58\n)\n\n => Array\n(\n => 105.50.22.150\n)\n\n => Array\n(\n => 115.42.68.126\n)\n\n => Array\n(\n => 182.189.223.159\n)\n\n => Array\n(\n => 39.59.36.90\n)\n\n => Array\n(\n => 111.92.76.114\n)\n\n => Array\n(\n => 157.47.226.163\n)\n\n => Array\n(\n => 202.47.44.37\n)\n\n => Array\n(\n => 106.51.234.172\n)\n\n => Array\n(\n => 103.101.88.166\n)\n\n => Array\n(\n => 27.6.246.146\n)\n\n => Array\n(\n => 103.255.5.83\n)\n\n => Array\n(\n => 103.98.210.185\n)\n\n => Array\n(\n => 122.173.114.134\n)\n\n => Array\n(\n => 122.173.77.248\n)\n\n => Array\n(\n => 5.62.41.172\n)\n\n => Array\n(\n => 180.178.181.17\n)\n\n => Array\n(\n => 37.120.133.224\n)\n\n => Array\n(\n => 45.131.5.156\n)\n\n => Array\n(\n => 110.39.100.110\n)\n\n => Array\n(\n => 176.110.38.185\n)\n\n => Array\n(\n => 36.255.41.64\n)\n\n => Array\n(\n => 103.104.192.15\n)\n\n => Array\n(\n => 43.245.131.195\n)\n\n => Array\n(\n => 14.248.111.185\n)\n\n => Array\n(\n => 122.173.217.133\n)\n\n => Array\n(\n => 106.223.90.245\n)\n\n => Array\n(\n => 119.153.56.80\n)\n\n => Array\n(\n => 103.7.60.172\n)\n\n => Array\n(\n => 157.46.184.233\n)\n\n => Array\n(\n => 182.190.31.95\n)\n\n => Array\n(\n => 109.87.189.122\n)\n\n => Array\n(\n => 91.74.25.100\n)\n\n => Array\n(\n => 182.185.224.144\n)\n\n => Array\n(\n => 106.223.91.221\n)\n\n => Array\n(\n => 182.190.223.40\n)\n\n => Array\n(\n => 2.58.194.134\n)\n\n => Array\n(\n => 196.246.225.236\n)\n\n => Array\n(\n => 106.223.90.173\n)\n\n => Array\n(\n => 23.239.16.54\n)\n\n => Array\n(\n => 157.46.65.225\n)\n\n => Array\n(\n => 115.186.130.14\n)\n\n => Array\n(\n => 103.85.125.157\n)\n\n => Array\n(\n => 14.248.103.6\n)\n\n => Array\n(\n => 123.24.169.247\n)\n\n => Array\n(\n => 103.130.108.153\n)\n\n => Array\n(\n => 115.42.67.21\n)\n\n => Array\n(\n => 202.166.171.190\n)\n\n => Array\n(\n => 39.37.169.104\n)\n\n => Array\n(\n => 103.82.80.59\n)\n\n => Array\n(\n => 175.107.208.58\n)\n\n => Array\n(\n => 203.192.238.247\n)\n\n => Array\n(\n => 103.217.178.150\n)\n\n => Array\n(\n => 103.66.214.173\n)\n\n => Array\n(\n => 110.93.236.174\n)\n\n => Array\n(\n => 143.189.242.64\n)\n\n => Array\n(\n => 77.111.245.12\n)\n\n => Array\n(\n => 145.239.2.231\n)\n\n => Array\n(\n => 115.186.190.38\n)\n\n => Array\n(\n => 109.169.23.67\n)\n\n => Array\n(\n => 198.16.70.29\n)\n\n => Array\n(\n => 111.92.76.186\n)\n\n => Array\n(\n => 115.42.69.34\n)\n\n => Array\n(\n => 73.61.100.95\n)\n\n => Array\n(\n => 103.129.142.31\n)\n\n => Array\n(\n => 103.255.5.53\n)\n\n => Array\n(\n => 103.76.55.2\n)\n\n => Array\n(\n => 47.9.141.138\n)\n\n => Array\n(\n => 103.55.89.234\n)\n\n => Array\n(\n => 103.223.13.53\n)\n\n => Array\n(\n => 175.158.50.203\n)\n\n => Array\n(\n => 103.255.5.90\n)\n\n => Array\n(\n => 106.223.100.138\n)\n\n => Array\n(\n => 39.37.143.193\n)\n\n => Array\n(\n => 206.189.133.131\n)\n\n => Array\n(\n => 43.224.0.233\n)\n\n => Array\n(\n => 115.186.132.106\n)\n\n => Array\n(\n => 31.43.21.159\n)\n\n => Array\n(\n => 119.155.56.131\n)\n\n => Array\n(\n => 103.82.80.138\n)\n\n => Array\n(\n => 24.87.128.119\n)\n\n => Array\n(\n => 106.210.103.163\n)\n\n => Array\n(\n => 103.82.80.90\n)\n\n => Array\n(\n => 157.46.186.45\n)\n\n => Array\n(\n => 157.44.155.238\n)\n\n => Array\n(\n => 103.119.199.2\n)\n\n => Array\n(\n => 27.97.169.205\n)\n\n => Array\n(\n => 157.46.174.89\n)\n\n => Array\n(\n => 43.250.58.220\n)\n\n => Array\n(\n => 76.189.186.64\n)\n\n => Array\n(\n => 103.255.5.57\n)\n\n => Array\n(\n => 171.61.196.136\n)\n\n => Array\n(\n => 202.47.40.88\n)\n\n => Array\n(\n => 97.118.94.116\n)\n\n => Array\n(\n => 157.44.124.157\n)\n\n => Array\n(\n => 95.142.120.13\n)\n\n => Array\n(\n => 42.201.229.151\n)\n\n => Array\n(\n => 157.46.178.95\n)\n\n => Array\n(\n => 169.149.215.192\n)\n\n => Array\n(\n => 42.111.19.48\n)\n\n => Array\n(\n => 1.38.52.18\n)\n\n => Array\n(\n => 145.239.91.241\n)\n\n => Array\n(\n => 47.31.78.191\n)\n\n => Array\n(\n => 103.77.42.60\n)\n\n => Array\n(\n => 157.46.107.144\n)\n\n => Array\n(\n => 157.46.125.124\n)\n\n => Array\n(\n => 110.225.218.108\n)\n\n => Array\n(\n => 106.51.77.185\n)\n\n => Array\n(\n => 123.24.161.207\n)\n\n => Array\n(\n => 106.210.108.22\n)\n\n => Array\n(\n => 42.111.10.14\n)\n\n => Array\n(\n => 223.29.231.175\n)\n\n => Array\n(\n => 27.56.152.132\n)\n\n => Array\n(\n => 119.155.31.100\n)\n\n => Array\n(\n => 122.173.172.127\n)\n\n => Array\n(\n => 103.77.42.64\n)\n\n => Array\n(\n => 157.44.164.106\n)\n\n => Array\n(\n => 14.181.53.38\n)\n\n => Array\n(\n => 115.42.67.64\n)\n\n => Array\n(\n => 47.31.33.140\n)\n\n => Array\n(\n => 103.15.60.234\n)\n\n => Array\n(\n => 182.64.219.181\n)\n\n => Array\n(\n => 103.44.51.6\n)\n\n => Array\n(\n => 116.74.25.157\n)\n\n => Array\n(\n => 116.71.2.128\n)\n\n => Array\n(\n => 157.32.185.239\n)\n\n => Array\n(\n => 47.31.25.79\n)\n\n => Array\n(\n => 178.62.85.75\n)\n\n => Array\n(\n => 180.178.190.39\n)\n\n => Array\n(\n => 39.48.52.179\n)\n\n => Array\n(\n => 106.193.11.240\n)\n\n => Array\n(\n => 103.82.80.226\n)\n\n => Array\n(\n => 49.206.126.30\n)\n\n => Array\n(\n => 157.245.191.173\n)\n\n => Array\n(\n => 49.205.84.237\n)\n\n => Array\n(\n => 47.8.181.232\n)\n\n => Array\n(\n => 182.66.2.92\n)\n\n => Array\n(\n => 49.34.137.220\n)\n\n => Array\n(\n => 209.205.217.125\n)\n\n => Array\n(\n => 192.64.5.73\n)\n\n => Array\n(\n => 27.63.166.108\n)\n\n => Array\n(\n => 120.29.96.211\n)\n\n => Array\n(\n => 182.186.112.135\n)\n\n => Array\n(\n => 45.118.165.151\n)\n\n => Array\n(\n => 47.8.228.12\n)\n\n => Array\n(\n => 106.215.3.162\n)\n\n => Array\n(\n => 111.92.72.66\n)\n\n => Array\n(\n => 169.145.2.9\n)\n\n => Array\n(\n => 106.207.205.100\n)\n\n => Array\n(\n => 223.181.8.12\n)\n\n => Array\n(\n => 157.48.149.78\n)\n\n => Array\n(\n => 103.206.138.116\n)\n\n => Array\n(\n => 39.53.119.22\n)\n\n => Array\n(\n => 157.33.232.106\n)\n\n => Array\n(\n => 49.37.205.139\n)\n\n => Array\n(\n => 115.42.68.3\n)\n\n => Array\n(\n => 93.72.182.251\n)\n\n => Array\n(\n => 202.142.166.22\n)\n\n => Array\n(\n => 157.119.81.111\n)\n\n => Array\n(\n => 182.186.116.155\n)\n\n => Array\n(\n => 157.37.171.37\n)\n\n => Array\n(\n => 117.206.164.48\n)\n\n => Array\n(\n => 49.36.52.63\n)\n\n => Array\n(\n => 203.175.72.112\n)\n\n => Array\n(\n => 171.61.132.193\n)\n\n => Array\n(\n => 111.119.187.44\n)\n\n => Array\n(\n => 39.37.165.216\n)\n\n => Array\n(\n => 103.86.109.58\n)\n\n => Array\n(\n => 39.59.2.86\n)\n\n => Array\n(\n => 111.119.187.28\n)\n\n => Array\n(\n => 106.201.9.10\n)\n\n => Array\n(\n => 49.35.25.106\n)\n\n => Array\n(\n => 157.49.239.103\n)\n\n => Array\n(\n => 157.49.237.198\n)\n\n => Array\n(\n => 14.248.64.121\n)\n\n => Array\n(\n => 117.102.7.214\n)\n\n => Array\n(\n => 120.29.91.246\n)\n\n => Array\n(\n => 103.7.79.41\n)\n\n => Array\n(\n => 132.154.99.209\n)\n\n => Array\n(\n => 212.36.27.245\n)\n\n => Array\n(\n => 157.44.154.9\n)\n\n => Array\n(\n => 47.31.56.44\n)\n\n => Array\n(\n => 192.142.199.136\n)\n\n => Array\n(\n => 171.61.159.49\n)\n\n => Array\n(\n => 119.160.116.151\n)\n\n => Array\n(\n => 103.98.63.39\n)\n\n => Array\n(\n => 41.60.233.216\n)\n\n => Array\n(\n => 49.36.75.212\n)\n\n => Array\n(\n => 223.188.60.20\n)\n\n => Array\n(\n => 103.98.63.50\n)\n\n => Array\n(\n => 178.162.198.21\n)\n\n => Array\n(\n => 157.46.209.35\n)\n\n => Array\n(\n => 119.155.32.151\n)\n\n => Array\n(\n => 102.185.58.161\n)\n\n => Array\n(\n => 59.96.89.231\n)\n\n => Array\n(\n => 119.155.255.198\n)\n\n => Array\n(\n => 42.107.204.57\n)\n\n => Array\n(\n => 42.106.181.74\n)\n\n => Array\n(\n => 157.46.219.186\n)\n\n => Array\n(\n => 115.42.71.49\n)\n\n => Array\n(\n => 157.46.209.131\n)\n\n => Array\n(\n => 220.81.15.94\n)\n\n => Array\n(\n => 111.119.187.24\n)\n\n => Array\n(\n => 49.37.195.185\n)\n\n => Array\n(\n => 42.106.181.85\n)\n\n => Array\n(\n => 43.249.225.134\n)\n\n => Array\n(\n => 117.206.165.151\n)\n\n => Array\n(\n => 119.153.48.250\n)\n\n => Array\n(\n => 27.4.172.162\n)\n\n => Array\n(\n => 117.20.29.51\n)\n\n => Array\n(\n => 103.98.63.135\n)\n\n => Array\n(\n => 117.7.218.229\n)\n\n => Array\n(\n => 157.49.233.105\n)\n\n => Array\n(\n => 39.53.151.199\n)\n\n => Array\n(\n => 101.255.118.33\n)\n\n => Array\n(\n => 41.141.246.9\n)\n\n => Array\n(\n => 221.132.113.78\n)\n\n => Array\n(\n => 119.160.116.202\n)\n\n => Array\n(\n => 117.237.193.244\n)\n\n => Array\n(\n => 157.41.110.145\n)\n\n => Array\n(\n => 103.98.63.5\n)\n\n => Array\n(\n => 103.125.129.58\n)\n\n => Array\n(\n => 183.83.254.66\n)\n\n => Array\n(\n => 45.135.236.160\n)\n\n => Array\n(\n => 198.199.87.124\n)\n\n => Array\n(\n => 193.176.86.41\n)\n\n => Array\n(\n => 115.97.142.98\n)\n\n => Array\n(\n => 222.252.38.198\n)\n\n => Array\n(\n => 110.93.237.49\n)\n\n => Array\n(\n => 103.224.48.122\n)\n\n => Array\n(\n => 110.38.28.130\n)\n\n => Array\n(\n => 106.211.238.154\n)\n\n => Array\n(\n => 111.88.41.73\n)\n\n => Array\n(\n => 119.155.13.143\n)\n\n => Array\n(\n => 103.213.111.60\n)\n\n => Array\n(\n => 202.0.103.42\n)\n\n => Array\n(\n => 157.48.144.33\n)\n\n => Array\n(\n => 111.119.187.62\n)\n\n => Array\n(\n => 103.87.212.71\n)\n\n => Array\n(\n => 157.37.177.20\n)\n\n => Array\n(\n => 223.233.71.92\n)\n\n => Array\n(\n => 116.213.32.107\n)\n\n => Array\n(\n => 104.248.173.151\n)\n\n => Array\n(\n => 14.181.102.222\n)\n\n => Array\n(\n => 103.10.224.252\n)\n\n => Array\n(\n => 175.158.50.57\n)\n\n => Array\n(\n => 165.22.122.199\n)\n\n => Array\n(\n => 23.106.56.12\n)\n\n => Array\n(\n => 203.122.10.146\n)\n\n => Array\n(\n => 37.111.136.138\n)\n\n => Array\n(\n => 103.87.193.66\n)\n\n => Array\n(\n => 39.59.122.246\n)\n\n => Array\n(\n => 111.119.183.63\n)\n\n => Array\n(\n => 157.46.72.102\n)\n\n => Array\n(\n => 185.132.133.82\n)\n\n => Array\n(\n => 118.103.230.148\n)\n\n => Array\n(\n => 5.62.39.45\n)\n\n => Array\n(\n => 119.152.144.134\n)\n\n => Array\n(\n => 172.105.117.102\n)\n\n => Array\n(\n => 122.254.70.212\n)\n\n => Array\n(\n => 102.185.128.97\n)\n\n => Array\n(\n => 182.69.249.11\n)\n\n => Array\n(\n => 105.163.134.167\n)\n\n => Array\n(\n => 111.119.187.38\n)\n\n => Array\n(\n => 103.46.195.93\n)\n\n => Array\n(\n => 106.204.161.156\n)\n\n => Array\n(\n => 122.176.2.175\n)\n\n => Array\n(\n => 117.99.162.31\n)\n\n => Array\n(\n => 106.212.241.242\n)\n\n => Array\n(\n => 42.107.196.149\n)\n\n => Array\n(\n => 212.90.60.57\n)\n\n => Array\n(\n => 175.107.237.12\n)\n\n => Array\n(\n => 157.46.119.152\n)\n\n => Array\n(\n => 157.34.81.12\n)\n\n => Array\n(\n => 162.243.1.22\n)\n\n => Array\n(\n => 110.37.222.178\n)\n\n => Array\n(\n => 103.46.195.68\n)\n\n => Array\n(\n => 119.160.116.81\n)\n\n => Array\n(\n => 138.197.131.28\n)\n\n => Array\n(\n => 103.88.218.124\n)\n\n => Array\n(\n => 192.241.172.113\n)\n\n => Array\n(\n => 110.39.174.106\n)\n\n => Array\n(\n => 111.88.48.17\n)\n\n => Array\n(\n => 42.108.160.218\n)\n\n => Array\n(\n => 117.102.0.16\n)\n\n => Array\n(\n => 157.46.125.235\n)\n\n => Array\n(\n => 14.190.242.251\n)\n\n => Array\n(\n => 47.31.184.64\n)\n\n => Array\n(\n => 49.205.84.157\n)\n\n => Array\n(\n => 122.162.115.247\n)\n\n => Array\n(\n => 41.202.219.74\n)\n\n => Array\n(\n => 106.215.9.67\n)\n\n => Array\n(\n => 103.87.56.208\n)\n\n => Array\n(\n => 103.46.194.147\n)\n\n => Array\n(\n => 116.90.98.81\n)\n\n => Array\n(\n => 115.42.71.213\n)\n\n => Array\n(\n => 39.49.35.192\n)\n\n => Array\n(\n => 41.202.219.65\n)\n\n => Array\n(\n => 131.212.249.93\n)\n\n => Array\n(\n => 49.205.16.251\n)\n\n => Array\n(\n => 39.34.147.250\n)\n\n => Array\n(\n => 183.83.210.185\n)\n\n => Array\n(\n => 49.37.194.215\n)\n\n => Array\n(\n => 103.46.194.108\n)\n\n => Array\n(\n => 89.36.219.233\n)\n\n => Array\n(\n => 119.152.105.178\n)\n\n => Array\n(\n => 202.47.45.125\n)\n\n => Array\n(\n => 156.146.59.27\n)\n\n => Array\n(\n => 132.154.21.156\n)\n\n => Array\n(\n => 157.44.35.31\n)\n\n => Array\n(\n => 41.80.118.124\n)\n\n => Array\n(\n => 47.31.159.198\n)\n\n => Array\n(\n => 103.209.223.140\n)\n\n => Array\n(\n => 157.46.130.138\n)\n\n => Array\n(\n => 49.37.199.246\n)\n\n => Array\n(\n => 111.88.242.10\n)\n\n => Array\n(\n => 43.241.145.110\n)\n\n => Array\n(\n => 124.153.16.30\n)\n\n => Array\n(\n => 27.5.22.173\n)\n\n => Array\n(\n => 111.88.191.173\n)\n\n => Array\n(\n => 41.60.236.200\n)\n\n => Array\n(\n => 115.42.67.146\n)\n\n => Array\n(\n => 150.242.173.7\n)\n\n => Array\n(\n => 14.248.71.23\n)\n\n => Array\n(\n => 111.119.187.4\n)\n\n => Array\n(\n => 124.29.212.118\n)\n\n => Array\n(\n => 51.68.205.163\n)\n\n => Array\n(\n => 182.184.107.63\n)\n\n => Array\n(\n => 106.211.253.87\n)\n\n => Array\n(\n => 223.190.89.5\n)\n\n => Array\n(\n => 183.83.212.63\n)\n\n => Array\n(\n => 129.205.113.227\n)\n\n => Array\n(\n => 106.210.40.141\n)\n\n => Array\n(\n => 91.202.163.169\n)\n\n => Array\n(\n => 76.105.191.89\n)\n\n => Array\n(\n => 171.51.244.160\n)\n\n => Array\n(\n => 37.139.188.92\n)\n\n => Array\n(\n => 23.106.56.37\n)\n\n => Array\n(\n => 157.44.175.180\n)\n\n => Array\n(\n => 122.2.122.97\n)\n\n => Array\n(\n => 103.87.192.194\n)\n\n => Array\n(\n => 192.154.253.6\n)\n\n => Array\n(\n => 77.243.191.19\n)\n\n => Array\n(\n => 122.254.70.46\n)\n\n => Array\n(\n => 154.76.233.73\n)\n\n => Array\n(\n => 195.181.167.150\n)\n\n => Array\n(\n => 209.209.228.5\n)\n\n => Array\n(\n => 203.192.212.115\n)\n\n => Array\n(\n => 221.132.118.179\n)\n\n => Array\n(\n => 117.208.210.204\n)\n\n => Array\n(\n => 120.29.90.126\n)\n\n => Array\n(\n => 36.77.239.190\n)\n\n => Array\n(\n => 157.37.137.127\n)\n\n => Array\n(\n => 39.40.243.6\n)\n\n => Array\n(\n => 182.182.41.201\n)\n\n => Array\n(\n => 39.59.32.46\n)\n\n => Array\n(\n => 111.119.183.36\n)\n\n => Array\n(\n => 103.83.147.61\n)\n\n => Array\n(\n => 103.82.80.85\n)\n\n => Array\n(\n => 103.46.194.161\n)\n\n => Array\n(\n => 101.50.105.38\n)\n\n => Array\n(\n => 111.119.183.58\n)\n\n => Array\n(\n => 47.9.234.51\n)\n\n => Array\n(\n => 120.29.86.157\n)\n\n => Array\n(\n => 175.158.50.70\n)\n\n => Array\n(\n => 112.196.163.235\n)\n\n => Array\n(\n => 139.167.161.85\n)\n\n => Array\n(\n => 106.207.39.181\n)\n\n => Array\n(\n => 103.77.42.159\n)\n\n => Array\n(\n => 185.56.138.220\n)\n\n => Array\n(\n => 119.155.33.205\n)\n\n => Array\n(\n => 157.42.117.124\n)\n\n => Array\n(\n => 103.117.202.202\n)\n\n => Array\n(\n => 220.253.101.109\n)\n\n => Array\n(\n => 49.37.7.247\n)\n\n => Array\n(\n => 119.160.65.27\n)\n\n => Array\n(\n => 114.122.21.151\n)\n\n => Array\n(\n => 157.44.141.83\n)\n\n => Array\n(\n => 103.131.9.7\n)\n\n => Array\n(\n => 125.99.222.21\n)\n\n => Array\n(\n => 103.238.104.206\n)\n\n => Array\n(\n => 110.93.227.100\n)\n\n => Array\n(\n => 49.14.119.114\n)\n\n => Array\n(\n => 115.186.189.82\n)\n\n => Array\n(\n => 106.201.194.2\n)\n\n => Array\n(\n => 106.204.227.28\n)\n\n => Array\n(\n => 47.31.206.13\n)\n\n => Array\n(\n => 39.42.144.109\n)\n\n => Array\n(\n => 14.253.254.90\n)\n\n => Array\n(\n => 157.44.142.118\n)\n\n => Array\n(\n => 192.142.176.21\n)\n\n => Array\n(\n => 103.217.178.225\n)\n\n => Array\n(\n => 106.78.78.16\n)\n\n => Array\n(\n => 167.71.63.184\n)\n\n => Array\n(\n => 207.244.71.82\n)\n\n => Array\n(\n => 71.105.25.145\n)\n\n => Array\n(\n => 39.51.250.30\n)\n\n => Array\n(\n => 157.41.120.160\n)\n\n => Array\n(\n => 39.37.137.81\n)\n\n => Array\n(\n => 41.80.237.27\n)\n\n => Array\n(\n => 111.119.187.50\n)\n\n => Array\n(\n => 49.145.224.252\n)\n\n => Array\n(\n => 106.197.28.106\n)\n\n => Array\n(\n => 103.217.178.240\n)\n\n => Array\n(\n => 27.97.182.237\n)\n\n => Array\n(\n => 106.211.253.72\n)\n\n => Array\n(\n => 119.152.154.172\n)\n\n => Array\n(\n => 103.255.151.148\n)\n\n => Array\n(\n => 154.157.80.12\n)\n\n => Array\n(\n => 156.146.59.28\n)\n\n => Array\n(\n => 171.61.211.64\n)\n\n => Array\n(\n => 27.76.59.22\n)\n\n => Array\n(\n => 167.99.92.124\n)\n\n => Array\n(\n => 132.154.94.51\n)\n\n => Array\n(\n => 111.119.183.38\n)\n\n => Array\n(\n => 115.42.70.169\n)\n\n => Array\n(\n => 109.169.23.83\n)\n\n => Array\n(\n => 157.46.213.64\n)\n\n => Array\n(\n => 39.37.179.171\n)\n\n => Array\n(\n => 14.232.233.32\n)\n\n => Array\n(\n => 157.49.226.13\n)\n\n => Array\n(\n => 185.209.178.78\n)\n\n => Array\n(\n => 222.252.46.230\n)\n\n => Array\n(\n => 139.5.255.168\n)\n\n => Array\n(\n => 202.8.118.12\n)\n\n => Array\n(\n => 39.53.205.63\n)\n\n => Array\n(\n => 157.37.167.227\n)\n\n => Array\n(\n => 157.49.237.121\n)\n\n => Array\n(\n => 208.89.99.6\n)\n\n => Array\n(\n => 111.119.187.33\n)\n\n => Array\n(\n => 39.37.132.101\n)\n\n => Array\n(\n => 72.255.61.15\n)\n\n => Array\n(\n => 157.41.69.126\n)\n\n => Array\n(\n => 27.6.193.15\n)\n\n => Array\n(\n => 157.41.104.8\n)\n\n => Array\n(\n => 157.41.97.162\n)\n\n => Array\n(\n => 95.136.91.67\n)\n\n => Array\n(\n => 110.93.209.138\n)\n\n => Array\n(\n => 119.152.154.82\n)\n\n => Array\n(\n => 111.88.239.223\n)\n\n => Array\n(\n => 157.230.62.100\n)\n\n => Array\n(\n => 37.111.136.167\n)\n\n => Array\n(\n => 139.167.162.65\n)\n\n => Array\n(\n => 120.29.72.72\n)\n\n => Array\n(\n => 39.42.169.69\n)\n\n => Array\n(\n => 157.49.247.12\n)\n\n => Array\n(\n => 43.231.58.221\n)\n\n => Array\n(\n => 111.88.229.18\n)\n\n => Array\n(\n => 171.79.185.198\n)\n\n => Array\n(\n => 169.149.193.102\n)\n\n => Array\n(\n => 207.244.89.162\n)\n\n => Array\n(\n => 27.4.217.129\n)\n\n => Array\n(\n => 91.236.184.12\n)\n\n => Array\n(\n => 14.192.154.150\n)\n\n => Array\n(\n => 167.172.55.253\n)\n\n => Array\n(\n => 103.77.42.192\n)\n\n => Array\n(\n => 39.59.122.140\n)\n\n => Array\n(\n => 41.80.84.46\n)\n\n => Array\n(\n => 202.47.52.115\n)\n\n => Array\n(\n => 222.252.43.47\n)\n\n => Array\n(\n => 119.155.37.250\n)\n\n => Array\n(\n => 157.41.18.88\n)\n\n => Array\n(\n => 39.42.8.59\n)\n\n => Array\n(\n => 39.45.162.110\n)\n\n => Array\n(\n => 111.88.237.25\n)\n\n => Array\n(\n => 103.76.211.168\n)\n\n => Array\n(\n => 178.137.114.165\n)\n\n => Array\n(\n => 43.225.74.146\n)\n\n => Array\n(\n => 157.42.25.26\n)\n\n => Array\n(\n => 137.59.146.63\n)\n\n => Array\n(\n => 119.160.117.190\n)\n\n => Array\n(\n => 1.186.181.133\n)\n\n => Array\n(\n => 39.42.145.94\n)\n\n => Array\n(\n => 203.175.73.96\n)\n\n => Array\n(\n => 39.37.160.14\n)\n\n => Array\n(\n => 157.39.123.250\n)\n\n => Array\n(\n => 95.135.57.82\n)\n\n => Array\n(\n => 162.210.194.35\n)\n\n => Array\n(\n => 39.42.153.135\n)\n\n => Array\n(\n => 118.103.230.106\n)\n\n => Array\n(\n => 108.61.39.115\n)\n\n => Array\n(\n => 102.7.108.45\n)\n\n => Array\n(\n => 183.83.138.134\n)\n\n => Array\n(\n => 115.186.70.223\n)\n\n => Array\n(\n => 157.34.17.139\n)\n\n => Array\n(\n => 122.166.158.231\n)\n\n => Array\n(\n => 43.227.135.90\n)\n\n => Array\n(\n => 182.68.46.180\n)\n\n => Array\n(\n => 223.225.28.138\n)\n\n => Array\n(\n => 103.77.42.220\n)\n\n => Array\n(\n => 192.241.219.13\n)\n\n => Array\n(\n => 103.82.80.113\n)\n\n => Array\n(\n => 42.111.243.151\n)\n\n => Array\n(\n => 171.79.189.247\n)\n\n => Array\n(\n => 157.32.132.102\n)\n\n => Array\n(\n => 103.130.105.243\n)\n\n => Array\n(\n => 117.223.98.120\n)\n\n => Array\n(\n => 106.215.197.187\n)\n\n => Array\n(\n => 182.190.194.179\n)\n\n => Array\n(\n => 223.225.29.42\n)\n\n => Array\n(\n => 117.222.94.151\n)\n\n => Array\n(\n => 182.185.199.104\n)\n\n => Array\n(\n => 49.36.145.77\n)\n\n => Array\n(\n => 103.82.80.73\n)\n\n => Array\n(\n => 103.77.16.13\n)\n\n => Array\n(\n => 221.132.118.86\n)\n\n => Array\n(\n => 202.47.45.77\n)\n\n => Array\n(\n => 202.8.118.116\n)\n\n => Array\n(\n => 42.106.180.185\n)\n\n => Array\n(\n => 203.122.8.234\n)\n\n => Array\n(\n => 88.230.104.245\n)\n\n => Array\n(\n => 103.131.9.33\n)\n\n => Array\n(\n => 117.207.209.60\n)\n\n => Array\n(\n => 42.111.253.227\n)\n\n => Array\n(\n => 23.106.56.54\n)\n\n => Array\n(\n => 122.178.143.181\n)\n\n => Array\n(\n => 111.88.180.5\n)\n\n => Array\n(\n => 174.55.224.161\n)\n\n => Array\n(\n => 49.205.87.100\n)\n\n => Array\n(\n => 49.34.183.118\n)\n\n => Array\n(\n => 124.155.255.154\n)\n\n => Array\n(\n => 106.212.135.200\n)\n\n => Array\n(\n => 139.99.159.11\n)\n\n => Array\n(\n => 45.135.229.8\n)\n\n => Array\n(\n => 88.230.106.85\n)\n\n => Array\n(\n => 91.153.145.221\n)\n\n => Array\n(\n => 103.95.83.33\n)\n\n => Array\n(\n => 122.178.116.76\n)\n\n => Array\n(\n => 103.135.78.14\n)\n\n => Array\n(\n => 111.88.233.206\n)\n\n => Array\n(\n => 192.140.153.210\n)\n\n => Array\n(\n => 202.8.118.69\n)\n\n => Array\n(\n => 103.83.130.81\n)\n\n => Array\n(\n => 182.190.213.143\n)\n\n => Array\n(\n => 198.16.74.204\n)\n\n => Array\n(\n => 101.128.117.248\n)\n\n => Array\n(\n => 103.108.5.147\n)\n\n => Array\n(\n => 157.32.130.158\n)\n\n => Array\n(\n => 103.244.172.93\n)\n\n => Array\n(\n => 47.30.140.126\n)\n\n => Array\n(\n => 223.188.40.124\n)\n\n => Array\n(\n => 157.44.191.102\n)\n\n => Array\n(\n => 41.60.237.62\n)\n\n => Array\n(\n => 47.31.228.161\n)\n\n => Array\n(\n => 137.59.217.188\n)\n\n => Array\n(\n => 39.53.220.237\n)\n\n => Array\n(\n => 45.127.45.199\n)\n\n => Array\n(\n => 14.190.71.19\n)\n\n => Array\n(\n => 47.18.205.54\n)\n\n => Array\n(\n => 110.93.240.11\n)\n\n => Array\n(\n => 134.209.29.111\n)\n\n => Array\n(\n => 49.36.175.104\n)\n\n => Array\n(\n => 203.192.230.61\n)\n\n => Array\n(\n => 176.10.125.115\n)\n\n => Array\n(\n => 182.18.206.17\n)\n\n => Array\n(\n => 103.87.194.102\n)\n\n => Array\n(\n => 171.79.123.106\n)\n\n => Array\n(\n => 45.116.233.35\n)\n\n => Array\n(\n => 223.190.57.225\n)\n\n => Array\n(\n => 114.125.6.158\n)\n\n => Array\n(\n => 223.179.138.176\n)\n\n => Array\n(\n => 111.119.183.61\n)\n\n => Array\n(\n => 202.8.118.43\n)\n\n => Array\n(\n => 157.51.175.216\n)\n\n => Array\n(\n => 41.60.238.100\n)\n\n => Array\n(\n => 117.207.210.199\n)\n\n => Array\n(\n => 111.119.183.26\n)\n\n => Array\n(\n => 103.252.226.12\n)\n\n => Array\n(\n => 103.221.208.82\n)\n\n => Array\n(\n => 103.82.80.228\n)\n\n => Array\n(\n => 111.119.187.39\n)\n\n => Array\n(\n => 157.51.161.199\n)\n\n => Array\n(\n => 59.96.88.246\n)\n\n => Array\n(\n => 27.4.181.183\n)\n\n => Array\n(\n => 43.225.98.124\n)\n\n => Array\n(\n => 157.51.113.74\n)\n\n => Array\n(\n => 207.244.89.161\n)\n\n => Array\n(\n => 49.37.184.82\n)\n\n => Array\n(\n => 111.119.183.4\n)\n\n => Array\n(\n => 39.42.130.147\n)\n\n => Array\n(\n => 103.152.101.2\n)\n\n => Array\n(\n => 111.119.183.2\n)\n\n => Array\n(\n => 157.51.171.149\n)\n\n => Array\n(\n => 103.82.80.245\n)\n\n => Array\n(\n => 175.107.207.133\n)\n\n => Array\n(\n => 103.204.169.158\n)\n\n => Array\n(\n => 157.51.181.12\n)\n\n => Array\n(\n => 195.158.193.212\n)\n\n => Array\n(\n => 204.14.73.85\n)\n\n => Array\n(\n => 39.59.59.31\n)\n\n => Array\n(\n => 45.148.11.82\n)\n\n => Array\n(\n => 157.46.117.250\n)\n\n => Array\n(\n => 157.46.127.170\n)\n\n => Array\n(\n => 77.247.181.165\n)\n\n => Array\n(\n => 111.119.183.54\n)\n\n => Array\n(\n => 41.60.232.183\n)\n\n => Array\n(\n => 157.42.206.174\n)\n\n => Array\n(\n => 196.53.10.246\n)\n\n => Array\n(\n => 27.97.186.131\n)\n\n => Array\n(\n => 103.73.101.134\n)\n\n => Array\n(\n => 111.119.183.35\n)\n\n => Array\n(\n => 202.8.118.111\n)\n\n => Array\n(\n => 103.75.246.207\n)\n\n => Array\n(\n => 47.8.94.225\n)\n\n => Array\n(\n => 106.202.40.83\n)\n\n => Array\n(\n => 117.102.2.0\n)\n\n => Array\n(\n => 156.146.59.11\n)\n\n => Array\n(\n => 223.190.115.125\n)\n\n => Array\n(\n => 169.149.212.232\n)\n\n => Array\n(\n => 39.45.150.127\n)\n\n => Array\n(\n => 45.63.10.204\n)\n\n => Array\n(\n => 27.57.86.46\n)\n\n => Array\n(\n => 103.127.20.138\n)\n\n => Array\n(\n => 223.190.27.26\n)\n\n => Array\n(\n => 49.15.248.78\n)\n\n => Array\n(\n => 130.105.135.103\n)\n\n => Array\n(\n => 47.31.3.239\n)\n\n => Array\n(\n => 185.66.71.8\n)\n\n => Array\n(\n => 103.226.226.198\n)\n\n => Array\n(\n => 39.34.134.16\n)\n\n => Array\n(\n => 95.158.53.120\n)\n\n => Array\n(\n => 45.9.249.246\n)\n\n => Array\n(\n => 223.235.162.157\n)\n\n => Array\n(\n => 37.111.139.23\n)\n\n => Array\n(\n => 49.37.153.47\n)\n\n => Array\n(\n => 103.242.60.205\n)\n\n => Array\n(\n => 185.66.68.18\n)\n\n => Array\n(\n => 162.221.202.138\n)\n\n => Array\n(\n => 202.63.195.29\n)\n\n => Array\n(\n => 112.198.75.226\n)\n\n => Array\n(\n => 46.200.69.233\n)\n\n => Array\n(\n => 103.135.78.30\n)\n\n => Array\n(\n => 119.152.226.9\n)\n\n => Array\n(\n => 167.172.242.50\n)\n\n => Array\n(\n => 49.36.151.31\n)\n\n => Array\n(\n => 111.88.237.156\n)\n\n => Array\n(\n => 103.215.168.1\n)\n\n => Array\n(\n => 107.181.177.137\n)\n\n => Array\n(\n => 157.119.186.202\n)\n\n => Array\n(\n => 37.111.139.106\n)\n\n => Array\n(\n => 182.180.152.198\n)\n\n => Array\n(\n => 43.248.153.72\n)\n\n => Array\n(\n => 64.188.20.84\n)\n\n => Array\n(\n => 103.92.214.11\n)\n\n => Array\n(\n => 182.182.14.148\n)\n\n => Array\n(\n => 116.75.154.119\n)\n\n => Array\n(\n => 37.228.235.94\n)\n\n => Array\n(\n => 197.210.55.43\n)\n\n => Array\n(\n => 45.118.165.153\n)\n\n => Array\n(\n => 122.176.32.27\n)\n\n => Array\n(\n => 106.215.161.20\n)\n\n => Array\n(\n => 152.32.113.58\n)\n\n => Array\n(\n => 111.125.106.132\n)\n\n => Array\n(\n => 212.102.40.72\n)\n\n => Array\n(\n => 2.58.194.140\n)\n\n => Array\n(\n => 122.174.68.115\n)\n\n => Array\n(\n => 117.241.66.56\n)\n\n => Array\n(\n => 71.94.172.140\n)\n\n => Array\n(\n => 103.209.228.139\n)\n\n => Array\n(\n => 43.242.177.140\n)\n\n => Array\n(\n => 38.91.101.66\n)\n\n => Array\n(\n => 103.82.80.67\n)\n\n => Array\n(\n => 117.248.62.138\n)\n\n => Array\n(\n => 103.81.215.51\n)\n\n => Array\n(\n => 103.253.174.4\n)\n\n => Array\n(\n => 202.142.110.111\n)\n\n => Array\n(\n => 162.216.142.1\n)\n\n => Array\n(\n => 58.186.7.252\n)\n\n => Array\n(\n => 113.203.247.66\n)\n\n => Array\n(\n => 111.88.50.63\n)\n\n => Array\n(\n => 182.182.94.227\n)\n\n => Array\n(\n => 49.15.232.50\n)\n\n => Array\n(\n => 182.189.76.225\n)\n\n => Array\n(\n => 139.99.159.14\n)\n\n => Array\n(\n => 163.172.159.235\n)\n\n => Array\n(\n => 157.36.235.241\n)\n\n => Array\n(\n => 111.119.187.3\n)\n\n => Array\n(\n => 103.100.4.61\n)\n\n => Array\n(\n => 192.142.130.88\n)\n\n => Array\n(\n => 43.242.176.114\n)\n\n => Array\n(\n => 180.178.156.165\n)\n\n => Array\n(\n => 182.189.236.77\n)\n\n => Array\n(\n => 49.34.197.239\n)\n\n => Array\n(\n => 157.36.107.107\n)\n\n => Array\n(\n => 103.209.85.175\n)\n\n => Array\n(\n => 203.139.63.83\n)\n\n => Array\n(\n => 43.242.177.161\n)\n\n => Array\n(\n => 182.182.77.138\n)\n\n => Array\n(\n => 114.124.168.117\n)\n\n => Array\n(\n => 124.253.79.191\n)\n\n => Array\n(\n => 192.142.168.235\n)\n\n => Array\n(\n => 14.232.235.111\n)\n\n => Array\n(\n => 152.57.124.214\n)\n\n => Array\n(\n => 123.24.172.48\n)\n\n => Array\n(\n => 43.242.176.87\n)\n\n => Array\n(\n => 43.242.176.101\n)\n\n => Array\n(\n => 49.156.84.110\n)\n\n => Array\n(\n => 58.65.222.6\n)\n\n => Array\n(\n => 157.32.189.112\n)\n\n => Array\n(\n => 47.31.155.87\n)\n\n => Array\n(\n => 39.53.244.182\n)\n\n => Array\n(\n => 39.33.221.76\n)\n\n => Array\n(\n => 161.35.130.245\n)\n\n => Array\n(\n => 152.32.113.137\n)\n\n => Array\n(\n => 192.142.187.220\n)\n\n => Array\n(\n => 185.54.228.123\n)\n\n => Array\n(\n => 103.233.87.221\n)\n\n => Array\n(\n => 223.236.200.224\n)\n\n => Array\n(\n => 27.97.189.170\n)\n\n => Array\n(\n => 103.82.80.212\n)\n\n => Array\n(\n => 43.242.176.37\n)\n\n => Array\n(\n => 49.36.144.94\n)\n\n => Array\n(\n => 180.251.62.185\n)\n\n => Array\n(\n => 39.50.243.227\n)\n\n => Array\n(\n => 124.253.20.21\n)\n\n => Array\n(\n => 41.60.233.31\n)\n\n => Array\n(\n => 103.81.215.57\n)\n\n => Array\n(\n => 185.91.120.16\n)\n\n => Array\n(\n => 182.190.107.163\n)\n\n => Array\n(\n => 222.252.61.68\n)\n\n => Array\n(\n => 109.169.23.78\n)\n\n => Array\n(\n => 39.50.151.222\n)\n\n => Array\n(\n => 43.242.176.86\n)\n\n => Array\n(\n => 178.162.222.161\n)\n\n => Array\n(\n => 37.111.139.158\n)\n\n => Array\n(\n => 39.57.224.97\n)\n\n => Array\n(\n => 39.57.157.194\n)\n\n => Array\n(\n => 111.119.183.48\n)\n\n => Array\n(\n => 180.190.171.129\n)\n\n => Array\n(\n => 39.52.174.177\n)\n\n => Array\n(\n => 43.242.176.103\n)\n\n => Array\n(\n => 124.253.83.14\n)\n\n => Array\n(\n => 182.189.116.245\n)\n\n => Array\n(\n => 157.36.178.213\n)\n\n => Array\n(\n => 45.250.65.119\n)\n\n => Array\n(\n => 103.209.86.6\n)\n\n => Array\n(\n => 43.242.176.80\n)\n\n => Array\n(\n => 137.59.147.2\n)\n\n => Array\n(\n => 117.222.95.23\n)\n\n => Array\n(\n => 124.253.81.10\n)\n\n => Array\n(\n => 43.242.177.21\n)\n\n => Array\n(\n => 182.189.224.186\n)\n\n => Array\n(\n => 39.52.178.142\n)\n\n => Array\n(\n => 106.214.29.176\n)\n\n => Array\n(\n => 111.88.145.107\n)\n\n => Array\n(\n => 49.36.142.67\n)\n\n => Array\n(\n => 202.142.65.50\n)\n\n => Array\n(\n => 1.22.186.76\n)\n\n => Array\n(\n => 103.131.8.225\n)\n\n => Array\n(\n => 39.53.212.111\n)\n\n => Array\n(\n => 103.82.80.149\n)\n\n => Array\n(\n => 43.242.176.12\n)\n\n => Array\n(\n => 103.109.13.189\n)\n\n => Array\n(\n => 124.253.206.202\n)\n\n => Array\n(\n => 117.195.115.85\n)\n\n => Array\n(\n => 49.36.245.229\n)\n\n => Array\n(\n => 42.118.8.100\n)\n\n => Array\n(\n => 1.22.73.17\n)\n\n => Array\n(\n => 157.36.166.131\n)\n\n => Array\n(\n => 182.182.38.223\n)\n\n => Array\n(\n => 49.14.150.21\n)\n\n => Array\n(\n => 43.242.176.89\n)\n\n => Array\n(\n => 157.46.185.69\n)\n\n => Array\n(\n => 103.31.92.150\n)\n\n => Array\n(\n => 59.96.90.94\n)\n\n => Array\n(\n => 49.156.111.64\n)\n\n => Array\n(\n => 103.75.244.16\n)\n\n => Array\n(\n => 54.37.18.139\n)\n\n => Array\n(\n => 27.255.173.50\n)\n\n => Array\n(\n => 84.202.161.120\n)\n\n => Array\n(\n => 27.3.224.180\n)\n\n => Array\n(\n => 39.44.14.192\n)\n\n => Array\n(\n => 37.120.133.201\n)\n\n => Array\n(\n => 109.251.143.236\n)\n\n => Array\n(\n => 23.80.97.111\n)\n\n => Array\n(\n => 43.242.176.9\n)\n\n => Array\n(\n => 14.248.107.50\n)\n\n => Array\n(\n => 182.189.221.114\n)\n\n => Array\n(\n => 103.253.173.74\n)\n\n => Array\n(\n => 27.97.177.45\n)\n\n => Array\n(\n => 49.14.98.9\n)\n\n => Array\n(\n => 163.53.85.169\n)\n\n => Array\n(\n => 39.59.90.168\n)\n\n => Array\n(\n => 111.88.202.253\n)\n\n => Array\n(\n => 111.119.178.155\n)\n\n => Array\n(\n => 171.76.163.75\n)\n\n => Array\n(\n => 202.5.154.23\n)\n\n => Array\n(\n => 119.160.65.164\n)\n\n => Array\n(\n => 14.253.253.190\n)\n\n => Array\n(\n => 117.206.167.25\n)\n\n => Array\n(\n => 61.2.183.186\n)\n\n => Array\n(\n => 103.100.4.83\n)\n\n => Array\n(\n => 124.253.71.126\n)\n\n => Array\n(\n => 182.189.49.217\n)\n\n => Array\n(\n => 103.196.160.41\n)\n\n => Array\n(\n => 23.106.56.35\n)\n\n => Array\n(\n => 110.38.12.70\n)\n\n => Array\n(\n => 154.157.199.239\n)\n\n => Array\n(\n => 14.231.163.113\n)\n\n => Array\n(\n => 103.69.27.232\n)\n\n => Array\n(\n => 175.107.220.192\n)\n\n => Array\n(\n => 43.231.58.173\n)\n\n => Array\n(\n => 138.128.91.215\n)\n\n => Array\n(\n => 103.233.86.1\n)\n\n => Array\n(\n => 182.187.67.111\n)\n\n => Array\n(\n => 49.156.71.31\n)\n\n => Array\n(\n => 27.255.174.125\n)\n\n => Array\n(\n => 195.24.220.35\n)\n\n => Array\n(\n => 120.29.98.28\n)\n\n => Array\n(\n => 41.202.219.255\n)\n\n => Array\n(\n => 103.88.3.243\n)\n\n => Array\n(\n => 111.125.106.75\n)\n\n => Array\n(\n => 106.76.71.74\n)\n\n => Array\n(\n => 112.201.138.85\n)\n\n => Array\n(\n => 110.137.101.229\n)\n\n => Array\n(\n => 43.242.177.96\n)\n\n => Array\n(\n => 39.36.198.196\n)\n\n => Array\n(\n => 27.255.181.140\n)\n\n => Array\n(\n => 194.99.104.58\n)\n\n => Array\n(\n => 78.129.139.109\n)\n\n => Array\n(\n => 47.247.185.67\n)\n\n => Array\n(\n => 27.63.37.90\n)\n\n => Array\n(\n => 103.211.54.1\n)\n\n => Array\n(\n => 94.202.167.139\n)\n\n => Array\n(\n => 111.119.183.3\n)\n\n => Array\n(\n => 124.253.194.1\n)\n\n => Array\n(\n => 192.142.188.115\n)\n\n => Array\n(\n => 39.44.137.107\n)\n\n => Array\n(\n => 43.251.191.25\n)\n\n => Array\n(\n => 103.140.30.114\n)\n\n => Array\n(\n => 117.5.194.159\n)\n\n => Array\n(\n => 109.169.23.79\n)\n\n => Array\n(\n => 122.178.127.170\n)\n\n => Array\n(\n => 45.118.165.156\n)\n\n => Array\n(\n => 39.48.199.148\n)\n\n => Array\n(\n => 182.64.138.32\n)\n\n => Array\n(\n => 37.73.129.186\n)\n\n => Array\n(\n => 182.186.110.35\n)\n\n => Array\n(\n => 43.242.177.24\n)\n\n => Array\n(\n => 119.155.23.112\n)\n\n => Array\n(\n => 84.16.238.119\n)\n\n => Array\n(\n => 41.202.219.252\n)\n\n => Array\n(\n => 43.242.176.119\n)\n\n => Array\n(\n => 111.119.187.6\n)\n\n => Array\n(\n => 95.12.200.188\n)\n\n => Array\n(\n => 139.28.219.138\n)\n\n => Array\n(\n => 89.163.247.130\n)\n\n => Array\n(\n => 122.173.103.88\n)\n\n => Array\n(\n => 103.248.87.10\n)\n\n => Array\n(\n => 23.106.249.36\n)\n\n => Array\n(\n => 124.253.94.125\n)\n\n => Array\n(\n => 39.53.244.147\n)\n\n => Array\n(\n => 193.109.85.11\n)\n\n => Array\n(\n => 43.242.176.71\n)\n\n => Array\n(\n => 43.242.177.58\n)\n\n => Array\n(\n => 47.31.6.139\n)\n\n => Array\n(\n => 39.59.34.67\n)\n\n => Array\n(\n => 43.242.176.58\n)\n\n => Array\n(\n => 103.107.198.198\n)\n\n => Array\n(\n => 147.135.11.113\n)\n\n => Array\n(\n => 27.7.212.112\n)\n\n => Array\n(\n => 43.242.177.1\n)\n\n => Array\n(\n => 175.107.227.27\n)\n\n => Array\n(\n => 103.103.43.254\n)\n\n => Array\n(\n => 49.15.221.10\n)\n\n => Array\n(\n => 43.242.177.43\n)\n\n => Array\n(\n => 36.85.59.11\n)\n\n => Array\n(\n => 124.253.204.50\n)\n\n => Array\n(\n => 5.181.233.54\n)\n\n => Array\n(\n => 43.242.177.154\n)\n\n => Array\n(\n => 103.84.37.169\n)\n\n => Array\n(\n => 222.252.54.108\n)\n\n => Array\n(\n => 14.162.160.254\n)\n\n => Array\n(\n => 178.151.218.45\n)\n\n => Array\n(\n => 110.137.101.93\n)\n\n => Array\n(\n => 122.162.212.59\n)\n\n => Array\n(\n => 81.12.118.162\n)\n\n => Array\n(\n => 171.76.186.148\n)\n\n => Array\n(\n => 182.69.253.77\n)\n\n => Array\n(\n => 111.119.183.43\n)\n\n => Array\n(\n => 49.149.74.226\n)\n\n => Array\n(\n => 43.242.177.63\n)\n\n => Array\n(\n => 14.99.243.54\n)\n\n => Array\n(\n => 110.137.100.25\n)\n\n => Array\n(\n => 116.107.25.163\n)\n\n => Array\n(\n => 49.36.71.141\n)\n\n => Array\n(\n => 182.180.117.219\n)\n\n => Array\n(\n => 150.242.172.194\n)\n\n => Array\n(\n => 49.156.111.40\n)\n\n => Array\n(\n => 49.15.208.115\n)\n\n => Array\n(\n => 103.209.87.219\n)\n\n => Array\n(\n => 43.242.176.56\n)\n\n => Array\n(\n => 103.132.187.100\n)\n\n => Array\n(\n => 49.156.96.120\n)\n\n => Array\n(\n => 192.142.176.171\n)\n\n => Array\n(\n => 51.91.18.131\n)\n\n => Array\n(\n => 103.83.144.121\n)\n\n => Array\n(\n => 1.39.75.72\n)\n\n => Array\n(\n => 14.231.172.177\n)\n\n => Array\n(\n => 94.232.213.159\n)\n\n => Array\n(\n => 103.228.158.38\n)\n\n => Array\n(\n => 43.242.177.100\n)\n\n => Array\n(\n => 171.76.149.130\n)\n\n => Array\n(\n => 113.183.26.59\n)\n\n => Array\n(\n => 182.74.232.166\n)\n\n => Array\n(\n => 47.31.205.211\n)\n\n => Array\n(\n => 106.211.253.70\n)\n\n => Array\n(\n => 39.51.233.214\n)\n\n => Array\n(\n => 182.70.249.161\n)\n\n => Array\n(\n => 222.252.40.196\n)\n\n => Array\n(\n => 49.37.6.29\n)\n\n => Array\n(\n => 119.155.33.170\n)\n\n => Array\n(\n => 43.242.177.79\n)\n\n => Array\n(\n => 111.119.183.62\n)\n\n => Array\n(\n => 137.59.226.97\n)\n\n => Array\n(\n => 42.111.18.121\n)\n\n => Array\n(\n => 223.190.46.91\n)\n\n => Array\n(\n => 45.118.165.159\n)\n\n => Array\n(\n => 110.136.60.44\n)\n\n => Array\n(\n => 43.242.176.57\n)\n\n => Array\n(\n => 117.212.58.0\n)\n\n => Array\n(\n => 49.37.7.66\n)\n\n => Array\n(\n => 39.52.174.33\n)\n\n => Array\n(\n => 150.242.172.55\n)\n\n => Array\n(\n => 103.94.111.236\n)\n\n => Array\n(\n => 106.215.239.184\n)\n\n => Array\n(\n => 101.128.117.75\n)\n\n => Array\n(\n => 162.210.194.10\n)\n\n => Array\n(\n => 136.158.31.132\n)\n\n => Array\n(\n => 39.51.245.69\n)\n\n => Array\n(\n => 39.42.149.159\n)\n\n => Array\n(\n => 51.77.108.159\n)\n\n => Array\n(\n => 45.127.247.250\n)\n\n => Array\n(\n => 122.172.78.22\n)\n\n => Array\n(\n => 117.220.208.38\n)\n\n => Array\n(\n => 112.201.138.95\n)\n\n => Array\n(\n => 49.145.105.113\n)\n\n => Array\n(\n => 110.93.247.12\n)\n\n => Array\n(\n => 39.52.150.32\n)\n\n => Array\n(\n => 122.161.89.41\n)\n\n => Array\n(\n => 39.52.176.49\n)\n\n => Array\n(\n => 157.33.12.154\n)\n\n => Array\n(\n => 73.111.248.162\n)\n\n => Array\n(\n => 112.204.167.67\n)\n\n => Array\n(\n => 107.150.30.182\n)\n\n => Array\n(\n => 115.99.222.229\n)\n\n => Array\n(\n => 180.190.195.96\n)\n\n => Array\n(\n => 157.44.57.255\n)\n\n => Array\n(\n => 39.37.9.167\n)\n\n => Array\n(\n => 39.49.48.33\n)\n\n => Array\n(\n => 157.44.218.118\n)\n\n => Array\n(\n => 103.211.54.253\n)\n\n => Array\n(\n => 43.242.177.81\n)\n\n => Array\n(\n => 103.111.224.227\n)\n\n => Array\n(\n => 223.176.48.237\n)\n\n => Array\n(\n => 124.253.87.117\n)\n\n => Array\n(\n => 124.29.247.14\n)\n\n => Array\n(\n => 182.189.232.32\n)\n\n => Array\n(\n => 111.68.97.206\n)\n\n => Array\n(\n => 103.117.15.70\n)\n\n => Array\n(\n => 182.18.236.101\n)\n\n => Array\n(\n => 43.242.177.60\n)\n\n => Array\n(\n => 180.190.7.178\n)\n\n => Array\n(\n => 112.201.142.95\n)\n\n => Array\n(\n => 122.178.255.123\n)\n\n => Array\n(\n => 49.36.240.103\n)\n\n => Array\n(\n => 210.56.16.13\n)\n\n => Array\n(\n => 103.91.123.219\n)\n\n => Array\n(\n => 39.52.155.252\n)\n\n => Array\n(\n => 192.142.207.230\n)\n\n => Array\n(\n => 188.163.82.179\n)\n\n => Array\n(\n => 182.189.9.196\n)\n\n => Array\n(\n => 175.107.221.51\n)\n\n => Array\n(\n => 39.53.221.200\n)\n\n => Array\n(\n => 27.255.190.59\n)\n\n => Array\n(\n => 183.83.212.118\n)\n\n => Array\n(\n => 45.118.165.143\n)\n\n => Array\n(\n => 182.189.124.35\n)\n\n => Array\n(\n => 203.101.186.1\n)\n\n => Array\n(\n => 49.36.246.25\n)\n\n => Array\n(\n => 39.42.186.234\n)\n\n => Array\n(\n => 103.82.80.14\n)\n\n => Array\n(\n => 210.18.182.42\n)\n\n => Array\n(\n => 42.111.13.81\n)\n\n => Array\n(\n => 46.200.69.240\n)\n\n => Array\n(\n => 103.209.87.213\n)\n\n => Array\n(\n => 103.31.95.95\n)\n\n => Array\n(\n => 180.190.174.25\n)\n\n => Array\n(\n => 103.77.0.128\n)\n\n => Array\n(\n => 49.34.103.82\n)\n\n => Array\n(\n => 39.48.196.22\n)\n\n => Array\n(\n => 192.142.166.20\n)\n\n => Array\n(\n => 202.142.110.186\n)\n\n => Array\n(\n => 122.163.135.95\n)\n\n => Array\n(\n => 183.83.255.225\n)\n\n => Array\n(\n => 157.45.46.10\n)\n\n => Array\n(\n => 182.189.4.77\n)\n\n => Array\n(\n => 49.145.104.71\n)\n\n => Array\n(\n => 103.143.7.34\n)\n\n => Array\n(\n => 61.2.180.15\n)\n\n => Array\n(\n => 103.81.215.61\n)\n\n => Array\n(\n => 115.42.71.122\n)\n\n => Array\n(\n => 124.253.73.20\n)\n\n => Array\n(\n => 49.33.210.169\n)\n\n => Array\n(\n => 78.159.101.115\n)\n\n => Array\n(\n => 42.111.17.221\n)\n\n => Array\n(\n => 43.242.178.67\n)\n\n => Array\n(\n => 36.68.138.36\n)\n\n => Array\n(\n => 103.195.201.51\n)\n\n => Array\n(\n => 79.141.162.81\n)\n\n => Array\n(\n => 202.8.118.239\n)\n\n => Array\n(\n => 103.139.128.161\n)\n\n => Array\n(\n => 207.244.71.84\n)\n\n => Array\n(\n => 124.253.184.45\n)\n\n => Array\n(\n => 111.125.106.124\n)\n\n => Array\n(\n => 111.125.105.139\n)\n\n => Array\n(\n => 39.59.94.233\n)\n\n => Array\n(\n => 112.211.60.168\n)\n\n => Array\n(\n => 103.117.14.72\n)\n\n => Array\n(\n => 111.119.183.56\n)\n\n => Array\n(\n => 47.31.53.228\n)\n\n => Array\n(\n => 124.253.186.8\n)\n\n => Array\n(\n => 183.83.213.214\n)\n\n => Array\n(\n => 103.106.239.70\n)\n\n => Array\n(\n => 182.182.92.81\n)\n\n => Array\n(\n => 14.162.167.98\n)\n\n => Array\n(\n => 112.211.11.107\n)\n\n => Array\n(\n => 77.111.246.20\n)\n\n => Array\n(\n => 49.156.86.182\n)\n\n => Array\n(\n => 47.29.122.112\n)\n\n => Array\n(\n => 125.99.74.42\n)\n\n => Array\n(\n => 124.123.169.24\n)\n\n => Array\n(\n => 106.202.105.128\n)\n\n => Array\n(\n => 103.244.173.14\n)\n\n => Array\n(\n => 103.98.63.104\n)\n\n => Array\n(\n => 180.245.6.60\n)\n\n => Array\n(\n => 49.149.96.14\n)\n\n => Array\n(\n => 14.177.120.169\n)\n\n => Array\n(\n => 192.135.90.145\n)\n\n => Array\n(\n => 223.190.18.218\n)\n\n => Array\n(\n => 171.61.190.2\n)\n\n => Array\n(\n => 58.65.220.219\n)\n\n => Array\n(\n => 122.177.29.87\n)\n\n => Array\n(\n => 223.236.175.203\n)\n\n => Array\n(\n => 39.53.237.106\n)\n\n => Array\n(\n => 1.186.114.83\n)\n\n => Array\n(\n => 43.230.66.153\n)\n\n => Array\n(\n => 27.96.94.247\n)\n\n => Array\n(\n => 39.52.176.185\n)\n\n => Array\n(\n => 59.94.147.62\n)\n\n => Array\n(\n => 119.160.117.10\n)\n\n => Array\n(\n => 43.241.146.105\n)\n\n => Array\n(\n => 39.59.87.75\n)\n\n => Array\n(\n => 119.160.118.203\n)\n\n => Array\n(\n => 39.52.161.76\n)\n\n => Array\n(\n => 202.168.84.189\n)\n\n => Array\n(\n => 103.215.168.2\n)\n\n => Array\n(\n => 39.42.146.160\n)\n\n => Array\n(\n => 182.182.30.246\n)\n\n => Array\n(\n => 122.173.212.133\n)\n\n => Array\n(\n => 39.51.238.44\n)\n\n => Array\n(\n => 183.83.252.51\n)\n\n => Array\n(\n => 202.142.168.86\n)\n\n => Array\n(\n => 39.40.198.209\n)\n\n => Array\n(\n => 192.135.90.151\n)\n\n => Array\n(\n => 72.255.41.174\n)\n\n => Array\n(\n => 137.97.92.124\n)\n\n => Array\n(\n => 182.185.159.155\n)\n\n => Array\n(\n => 157.44.133.131\n)\n\n => Array\n(\n => 39.51.230.253\n)\n\n => Array\n(\n => 103.70.87.200\n)\n\n => Array\n(\n => 103.117.15.82\n)\n\n => Array\n(\n => 103.217.244.69\n)\n\n => Array\n(\n => 157.34.76.185\n)\n\n => Array\n(\n => 39.52.130.163\n)\n\n => Array\n(\n => 182.181.41.39\n)\n\n => Array\n(\n => 49.37.212.226\n)\n\n => Array\n(\n => 119.160.117.100\n)\n\n => Array\n(\n => 103.209.87.43\n)\n\n => Array\n(\n => 180.190.195.45\n)\n\n => Array\n(\n => 122.160.57.230\n)\n\n => Array\n(\n => 203.192.213.81\n)\n\n => Array\n(\n => 182.181.63.91\n)\n\n => Array\n(\n => 157.44.184.5\n)\n\n => Array\n(\n => 27.97.213.128\n)\n\n => Array\n(\n => 122.55.252.145\n)\n\n => Array\n(\n => 103.117.15.92\n)\n\n => Array\n(\n => 42.201.251.179\n)\n\n => Array\n(\n => 122.186.84.53\n)\n\n => Array\n(\n => 119.157.75.242\n)\n\n => Array\n(\n => 39.42.163.6\n)\n\n => Array\n(\n => 14.99.246.78\n)\n\n => Array\n(\n => 103.209.87.227\n)\n\n => Array\n(\n => 182.68.215.31\n)\n\n => Array\n(\n => 45.118.165.140\n)\n\n => Array\n(\n => 207.244.71.81\n)\n\n => Array\n(\n => 27.97.162.57\n)\n\n => Array\n(\n => 103.113.106.98\n)\n\n => Array\n(\n => 95.135.44.103\n)\n\n => Array\n(\n => 125.209.114.238\n)\n\n => Array\n(\n => 77.123.14.176\n)\n\n => Array\n(\n => 110.36.202.169\n)\n\n => Array\n(\n => 124.253.205.230\n)\n\n => Array\n(\n => 106.215.72.117\n)\n\n => Array\n(\n => 116.72.226.35\n)\n\n => Array\n(\n => 137.97.103.141\n)\n\n => Array\n(\n => 112.79.212.161\n)\n\n => Array\n(\n => 103.209.85.150\n)\n\n => Array\n(\n => 103.159.127.6\n)\n\n => Array\n(\n => 43.239.205.66\n)\n\n => Array\n(\n => 143.244.51.152\n)\n\n => Array\n(\n => 182.64.15.3\n)\n\n => Array\n(\n => 182.185.207.146\n)\n\n => Array\n(\n => 45.118.165.155\n)\n\n => Array\n(\n => 115.160.241.214\n)\n\n => Array\n(\n => 47.31.230.68\n)\n\n => Array\n(\n => 49.15.84.145\n)\n\n => Array\n(\n => 39.51.239.206\n)\n\n => Array\n(\n => 103.149.154.212\n)\n\n => Array\n(\n => 43.239.207.155\n)\n\n => Array\n(\n => 182.182.30.181\n)\n\n => Array\n(\n => 157.37.198.16\n)\n\n => Array\n(\n => 162.239.24.60\n)\n\n => Array\n(\n => 106.212.101.97\n)\n\n => Array\n(\n => 124.253.97.44\n)\n\n => Array\n(\n => 106.214.95.176\n)\n\n => Array\n(\n => 102.69.228.114\n)\n\n => Array\n(\n => 116.74.58.221\n)\n\n => Array\n(\n => 162.210.194.38\n)\n\n => Array\n(\n => 39.52.162.121\n)\n\n => Array\n(\n => 103.216.143.255\n)\n\n => Array\n(\n => 103.49.155.134\n)\n\n => Array\n(\n => 182.191.119.236\n)\n\n => Array\n(\n => 111.88.213.172\n)\n\n => Array\n(\n => 43.239.207.207\n)\n\n => Array\n(\n => 140.213.35.143\n)\n\n => Array\n(\n => 154.72.153.215\n)\n\n => Array\n(\n => 122.170.47.36\n)\n\n => Array\n(\n => 51.158.111.163\n)\n\n => Array\n(\n => 203.122.10.150\n)\n\n => Array\n(\n => 47.31.176.111\n)\n\n => Array\n(\n => 103.75.246.34\n)\n\n => Array\n(\n => 103.244.178.45\n)\n\n => Array\n(\n => 182.185.138.0\n)\n\n => Array\n(\n => 183.83.254.224\n)\n\n => Array\n(\n => 49.36.246.145\n)\n\n => Array\n(\n => 202.47.60.85\n)\n\n => Array\n(\n => 180.190.163.160\n)\n\n => Array\n(\n => 27.255.187.221\n)\n\n => Array\n(\n => 14.248.94.2\n)\n\n => Array\n(\n => 185.233.17.187\n)\n\n => Array\n(\n => 139.5.254.227\n)\n\n => Array\n(\n => 103.149.160.66\n)\n\n => Array\n(\n => 122.168.235.47\n)\n\n => Array\n(\n => 45.113.248.224\n)\n\n => Array\n(\n => 110.54.170.142\n)\n\n => Array\n(\n => 223.235.226.55\n)\n\n => Array\n(\n => 157.32.19.235\n)\n\n => Array\n(\n => 49.15.221.114\n)\n\n => Array\n(\n => 27.97.166.163\n)\n\n => Array\n(\n => 223.233.99.5\n)\n\n => Array\n(\n => 49.33.203.53\n)\n\n => Array\n(\n => 27.56.214.41\n)\n\n => Array\n(\n => 103.138.51.3\n)\n\n => Array\n(\n => 111.119.183.21\n)\n\n => Array\n(\n => 47.15.138.233\n)\n\n => Array\n(\n => 202.63.213.184\n)\n\n => Array\n(\n => 49.36.158.94\n)\n\n => Array\n(\n => 27.97.186.179\n)\n\n => Array\n(\n => 27.97.214.69\n)\n\n => Array\n(\n => 203.128.18.163\n)\n\n => Array\n(\n => 106.207.235.63\n)\n\n => Array\n(\n => 116.107.220.231\n)\n\n => Array\n(\n => 223.226.169.249\n)\n\n => Array\n(\n => 106.201.24.6\n)\n\n => Array\n(\n => 49.15.89.7\n)\n\n => Array\n(\n => 49.15.142.20\n)\n\n => Array\n(\n => 223.177.24.85\n)\n\n => Array\n(\n => 37.156.17.37\n)\n\n => Array\n(\n => 102.129.224.2\n)\n\n => Array\n(\n => 49.15.85.221\n)\n\n => Array\n(\n => 106.76.208.153\n)\n\n => Array\n(\n => 61.2.47.71\n)\n\n => Array\n(\n => 27.97.178.79\n)\n\n => Array\n(\n => 39.34.143.196\n)\n\n => Array\n(\n => 103.10.227.158\n)\n\n => Array\n(\n => 117.220.210.159\n)\n\n => Array\n(\n => 182.189.28.11\n)\n\n => Array\n(\n => 122.185.38.170\n)\n\n => Array\n(\n => 112.196.132.115\n)\n\n => Array\n(\n => 187.156.137.83\n)\n\n => Array\n(\n => 203.122.3.88\n)\n\n => Array\n(\n => 51.68.142.45\n)\n\n => Array\n(\n => 124.253.217.55\n)\n\n => Array\n(\n => 103.152.41.2\n)\n\n => Array\n(\n => 157.37.154.219\n)\n\n => Array\n(\n => 39.45.32.77\n)\n\n => Array\n(\n => 182.182.22.221\n)\n\n => Array\n(\n => 157.43.205.117\n)\n\n => Array\n(\n => 202.142.123.58\n)\n\n => Array\n(\n => 43.239.207.121\n)\n\n => Array\n(\n => 49.206.122.113\n)\n\n => Array\n(\n => 106.193.199.203\n)\n\n => Array\n(\n => 103.67.157.251\n)\n\n => Array\n(\n => 49.34.97.81\n)\n\n => Array\n(\n => 49.156.92.130\n)\n\n => Array\n(\n => 203.160.179.210\n)\n\n => Array\n(\n => 106.215.33.244\n)\n\n => Array\n(\n => 191.101.148.41\n)\n\n => Array\n(\n => 203.90.94.94\n)\n\n => Array\n(\n => 105.129.205.134\n)\n\n => Array\n(\n => 106.215.45.165\n)\n\n => Array\n(\n => 112.196.132.15\n)\n\n => Array\n(\n => 39.59.64.174\n)\n\n => Array\n(\n => 124.253.155.116\n)\n\n => Array\n(\n => 94.179.192.204\n)\n\n => Array\n(\n => 110.38.29.245\n)\n\n => Array\n(\n => 124.29.209.78\n)\n\n => Array\n(\n => 103.75.245.240\n)\n\n => Array\n(\n => 49.36.159.170\n)\n\n => Array\n(\n => 223.190.18.160\n)\n\n => Array\n(\n => 124.253.113.226\n)\n\n => Array\n(\n => 14.180.77.240\n)\n\n => Array\n(\n => 106.215.76.24\n)\n\n => Array\n(\n => 106.210.155.153\n)\n\n => Array\n(\n => 111.119.187.42\n)\n\n => Array\n(\n => 146.196.32.106\n)\n\n => Array\n(\n => 122.162.22.27\n)\n\n => Array\n(\n => 49.145.59.252\n)\n\n => Array\n(\n => 95.47.247.92\n)\n\n => Array\n(\n => 103.99.218.50\n)\n\n => Array\n(\n => 157.37.192.88\n)\n\n => Array\n(\n => 82.102.31.242\n)\n\n => Array\n(\n => 157.46.220.64\n)\n\n => Array\n(\n => 180.151.107.52\n)\n\n => Array\n(\n => 203.81.240.75\n)\n\n => Array\n(\n => 122.167.213.130\n)\n\n => Array\n(\n => 103.227.70.164\n)\n\n => Array\n(\n => 106.215.81.169\n)\n\n => Array\n(\n => 157.46.214.170\n)\n\n => Array\n(\n => 103.69.27.163\n)\n\n => Array\n(\n => 124.253.23.213\n)\n\n => Array\n(\n => 157.37.167.174\n)\n\n => Array\n(\n => 1.39.204.67\n)\n\n => Array\n(\n => 112.196.132.51\n)\n\n => Array\n(\n => 119.152.61.222\n)\n\n => Array\n(\n => 47.31.36.174\n)\n\n => Array\n(\n => 47.31.152.174\n)\n\n => Array\n(\n => 49.34.18.105\n)\n\n => Array\n(\n => 157.37.170.101\n)\n\n => Array\n(\n => 118.209.241.234\n)\n\n => Array\n(\n => 103.67.19.9\n)\n\n => Array\n(\n => 182.189.14.154\n)\n\n => Array\n(\n => 45.127.233.232\n)\n\n => Array\n(\n => 27.96.94.91\n)\n\n => Array\n(\n => 183.83.214.250\n)\n\n => Array\n(\n => 47.31.27.140\n)\n\n => Array\n(\n => 47.31.129.199\n)\n\n => Array\n(\n => 157.44.156.111\n)\n\n => Array\n(\n => 42.110.163.2\n)\n\n => Array\n(\n => 124.253.64.210\n)\n\n => Array\n(\n => 49.36.167.54\n)\n\n => Array\n(\n => 27.63.135.145\n)\n\n => Array\n(\n => 157.35.254.63\n)\n\n => Array\n(\n => 39.45.18.182\n)\n\n => Array\n(\n => 197.210.85.102\n)\n\n => Array\n(\n => 112.196.132.90\n)\n\n => Array\n(\n => 59.152.97.84\n)\n\n => Array\n(\n => 43.242.178.7\n)\n\n => Array\n(\n => 47.31.40.70\n)\n\n => Array\n(\n => 202.134.10.136\n)\n\n => Array\n(\n => 132.154.241.43\n)\n\n => Array\n(\n => 185.209.179.240\n)\n\n => Array\n(\n => 202.47.50.28\n)\n\n => Array\n(\n => 182.186.1.29\n)\n\n => Array\n(\n => 124.253.114.229\n)\n\n => Array\n(\n => 49.32.210.126\n)\n\n => Array\n(\n => 43.242.178.122\n)\n\n => Array\n(\n => 42.111.28.52\n)\n\n => Array\n(\n => 23.227.141.44\n)\n\n => Array\n(\n => 23.227.141.156\n)\n\n => Array\n(\n => 103.253.173.79\n)\n\n => Array\n(\n => 116.75.231.74\n)\n\n => Array\n(\n => 106.76.78.196\n)\n\n => Array\n(\n => 116.75.197.68\n)\n\n => Array\n(\n => 42.108.172.131\n)\n\n => Array\n(\n => 157.38.27.199\n)\n\n => Array\n(\n => 103.70.86.205\n)\n\n => Array\n(\n => 119.152.63.239\n)\n\n => Array\n(\n => 103.233.116.94\n)\n\n => Array\n(\n => 111.119.188.17\n)\n\n => Array\n(\n => 103.196.160.156\n)\n\n => Array\n(\n => 27.97.208.40\n)\n\n => Array\n(\n => 188.163.7.136\n)\n\n => Array\n(\n => 49.15.202.205\n)\n\n => Array\n(\n => 124.253.201.111\n)\n\n => Array\n(\n => 182.190.213.246\n)\n\n => Array\n(\n => 5.154.174.10\n)\n\n => Array\n(\n => 103.21.185.16\n)\n\n => Array\n(\n => 112.196.132.67\n)\n\n => Array\n(\n => 49.15.194.230\n)\n\n => Array\n(\n => 103.118.34.103\n)\n\n => Array\n(\n => 49.15.201.92\n)\n\n => Array\n(\n => 42.111.13.238\n)\n\n => Array\n(\n => 203.192.213.137\n)\n\n => Array\n(\n => 45.115.190.82\n)\n\n => Array\n(\n => 78.26.130.102\n)\n\n => Array\n(\n => 49.15.85.202\n)\n\n => Array\n(\n => 106.76.193.33\n)\n\n => Array\n(\n => 103.70.41.30\n)\n\n => Array\n(\n => 103.82.78.254\n)\n\n => Array\n(\n => 110.38.35.90\n)\n\n => Array\n(\n => 181.214.107.27\n)\n\n => Array\n(\n => 27.110.183.162\n)\n\n => Array\n(\n => 94.225.230.215\n)\n\n => Array\n(\n => 27.97.185.58\n)\n\n => Array\n(\n => 49.146.196.124\n)\n\n => Array\n(\n => 119.157.76.144\n)\n\n => Array\n(\n => 103.99.218.34\n)\n\n => Array\n(\n => 185.32.221.247\n)\n\n => Array\n(\n => 27.97.161.12\n)\n\n => Array\n(\n => 27.62.144.214\n)\n\n => Array\n(\n => 124.253.90.151\n)\n\n => Array\n(\n => 49.36.135.69\n)\n\n => Array\n(\n => 39.40.217.106\n)\n\n => Array\n(\n => 119.152.235.136\n)\n\n => Array\n(\n => 103.91.103.226\n)\n\n => Array\n(\n => 117.222.226.93\n)\n\n => Array\n(\n => 182.190.24.126\n)\n\n => Array\n(\n => 27.97.223.179\n)\n\n => Array\n(\n => 202.137.115.11\n)\n\n => Array\n(\n => 43.242.178.130\n)\n\n => Array\n(\n => 182.189.125.232\n)\n\n => Array\n(\n => 182.190.202.87\n)\n\n => Array\n(\n => 124.253.102.193\n)\n\n => Array\n(\n => 103.75.247.73\n)\n\n => Array\n(\n => 122.177.100.97\n)\n\n => Array\n(\n => 47.31.192.254\n)\n\n => Array\n(\n => 49.149.73.185\n)\n\n => Array\n(\n => 39.57.147.197\n)\n\n => Array\n(\n => 103.110.147.52\n)\n\n => Array\n(\n => 124.253.106.255\n)\n\n => Array\n(\n => 152.57.116.136\n)\n\n => Array\n(\n => 110.38.35.102\n)\n\n => Array\n(\n => 182.18.206.127\n)\n\n => Array\n(\n => 103.133.59.246\n)\n\n => Array\n(\n => 27.97.189.139\n)\n\n => Array\n(\n => 179.61.245.54\n)\n\n => Array\n(\n => 103.240.233.176\n)\n\n => Array\n(\n => 111.88.124.196\n)\n\n => Array\n(\n => 49.146.215.3\n)\n\n => Array\n(\n => 110.39.10.246\n)\n\n => Array\n(\n => 27.5.42.135\n)\n\n => Array\n(\n => 27.97.177.251\n)\n\n => Array\n(\n => 93.177.75.254\n)\n\n => Array\n(\n => 43.242.177.3\n)\n\n => Array\n(\n => 112.196.132.97\n)\n\n => Array\n(\n => 116.75.242.188\n)\n\n => Array\n(\n => 202.8.118.101\n)\n\n => Array\n(\n => 49.36.65.43\n)\n\n => Array\n(\n => 157.37.146.220\n)\n\n => Array\n(\n => 157.37.143.235\n)\n\n => Array\n(\n => 157.38.94.34\n)\n\n => Array\n(\n => 49.36.131.1\n)\n\n => Array\n(\n => 132.154.92.97\n)\n\n => Array\n(\n => 132.154.123.115\n)\n\n => Array\n(\n => 49.15.197.222\n)\n\n => Array\n(\n => 124.253.198.72\n)\n\n => Array\n(\n => 27.97.217.95\n)\n\n => Array\n(\n => 47.31.194.65\n)\n\n => Array\n(\n => 197.156.190.156\n)\n\n => Array\n(\n => 197.156.190.230\n)\n\n => Array\n(\n => 103.62.152.250\n)\n\n => Array\n(\n => 103.152.212.126\n)\n\n => Array\n(\n => 185.233.18.177\n)\n\n => Array\n(\n => 116.75.63.83\n)\n\n => Array\n(\n => 157.38.56.125\n)\n\n => Array\n(\n => 119.157.107.195\n)\n\n => Array\n(\n => 103.87.50.73\n)\n\n => Array\n(\n => 95.142.120.141\n)\n\n => Array\n(\n => 154.13.1.221\n)\n\n => Array\n(\n => 103.147.87.79\n)\n\n => Array\n(\n => 39.53.173.186\n)\n\n => Array\n(\n => 195.114.145.107\n)\n\n => Array\n(\n => 157.33.201.185\n)\n\n => Array\n(\n => 195.85.219.36\n)\n\n => Array\n(\n => 105.161.67.127\n)\n\n => Array\n(\n => 110.225.87.77\n)\n\n => Array\n(\n => 103.95.167.236\n)\n\n => Array\n(\n => 89.187.162.213\n)\n\n => Array\n(\n => 27.255.189.50\n)\n\n => Array\n(\n => 115.96.77.54\n)\n\n => Array\n(\n => 223.182.220.223\n)\n\n => Array\n(\n => 157.47.206.192\n)\n\n => Array\n(\n => 182.186.110.226\n)\n\n => Array\n(\n => 39.53.243.237\n)\n\n => Array\n(\n => 39.40.228.58\n)\n\n => Array\n(\n => 157.38.60.9\n)\n\n => Array\n(\n => 106.198.244.189\n)\n\n => Array\n(\n => 124.253.51.164\n)\n\n => Array\n(\n => 49.147.113.58\n)\n\n => Array\n(\n => 14.231.196.229\n)\n\n => Array\n(\n => 103.81.214.152\n)\n\n => Array\n(\n => 117.222.220.60\n)\n\n => Array\n(\n => 83.142.111.213\n)\n\n => Array\n(\n => 14.224.77.147\n)\n\n => Array\n(\n => 110.235.236.95\n)\n\n => Array\n(\n => 103.26.83.30\n)\n\n => Array\n(\n => 106.206.191.82\n)\n\n => Array\n(\n => 103.49.117.135\n)\n\n => Array\n(\n => 202.47.39.9\n)\n\n => Array\n(\n => 180.178.145.205\n)\n\n => Array\n(\n => 43.251.93.119\n)\n\n => Array\n(\n => 27.6.212.182\n)\n\n => Array\n(\n => 39.42.156.20\n)\n\n => Array\n(\n => 47.31.141.195\n)\n\n => Array\n(\n => 157.37.146.73\n)\n\n => Array\n(\n => 49.15.93.155\n)\n\n => Array\n(\n => 162.210.194.37\n)\n\n => Array\n(\n => 223.188.160.236\n)\n\n => Array\n(\n => 47.9.90.158\n)\n\n => Array\n(\n => 49.15.85.224\n)\n\n => Array\n(\n => 49.15.93.134\n)\n\n => Array\n(\n => 107.179.244.94\n)\n\n => Array\n(\n => 182.190.203.90\n)\n\n => Array\n(\n => 185.192.69.203\n)\n\n => Array\n(\n => 185.17.27.99\n)\n\n => Array\n(\n => 119.160.116.182\n)\n\n => Array\n(\n => 203.99.177.25\n)\n\n => Array\n(\n => 162.228.207.248\n)\n\n => Array\n(\n => 47.31.245.69\n)\n\n => Array\n(\n => 49.15.210.159\n)\n\n => Array\n(\n => 42.111.2.112\n)\n\n => Array\n(\n => 223.186.116.79\n)\n\n => Array\n(\n => 103.225.176.143\n)\n\n => Array\n(\n => 45.115.190.49\n)\n\n => Array\n(\n => 115.42.71.105\n)\n\n => Array\n(\n => 157.51.11.157\n)\n\n => Array\n(\n => 14.175.56.186\n)\n\n => Array\n(\n => 59.153.16.7\n)\n\n => Array\n(\n => 106.202.84.144\n)\n\n => Array\n(\n => 27.6.242.91\n)\n\n => Array\n(\n => 47.11.112.107\n)\n\n => Array\n(\n => 106.207.54.187\n)\n\n => Array\n(\n => 124.253.196.121\n)\n\n => Array\n(\n => 51.79.161.244\n)\n\n => Array\n(\n => 103.41.24.100\n)\n\n => Array\n(\n => 195.66.79.32\n)\n\n => Array\n(\n => 117.196.127.42\n)\n\n => Array\n(\n => 103.75.247.197\n)\n\n => Array\n(\n => 89.187.162.107\n)\n\n => Array\n(\n => 223.238.154.49\n)\n\n => Array\n(\n => 117.223.99.139\n)\n\n => Array\n(\n => 103.87.59.134\n)\n\n => Array\n(\n => 124.253.212.30\n)\n\n => Array\n(\n => 202.47.62.55\n)\n\n => Array\n(\n => 47.31.219.128\n)\n\n => Array\n(\n => 49.14.121.72\n)\n\n => Array\n(\n => 124.253.212.189\n)\n\n => Array\n(\n => 103.244.179.24\n)\n\n => Array\n(\n => 182.190.213.92\n)\n\n => Array\n(\n => 43.242.178.51\n)\n\n => Array\n(\n => 180.92.138.54\n)\n\n => Array\n(\n => 111.119.187.26\n)\n\n => Array\n(\n => 49.156.111.31\n)\n\n => Array\n(\n => 27.63.108.183\n)\n\n => Array\n(\n => 27.58.184.79\n)\n\n => Array\n(\n => 39.40.225.130\n)\n\n => Array\n(\n => 157.38.5.178\n)\n\n => Array\n(\n => 103.112.55.44\n)\n\n => Array\n(\n => 119.160.100.247\n)\n\n => Array\n(\n => 39.53.101.15\n)\n\n => Array\n(\n => 47.31.207.117\n)\n\n => Array\n(\n => 112.196.158.155\n)\n\n => Array\n(\n => 94.204.247.123\n)\n\n => Array\n(\n => 103.118.76.38\n)\n\n => Array\n(\n => 124.29.212.208\n)\n\n => Array\n(\n => 124.253.196.250\n)\n\n => Array\n(\n => 118.70.182.242\n)\n\n => Array\n(\n => 157.38.78.67\n)\n\n => Array\n(\n => 103.99.218.33\n)\n\n => Array\n(\n => 137.59.220.191\n)\n\n => Array\n(\n => 47.31.139.182\n)\n\n => Array\n(\n => 182.179.136.36\n)\n\n => Array\n(\n => 106.203.73.130\n)\n\n => Array\n(\n => 193.29.107.188\n)\n\n => Array\n(\n => 81.96.92.111\n)\n\n => Array\n(\n => 110.93.203.185\n)\n\n => Array\n(\n => 103.163.248.128\n)\n\n => Array\n(\n => 43.229.166.135\n)\n\n => Array\n(\n => 43.230.106.175\n)\n\n => Array\n(\n => 202.47.62.54\n)\n\n => Array\n(\n => 39.37.181.46\n)\n\n => Array\n(\n => 49.15.204.204\n)\n\n => Array\n(\n => 122.163.237.110\n)\n\n => Array\n(\n => 45.249.8.92\n)\n\n => Array\n(\n => 27.34.50.159\n)\n\n => Array\n(\n => 39.42.171.27\n)\n\n => Array\n(\n => 124.253.101.195\n)\n\n => Array\n(\n => 188.166.145.20\n)\n\n => Array\n(\n => 103.83.145.220\n)\n\n => Array\n(\n => 39.40.96.137\n)\n\n => Array\n(\n => 157.37.185.196\n)\n\n => Array\n(\n => 103.115.124.32\n)\n\n => Array\n(\n => 72.255.48.85\n)\n\n => Array\n(\n => 124.253.74.46\n)\n\n => Array\n(\n => 60.243.225.5\n)\n\n => Array\n(\n => 103.58.152.194\n)\n\n => Array\n(\n => 14.248.71.63\n)\n\n => Array\n(\n => 152.57.214.137\n)\n\n => Array\n(\n => 103.166.58.14\n)\n\n => Array\n(\n => 14.248.71.103\n)\n\n => Array\n(\n => 49.156.103.124\n)\n\n => Array\n(\n => 103.99.218.56\n)\n\n => Array\n(\n => 27.97.177.246\n)\n\n => Array\n(\n => 152.57.94.84\n)\n\n => Array\n(\n => 111.119.187.60\n)\n\n => Array\n(\n => 119.160.99.11\n)\n\n => Array\n(\n => 117.203.11.220\n)\n\n => Array\n(\n => 114.31.131.67\n)\n\n => Array\n(\n => 47.31.253.95\n)\n\n => Array\n(\n => 83.139.184.178\n)\n\n => Array\n(\n => 125.57.9.72\n)\n\n => Array\n(\n => 185.233.16.53\n)\n\n => Array\n(\n => 49.36.180.197\n)\n\n => Array\n(\n => 95.142.119.27\n)\n\n => Array\n(\n => 223.225.70.77\n)\n\n => Array\n(\n => 47.15.222.200\n)\n\n => Array\n(\n => 47.15.218.231\n)\n\n => Array\n(\n => 111.119.187.34\n)\n\n => Array\n(\n => 157.37.198.81\n)\n\n => Array\n(\n => 43.242.177.92\n)\n\n => Array\n(\n => 122.161.68.214\n)\n\n => Array\n(\n => 47.31.145.92\n)\n\n => Array\n(\n => 27.7.196.201\n)\n\n => Array\n(\n => 39.42.172.183\n)\n\n => Array\n(\n => 49.15.129.162\n)\n\n => Array\n(\n => 49.15.206.110\n)\n\n => Array\n(\n => 39.57.141.45\n)\n\n => Array\n(\n => 171.229.175.90\n)\n\n => Array\n(\n => 119.160.68.200\n)\n\n => Array\n(\n => 193.176.84.214\n)\n\n => Array\n(\n => 43.242.177.77\n)\n\n => Array\n(\n => 137.59.220.95\n)\n\n => Array\n(\n => 122.177.118.209\n)\n\n => Array\n(\n => 103.92.214.27\n)\n\n => Array\n(\n => 178.62.10.228\n)\n\n => Array\n(\n => 103.81.214.91\n)\n\n => Array\n(\n => 156.146.33.68\n)\n\n => Array\n(\n => 42.118.116.60\n)\n\n => Array\n(\n => 183.87.122.190\n)\n\n => Array\n(\n => 157.37.159.162\n)\n\n => Array\n(\n => 59.153.16.9\n)\n\n => Array\n(\n => 223.185.43.241\n)\n\n => Array\n(\n => 103.81.214.153\n)\n\n => Array\n(\n => 47.31.143.169\n)\n\n => Array\n(\n => 112.196.158.250\n)\n\n => Array\n(\n => 156.146.36.110\n)\n\n => Array\n(\n => 27.255.34.80\n)\n\n => Array\n(\n => 49.205.77.19\n)\n\n => Array\n(\n => 95.142.120.20\n)\n\n => Array\n(\n => 171.49.195.53\n)\n\n => Array\n(\n => 39.37.152.132\n)\n\n => Array\n(\n => 103.121.204.237\n)\n\n => Array\n(\n => 43.242.176.153\n)\n\n => Array\n(\n => 43.242.176.120\n)\n\n => Array\n(\n => 122.161.66.120\n)\n\n => Array\n(\n => 182.70.140.223\n)\n\n => Array\n(\n => 103.201.135.226\n)\n\n => Array\n(\n => 202.47.44.135\n)\n\n => Array\n(\n => 182.179.172.27\n)\n\n => Array\n(\n => 185.22.173.86\n)\n\n => Array\n(\n => 67.205.148.219\n)\n\n => Array\n(\n => 27.58.183.140\n)\n\n => Array\n(\n => 39.42.118.163\n)\n\n => Array\n(\n => 117.5.204.59\n)\n\n => Array\n(\n => 223.182.193.163\n)\n\n => Array\n(\n => 157.37.184.33\n)\n\n => Array\n(\n => 110.37.218.92\n)\n\n => Array\n(\n => 106.215.8.67\n)\n\n => Array\n(\n => 39.42.94.179\n)\n\n => Array\n(\n => 106.51.25.124\n)\n\n => Array\n(\n => 157.42.25.212\n)\n\n => Array\n(\n => 43.247.40.170\n)\n\n => Array\n(\n => 101.50.108.111\n)\n\n => Array\n(\n => 117.102.48.152\n)\n\n => Array\n(\n => 95.142.120.48\n)\n\n => Array\n(\n => 183.81.121.160\n)\n\n => Array\n(\n => 42.111.21.195\n)\n\n => Array\n(\n => 50.7.142.180\n)\n\n => Array\n(\n => 223.130.28.33\n)\n\n => Array\n(\n => 107.161.86.141\n)\n\n => Array\n(\n => 117.203.249.159\n)\n\n => Array\n(\n => 110.225.192.64\n)\n\n => Array\n(\n => 157.37.152.168\n)\n\n => Array\n(\n => 110.39.2.202\n)\n\n => Array\n(\n => 23.106.56.52\n)\n\n => Array\n(\n => 59.150.87.85\n)\n\n => Array\n(\n => 122.162.175.128\n)\n\n => Array\n(\n => 39.40.63.182\n)\n\n => Array\n(\n => 182.190.108.76\n)\n\n => Array\n(\n => 49.36.44.216\n)\n\n => Array\n(\n => 73.105.5.185\n)\n\n => Array\n(\n => 157.33.67.204\n)\n\n => Array\n(\n => 157.37.164.171\n)\n\n => Array\n(\n => 192.119.160.21\n)\n\n => Array\n(\n => 156.146.59.29\n)\n\n => Array\n(\n => 182.190.97.213\n)\n\n => Array\n(\n => 39.53.196.168\n)\n\n => Array\n(\n => 112.196.132.93\n)\n\n => Array\n(\n => 182.189.7.18\n)\n\n => Array\n(\n => 101.53.232.117\n)\n\n => Array\n(\n => 43.242.178.105\n)\n\n => Array\n(\n => 49.145.233.44\n)\n\n => Array\n(\n => 5.107.214.18\n)\n\n => Array\n(\n => 139.5.242.124\n)\n\n => Array\n(\n => 47.29.244.80\n)\n\n => Array\n(\n => 43.242.178.180\n)\n\n => Array\n(\n => 194.110.84.171\n)\n\n => Array\n(\n => 103.68.217.99\n)\n\n => Array\n(\n => 182.182.27.59\n)\n\n => Array\n(\n => 119.152.139.146\n)\n\n => Array\n(\n => 39.37.131.1\n)\n\n => Array\n(\n => 106.210.99.47\n)\n\n => Array\n(\n => 103.225.176.68\n)\n\n => Array\n(\n => 42.111.23.67\n)\n\n => Array\n(\n => 223.225.37.57\n)\n\n => Array\n(\n => 114.79.1.247\n)\n\n => Array\n(\n => 157.42.28.39\n)\n\n => Array\n(\n => 47.15.13.68\n)\n\n => Array\n(\n => 223.230.151.59\n)\n\n => Array\n(\n => 115.186.7.112\n)\n\n => Array\n(\n => 111.92.78.33\n)\n\n => Array\n(\n => 119.160.117.249\n)\n\n => Array\n(\n => 103.150.209.45\n)\n\n => Array\n(\n => 182.189.22.170\n)\n\n => Array\n(\n => 49.144.108.82\n)\n\n => Array\n(\n => 39.49.75.65\n)\n\n => Array\n(\n => 39.52.205.223\n)\n\n => Array\n(\n => 49.48.247.53\n)\n\n => Array\n(\n => 5.149.250.222\n)\n\n => Array\n(\n => 47.15.187.153\n)\n\n => Array\n(\n => 103.70.86.101\n)\n\n => Array\n(\n => 112.196.158.138\n)\n\n => Array\n(\n => 156.241.242.139\n)\n\n => Array\n(\n => 157.33.205.213\n)\n\n => Array\n(\n => 39.53.206.247\n)\n\n => Array\n(\n => 157.45.83.132\n)\n\n => Array\n(\n => 49.36.220.138\n)\n\n => Array\n(\n => 202.47.47.118\n)\n\n => Array\n(\n => 182.185.233.224\n)\n\n => Array\n(\n => 182.189.30.99\n)\n\n => Array\n(\n => 223.233.68.178\n)\n\n => Array\n(\n => 161.35.139.87\n)\n\n => Array\n(\n => 121.46.65.124\n)\n\n => Array\n(\n => 5.195.154.87\n)\n\n => Array\n(\n => 103.46.236.71\n)\n\n => Array\n(\n => 195.114.147.119\n)\n\n => Array\n(\n => 195.85.219.35\n)\n\n => Array\n(\n => 111.119.183.34\n)\n\n => Array\n(\n => 39.34.158.41\n)\n\n => Array\n(\n => 180.178.148.13\n)\n\n => Array\n(\n => 122.161.66.166\n)\n\n => Array\n(\n => 185.233.18.1\n)\n\n => Array\n(\n => 146.196.34.119\n)\n\n => Array\n(\n => 27.6.253.159\n)\n\n => Array\n(\n => 198.8.92.156\n)\n\n => Array\n(\n => 106.206.179.160\n)\n\n => Array\n(\n => 202.164.133.53\n)\n\n => Array\n(\n => 112.196.141.214\n)\n\n => Array\n(\n => 95.135.15.148\n)\n\n => Array\n(\n => 111.92.119.165\n)\n\n => Array\n(\n => 84.17.34.18\n)\n\n => Array\n(\n => 49.36.232.117\n)\n\n => Array\n(\n => 122.180.235.92\n)\n\n => Array\n(\n => 89.187.163.177\n)\n\n => Array\n(\n => 103.217.238.38\n)\n\n => Array\n(\n => 103.163.248.115\n)\n\n => Array\n(\n => 156.146.59.10\n)\n\n => Array\n(\n => 223.233.68.183\n)\n\n => Array\n(\n => 103.12.198.92\n)\n\n => Array\n(\n => 42.111.9.221\n)\n\n => Array\n(\n => 111.92.77.242\n)\n\n => Array\n(\n => 192.142.128.26\n)\n\n => Array\n(\n => 182.69.195.139\n)\n\n => Array\n(\n => 103.209.83.110\n)\n\n => Array\n(\n => 207.244.71.80\n)\n\n => Array\n(\n => 41.140.106.29\n)\n\n => Array\n(\n => 45.118.167.65\n)\n\n => Array\n(\n => 45.118.167.70\n)\n\n => Array\n(\n => 157.37.159.180\n)\n\n => Array\n(\n => 103.217.178.194\n)\n\n => Array\n(\n => 27.255.165.94\n)\n\n => Array\n(\n => 45.133.7.42\n)\n\n => Array\n(\n => 43.230.65.168\n)\n\n => Array\n(\n => 39.53.196.221\n)\n\n => Array\n(\n => 42.111.17.83\n)\n\n => Array\n(\n => 110.39.12.34\n)\n\n => Array\n(\n => 45.118.158.169\n)\n\n => Array\n(\n => 202.142.110.165\n)\n\n => Array\n(\n => 106.201.13.212\n)\n\n => Array\n(\n => 103.211.14.94\n)\n\n => Array\n(\n => 160.202.37.105\n)\n\n => Array\n(\n => 103.99.199.34\n)\n\n => Array\n(\n => 183.83.45.104\n)\n\n => Array\n(\n => 49.36.233.107\n)\n\n => Array\n(\n => 182.68.21.51\n)\n\n => Array\n(\n => 110.227.93.182\n)\n\n => Array\n(\n => 180.178.144.251\n)\n\n => Array\n(\n => 129.0.102.0\n)\n\n => Array\n(\n => 124.253.105.176\n)\n\n => Array\n(\n => 105.156.139.225\n)\n\n => Array\n(\n => 208.117.87.154\n)\n\n => Array\n(\n => 138.68.185.17\n)\n\n => Array\n(\n => 43.247.41.207\n)\n\n => Array\n(\n => 49.156.106.105\n)\n\n => Array\n(\n => 223.238.197.124\n)\n\n => Array\n(\n => 202.47.39.96\n)\n\n => Array\n(\n => 223.226.131.80\n)\n\n => Array\n(\n => 122.161.48.139\n)\n\n => Array\n(\n => 106.201.144.12\n)\n\n => Array\n(\n => 122.178.223.244\n)\n\n => Array\n(\n => 195.181.164.65\n)\n\n => Array\n(\n => 106.195.12.187\n)\n\n => Array\n(\n => 124.253.48.48\n)\n\n => Array\n(\n => 103.140.30.214\n)\n\n => Array\n(\n => 180.178.147.132\n)\n\n => Array\n(\n => 138.197.139.130\n)\n\n => Array\n(\n => 5.254.2.138\n)\n\n => Array\n(\n => 183.81.93.25\n)\n\n => Array\n(\n => 182.70.39.254\n)\n\n => Array\n(\n => 106.223.87.131\n)\n\n => Array\n(\n => 106.203.91.114\n)\n\n => Array\n(\n => 196.70.137.128\n)\n\n => Array\n(\n => 150.242.62.167\n)\n\n => Array\n(\n => 184.170.243.198\n)\n\n => Array\n(\n => 59.89.30.66\n)\n\n => Array\n(\n => 49.156.112.201\n)\n\n => Array\n(\n => 124.29.212.168\n)\n\n => Array\n(\n => 103.204.170.238\n)\n\n => Array\n(\n => 124.253.116.81\n)\n\n => Array\n(\n => 41.248.102.107\n)\n\n => Array\n(\n => 119.160.100.51\n)\n\n => Array\n(\n => 5.254.40.91\n)\n\n => Array\n(\n => 103.149.154.25\n)\n\n => Array\n(\n => 103.70.41.28\n)\n\n => Array\n(\n => 103.151.234.42\n)\n\n => Array\n(\n => 39.37.142.107\n)\n\n => Array\n(\n => 27.255.186.115\n)\n\n => Array\n(\n => 49.15.193.151\n)\n\n => Array\n(\n => 103.201.146.115\n)\n\n => Array\n(\n => 223.228.177.70\n)\n\n => Array\n(\n => 182.179.141.37\n)\n\n => Array\n(\n => 110.172.131.126\n)\n\n => Array\n(\n => 45.116.232.0\n)\n\n => Array\n(\n => 193.37.32.206\n)\n\n => Array\n(\n => 119.152.62.246\n)\n\n => Array\n(\n => 180.178.148.228\n)\n\n => Array\n(\n => 195.114.145.120\n)\n\n => Array\n(\n => 122.160.49.194\n)\n\n => Array\n(\n => 103.240.237.17\n)\n\n => Array\n(\n => 103.75.245.238\n)\n\n => Array\n(\n => 124.253.215.148\n)\n\n => Array\n(\n => 45.118.165.146\n)\n\n => Array\n(\n => 103.75.244.111\n)\n\n => Array\n(\n => 223.185.7.42\n)\n\n => Array\n(\n => 139.5.240.165\n)\n\n => Array\n(\n => 45.251.117.204\n)\n\n => Array\n(\n => 132.154.71.227\n)\n\n => Array\n(\n => 178.92.100.97\n)\n\n => Array\n(\n => 49.48.248.42\n)\n\n => Array\n(\n => 182.190.109.252\n)\n\n => Array\n(\n => 43.231.57.209\n)\n\n => Array\n(\n => 39.37.185.133\n)\n\n => Array\n(\n => 123.17.79.174\n)\n\n => Array\n(\n => 180.178.146.215\n)\n\n => Array\n(\n => 41.248.83.40\n)\n\n => Array\n(\n => 103.255.4.79\n)\n\n => Array\n(\n => 103.39.119.233\n)\n\n => Array\n(\n => 85.203.44.24\n)\n\n => Array\n(\n => 93.74.18.246\n)\n\n => Array\n(\n => 95.142.120.51\n)\n\n => Array\n(\n => 202.47.42.57\n)\n\n => Array\n(\n => 41.202.219.253\n)\n\n => Array\n(\n => 154.28.188.182\n)\n\n => Array\n(\n => 14.163.178.106\n)\n\n => Array\n(\n => 118.185.57.226\n)\n\n => Array\n(\n => 49.15.141.102\n)\n\n => Array\n(\n => 182.189.86.47\n)\n\n => Array\n(\n => 111.88.68.79\n)\n\n => Array\n(\n => 156.146.59.8\n)\n\n => Array\n(\n => 119.152.62.82\n)\n\n => Array\n(\n => 49.207.128.103\n)\n\n => Array\n(\n => 203.212.30.234\n)\n\n => Array\n(\n => 41.202.219.254\n)\n\n => Array\n(\n => 103.46.203.10\n)\n\n => Array\n(\n => 112.79.141.15\n)\n\n => Array\n(\n => 103.68.218.75\n)\n\n => Array\n(\n => 49.35.130.14\n)\n\n => Array\n(\n => 172.247.129.90\n)\n\n => Array\n(\n => 116.90.74.214\n)\n\n => Array\n(\n => 180.178.142.242\n)\n\n => Array\n(\n => 111.119.183.59\n)\n\n => Array\n(\n => 117.5.103.189\n)\n\n => Array\n(\n => 203.110.93.146\n)\n\n => Array\n(\n => 188.163.97.86\n)\n\n => Array\n(\n => 124.253.90.47\n)\n\n => Array\n(\n => 139.167.249.160\n)\n\n => Array\n(\n => 103.226.206.55\n)\n\n => Array\n(\n => 154.28.188.191\n)\n\n => Array\n(\n => 182.190.197.205\n)\n\n => Array\n(\n => 111.119.183.33\n)\n\n => Array\n(\n => 14.253.254.64\n)\n\n => Array\n(\n => 117.237.197.246\n)\n\n => Array\n(\n => 172.105.53.82\n)\n\n => Array\n(\n => 124.253.207.164\n)\n\n => Array\n(\n => 103.255.4.33\n)\n\n => Array\n(\n => 27.63.131.206\n)\n\n => Array\n(\n => 103.118.170.99\n)\n\n => Array\n(\n => 111.119.183.55\n)\n\n => Array\n(\n => 14.182.101.109\n)\n\n => Array\n(\n => 175.107.223.199\n)\n\n => Array\n(\n => 39.57.168.94\n)\n\n => Array\n(\n => 122.182.213.139\n)\n\n => Array\n(\n => 112.79.214.237\n)\n\n => Array\n(\n => 27.6.252.22\n)\n\n => Array\n(\n => 89.163.212.83\n)\n\n => Array\n(\n => 182.189.23.1\n)\n\n => Array\n(\n => 49.15.222.253\n)\n\n => Array\n(\n => 125.63.97.110\n)\n\n => Array\n(\n => 223.233.65.159\n)\n\n => Array\n(\n => 139.99.159.18\n)\n\n => Array\n(\n => 45.118.165.137\n)\n\n => Array\n(\n => 39.52.2.167\n)\n\n => Array\n(\n => 39.57.141.24\n)\n\n => Array\n(\n => 27.5.32.145\n)\n\n => Array\n(\n => 49.36.212.33\n)\n\n => Array\n(\n => 157.33.218.32\n)\n\n => Array\n(\n => 116.71.4.122\n)\n\n => Array\n(\n => 110.93.244.176\n)\n\n => Array\n(\n => 154.73.203.156\n)\n\n => Array\n(\n => 136.158.30.235\n)\n\n => Array\n(\n => 122.161.53.72\n)\n\n => Array\n(\n => 106.203.203.156\n)\n\n => Array\n(\n => 45.133.7.22\n)\n\n => Array\n(\n => 27.255.180.69\n)\n\n => Array\n(\n => 94.46.244.3\n)\n\n => Array\n(\n => 43.242.178.157\n)\n\n => Array\n(\n => 171.79.189.215\n)\n\n => Array\n(\n => 37.117.141.89\n)\n\n => Array\n(\n => 196.92.32.64\n)\n\n => Array\n(\n => 154.73.203.157\n)\n\n => Array\n(\n => 183.83.176.14\n)\n\n => Array\n(\n => 106.215.84.145\n)\n\n => Array\n(\n => 95.142.120.12\n)\n\n => Array\n(\n => 190.232.110.94\n)\n\n => Array\n(\n => 179.6.194.47\n)\n\n => Array\n(\n => 103.62.155.172\n)\n\n => Array\n(\n => 39.34.156.177\n)\n\n => Array\n(\n => 122.161.49.120\n)\n\n => Array\n(\n => 103.58.155.253\n)\n\n => Array\n(\n => 175.107.226.20\n)\n\n => Array\n(\n => 206.81.28.165\n)\n\n => Array\n(\n => 49.36.216.36\n)\n\n => Array\n(\n => 104.223.95.178\n)\n\n => Array\n(\n => 122.177.69.35\n)\n\n => Array\n(\n => 39.57.163.107\n)\n\n => Array\n(\n => 122.161.53.35\n)\n\n => Array\n(\n => 182.190.102.13\n)\n\n => Array\n(\n => 122.161.68.95\n)\n\n => Array\n(\n => 154.73.203.147\n)\n\n => Array\n(\n => 122.173.125.2\n)\n\n => Array\n(\n => 117.96.140.189\n)\n\n => Array\n(\n => 106.200.244.10\n)\n\n => Array\n(\n => 110.36.202.5\n)\n\n => Array\n(\n => 124.253.51.144\n)\n\n => Array\n(\n => 176.100.1.145\n)\n\n => Array\n(\n => 156.146.59.20\n)\n\n => Array\n(\n => 122.176.100.151\n)\n\n => Array\n(\n => 185.217.117.237\n)\n\n => Array\n(\n => 49.37.223.97\n)\n\n => Array\n(\n => 101.50.108.80\n)\n\n => Array\n(\n => 124.253.155.88\n)\n\n => Array\n(\n => 39.40.208.96\n)\n\n => Array\n(\n => 122.167.151.154\n)\n\n => Array\n(\n => 172.98.89.13\n)\n\n => Array\n(\n => 103.91.52.6\n)\n\n => Array\n(\n => 106.203.84.5\n)\n\n => Array\n(\n => 117.216.221.34\n)\n\n => Array\n(\n => 154.73.203.131\n)\n\n => Array\n(\n => 223.182.210.117\n)\n\n => Array\n(\n => 49.36.185.208\n)\n\n => Array\n(\n => 111.119.183.30\n)\n\n => Array\n(\n => 39.42.107.13\n)\n\n => Array\n(\n => 39.40.15.174\n)\n\n => Array\n(\n => 1.38.244.65\n)\n\n => Array\n(\n => 49.156.75.252\n)\n\n => Array\n(\n => 122.161.51.99\n)\n\n => Array\n(\n => 27.73.78.57\n)\n\n => Array\n(\n => 49.48.228.70\n)\n\n => Array\n(\n => 111.119.183.18\n)\n\n => Array\n(\n => 116.204.252.218\n)\n\n => Array\n(\n => 73.173.40.248\n)\n\n => Array\n(\n => 223.130.28.81\n)\n\n => Array\n(\n => 202.83.58.81\n)\n\n => Array\n(\n => 45.116.233.31\n)\n\n => Array\n(\n => 111.119.183.1\n)\n\n => Array\n(\n => 45.133.7.66\n)\n\n => Array\n(\n => 39.48.204.174\n)\n\n => Array\n(\n => 37.19.213.30\n)\n\n => Array\n(\n => 111.119.183.22\n)\n\n => Array\n(\n => 122.177.74.19\n)\n\n => Array\n(\n => 124.253.80.59\n)\n\n => Array\n(\n => 111.119.183.60\n)\n\n => Array\n(\n => 157.39.106.191\n)\n\n => Array\n(\n => 157.47.86.121\n)\n\n => Array\n(\n => 47.31.159.100\n)\n\n => Array\n(\n => 106.214.85.144\n)\n\n => Array\n(\n => 182.189.22.197\n)\n\n => Array\n(\n => 111.119.183.51\n)\n\n => Array\n(\n => 202.47.35.57\n)\n\n => Array\n(\n => 42.108.33.220\n)\n\n => Array\n(\n => 180.178.146.158\n)\n\n => Array\n(\n => 124.253.184.239\n)\n\n => Array\n(\n => 103.165.20.8\n)\n\n => Array\n(\n => 94.178.239.156\n)\n\n => Array\n(\n => 72.255.41.142\n)\n\n => Array\n(\n => 116.90.107.102\n)\n\n => Array\n(\n => 39.36.164.250\n)\n\n => Array\n(\n => 124.253.195.172\n)\n\n => Array\n(\n => 203.142.218.149\n)\n\n => Array\n(\n => 157.43.165.180\n)\n\n => Array\n(\n => 39.40.242.57\n)\n\n => Array\n(\n => 103.92.43.150\n)\n\n => Array\n(\n => 39.42.133.202\n)\n\n => Array\n(\n => 119.160.66.11\n)\n\n => Array\n(\n => 138.68.3.7\n)\n\n => Array\n(\n => 210.56.125.226\n)\n\n => Array\n(\n => 157.50.4.249\n)\n\n => Array\n(\n => 124.253.81.162\n)\n\n => Array\n(\n => 103.240.235.141\n)\n\n => Array\n(\n => 132.154.128.20\n)\n\n => Array\n(\n => 49.156.115.37\n)\n\n => Array\n(\n => 45.133.7.48\n)\n\n => Array\n(\n => 122.161.49.137\n)\n\n => Array\n(\n => 202.47.46.31\n)\n\n => Array\n(\n => 192.140.145.148\n)\n\n => Array\n(\n => 202.14.123.10\n)\n\n => Array\n(\n => 122.161.53.98\n)\n\n => Array\n(\n => 124.253.114.113\n)\n\n => Array\n(\n => 103.227.70.34\n)\n\n => Array\n(\n => 223.228.175.227\n)\n\n => Array\n(\n => 157.39.119.110\n)\n\n => Array\n(\n => 180.188.224.231\n)\n\n => Array\n(\n => 132.154.188.85\n)\n\n => Array\n(\n => 197.210.227.207\n)\n\n => Array\n(\n => 103.217.123.177\n)\n\n => Array\n(\n => 124.253.85.31\n)\n\n => Array\n(\n => 123.201.105.97\n)\n\n => Array\n(\n => 39.57.190.37\n)\n\n => Array\n(\n => 202.63.205.248\n)\n\n => Array\n(\n => 122.161.51.100\n)\n\n => Array\n(\n => 39.37.163.97\n)\n\n => Array\n(\n => 43.231.57.173\n)\n\n => Array\n(\n => 223.225.135.169\n)\n\n => Array\n(\n => 119.160.71.136\n)\n\n => Array\n(\n => 122.165.114.93\n)\n\n => Array\n(\n => 47.11.77.102\n)\n\n => Array\n(\n => 49.149.107.198\n)\n\n => Array\n(\n => 192.111.134.206\n)\n\n => Array\n(\n => 182.64.102.43\n)\n\n => Array\n(\n => 124.253.184.111\n)\n\n => Array\n(\n => 171.237.97.228\n)\n\n => Array\n(\n => 117.237.237.101\n)\n\n => Array\n(\n => 49.36.33.19\n)\n\n => Array\n(\n => 103.31.101.241\n)\n\n => Array\n(\n => 129.0.207.203\n)\n\n => Array\n(\n => 157.39.122.155\n)\n\n => Array\n(\n => 197.210.85.120\n)\n\n => Array\n(\n => 124.253.219.201\n)\n\n => Array\n(\n => 152.57.75.92\n)\n\n => Array\n(\n => 169.149.195.121\n)\n\n => Array\n(\n => 198.16.76.27\n)\n\n => Array\n(\n => 157.43.192.188\n)\n\n => Array\n(\n => 119.155.244.221\n)\n\n => Array\n(\n => 39.51.242.216\n)\n\n => Array\n(\n => 39.57.180.158\n)\n\n => Array\n(\n => 134.202.32.5\n)\n\n => Array\n(\n => 122.176.139.205\n)\n\n => Array\n(\n => 151.243.50.9\n)\n\n => Array\n(\n => 39.52.99.161\n)\n\n => Array\n(\n => 136.144.33.95\n)\n\n => Array\n(\n => 157.37.205.216\n)\n\n => Array\n(\n => 217.138.220.134\n)\n\n => Array\n(\n => 41.140.106.65\n)\n\n => Array\n(\n => 39.37.253.126\n)\n\n => Array\n(\n => 103.243.44.240\n)\n\n => Array\n(\n => 157.46.169.29\n)\n\n => Array\n(\n => 92.119.177.122\n)\n\n => Array\n(\n => 196.240.60.21\n)\n\n => Array\n(\n => 122.161.6.246\n)\n\n => Array\n(\n => 117.202.162.46\n)\n\n => Array\n(\n => 205.164.137.120\n)\n\n => Array\n(\n => 171.237.79.241\n)\n\n => Array\n(\n => 198.16.76.28\n)\n\n => Array\n(\n => 103.100.4.151\n)\n\n => Array\n(\n => 178.239.162.236\n)\n\n => Array\n(\n => 106.197.31.240\n)\n\n => Array\n(\n => 122.168.179.251\n)\n\n => Array\n(\n => 39.37.167.126\n)\n\n => Array\n(\n => 171.48.8.115\n)\n\n => Array\n(\n => 157.44.152.14\n)\n\n => Array\n(\n => 103.77.43.219\n)\n\n => Array\n(\n => 122.161.49.38\n)\n\n => Array\n(\n => 122.161.52.83\n)\n\n => Array\n(\n => 122.173.108.210\n)\n\n => Array\n(\n => 60.254.109.92\n)\n\n => Array\n(\n => 103.57.85.75\n)\n\n => Array\n(\n => 106.0.58.36\n)\n\n => Array\n(\n => 122.161.49.212\n)\n\n => Array\n(\n => 27.255.182.159\n)\n\n => Array\n(\n => 116.75.230.159\n)\n\n => Array\n(\n => 122.173.152.133\n)\n\n => Array\n(\n => 129.0.79.247\n)\n\n => Array\n(\n => 223.228.163.44\n)\n\n => Array\n(\n => 103.168.78.82\n)\n\n => Array\n(\n => 39.59.67.124\n)\n\n => Array\n(\n => 182.69.19.120\n)\n\n => Array\n(\n => 196.202.236.195\n)\n\n => Array\n(\n => 137.59.225.206\n)\n\n => Array\n(\n => 143.110.209.194\n)\n\n => Array\n(\n => 117.201.233.91\n)\n\n => Array\n(\n => 37.120.150.107\n)\n\n => Array\n(\n => 58.65.222.10\n)\n\n => Array\n(\n => 202.47.43.86\n)\n\n => Array\n(\n => 106.206.223.234\n)\n\n => Array\n(\n => 5.195.153.158\n)\n\n => Array\n(\n => 223.227.127.243\n)\n\n => Array\n(\n => 103.165.12.222\n)\n\n => Array\n(\n => 49.36.185.189\n)\n\n => Array\n(\n => 59.96.92.57\n)\n\n => Array\n(\n => 203.194.104.235\n)\n\n => Array\n(\n => 122.177.72.33\n)\n\n => Array\n(\n => 106.213.126.40\n)\n\n => Array\n(\n => 45.127.232.69\n)\n\n => Array\n(\n => 156.146.59.39\n)\n\n => Array\n(\n => 103.21.184.11\n)\n\n => Array\n(\n => 106.212.47.59\n)\n\n => Array\n(\n => 182.179.137.235\n)\n\n => Array\n(\n => 49.36.178.154\n)\n\n => Array\n(\n => 171.48.7.128\n)\n\n => Array\n(\n => 119.160.57.96\n)\n\n => Array\n(\n => 197.210.79.92\n)\n\n => Array\n(\n => 36.255.45.87\n)\n\n => Array\n(\n => 47.31.219.47\n)\n\n => Array\n(\n => 122.161.51.160\n)\n\n => Array\n(\n => 103.217.123.129\n)\n\n => Array\n(\n => 59.153.16.12\n)\n\n => Array\n(\n => 103.92.43.226\n)\n\n => Array\n(\n => 47.31.139.139\n)\n\n => Array\n(\n => 210.2.140.18\n)\n\n => Array\n(\n => 106.210.33.219\n)\n\n => Array\n(\n => 175.107.203.34\n)\n\n => Array\n(\n => 146.196.32.144\n)\n\n => Array\n(\n => 103.12.133.121\n)\n\n => Array\n(\n => 103.59.208.182\n)\n\n => Array\n(\n => 157.37.190.232\n)\n\n => Array\n(\n => 106.195.35.201\n)\n\n => Array\n(\n => 27.122.14.83\n)\n\n => Array\n(\n => 194.193.44.5\n)\n\n => Array\n(\n => 5.62.43.245\n)\n\n => Array\n(\n => 103.53.80.50\n)\n\n => Array\n(\n => 47.29.142.233\n)\n\n => Array\n(\n => 154.6.20.63\n)\n\n => Array\n(\n => 173.245.203.128\n)\n\n => Array\n(\n => 103.77.43.231\n)\n\n => Array\n(\n => 5.107.166.235\n)\n\n => Array\n(\n => 106.212.44.123\n)\n\n => Array\n(\n => 157.41.60.93\n)\n\n => Array\n(\n => 27.58.179.79\n)\n\n => Array\n(\n => 157.37.167.144\n)\n\n => Array\n(\n => 119.160.57.115\n)\n\n => Array\n(\n => 122.161.53.224\n)\n\n => Array\n(\n => 49.36.233.51\n)\n\n => Array\n(\n => 101.0.32.8\n)\n\n => Array\n(\n => 119.160.103.158\n)\n\n => Array\n(\n => 122.177.79.115\n)\n\n => Array\n(\n => 107.181.166.27\n)\n\n => Array\n(\n => 183.6.0.125\n)\n\n => Array\n(\n => 49.36.186.0\n)\n\n => Array\n(\n => 202.181.5.4\n)\n\n => Array\n(\n => 45.118.165.144\n)\n\n => Array\n(\n => 171.96.157.133\n)\n\n => Array\n(\n => 222.252.51.163\n)\n\n => Array\n(\n => 103.81.215.162\n)\n\n => Array\n(\n => 110.225.93.208\n)\n\n => Array\n(\n => 122.161.48.200\n)\n\n => Array\n(\n => 119.63.138.173\n)\n\n => Array\n(\n => 202.83.58.208\n)\n\n => Array\n(\n => 122.161.53.101\n)\n\n => Array\n(\n => 137.97.95.21\n)\n\n => Array\n(\n => 112.204.167.123\n)\n\n => Array\n(\n => 122.180.21.151\n)\n\n => Array\n(\n => 103.120.44.108\n)\n\n => Array\n(\n => 49.37.220.174\n)\n\n => Array\n(\n => 1.55.255.124\n)\n\n => Array\n(\n => 23.227.140.173\n)\n\n => Array\n(\n => 43.248.153.110\n)\n\n => Array\n(\n => 106.214.93.101\n)\n\n => Array\n(\n => 103.83.149.36\n)\n\n => Array\n(\n => 103.217.123.57\n)\n\n => Array\n(\n => 193.9.113.119\n)\n\n => Array\n(\n => 14.182.57.204\n)\n\n => Array\n(\n => 117.201.231.0\n)\n\n => Array\n(\n => 14.99.198.186\n)\n\n => Array\n(\n => 36.255.44.204\n)\n\n => Array\n(\n => 103.160.236.42\n)\n\n => Array\n(\n => 31.202.16.116\n)\n\n => Array\n(\n => 223.239.49.201\n)\n\n => Array\n(\n => 122.161.102.149\n)\n\n => Array\n(\n => 117.196.123.184\n)\n\n => Array\n(\n => 49.205.112.105\n)\n\n => Array\n(\n => 103.244.176.201\n)\n\n => Array\n(\n => 95.216.15.219\n)\n\n => Array\n(\n => 103.107.196.174\n)\n\n => Array\n(\n => 203.190.34.65\n)\n\n => Array\n(\n => 23.227.140.182\n)\n\n => Array\n(\n => 171.79.74.74\n)\n\n => Array\n(\n => 106.206.223.244\n)\n\n => Array\n(\n => 180.151.28.140\n)\n\n => Array\n(\n => 165.225.124.114\n)\n\n => Array\n(\n => 106.206.223.252\n)\n\n => Array\n(\n => 39.62.23.38\n)\n\n => Array\n(\n => 112.211.252.33\n)\n\n => Array\n(\n => 146.70.66.242\n)\n\n => Array\n(\n => 222.252.51.38\n)\n\n => Array\n(\n => 122.162.151.223\n)\n\n => Array\n(\n => 180.178.154.100\n)\n\n => Array\n(\n => 180.94.33.94\n)\n\n => Array\n(\n => 205.164.130.82\n)\n\n => Array\n(\n => 117.196.114.167\n)\n\n => Array\n(\n => 43.224.0.189\n)\n\n => Array\n(\n => 154.6.20.59\n)\n\n => Array\n(\n => 122.161.131.67\n)\n\n => Array\n(\n => 70.68.68.159\n)\n\n => Array\n(\n => 103.125.130.200\n)\n\n => Array\n(\n => 43.242.176.147\n)\n\n => Array\n(\n => 129.0.102.29\n)\n\n => Array\n(\n => 182.64.180.32\n)\n\n => Array\n(\n => 110.93.250.196\n)\n\n => Array\n(\n => 139.135.57.197\n)\n\n => Array\n(\n => 157.33.219.2\n)\n\n => Array\n(\n => 205.253.123.239\n)\n\n => Array\n(\n => 122.177.66.119\n)\n\n => Array\n(\n => 182.64.105.252\n)\n\n => Array\n(\n => 14.97.111.154\n)\n\n => Array\n(\n => 146.196.35.35\n)\n\n => Array\n(\n => 103.167.162.205\n)\n\n => Array\n(\n => 37.111.130.245\n)\n\n => Array\n(\n => 49.228.51.196\n)\n\n => Array\n(\n => 157.39.148.205\n)\n\n => Array\n(\n => 129.0.102.28\n)\n\n => Array\n(\n => 103.82.191.229\n)\n\n => Array\n(\n => 194.104.23.140\n)\n\n => Array\n(\n => 49.205.193.252\n)\n\n => Array\n(\n => 222.252.33.119\n)\n\n => Array\n(\n => 173.255.132.114\n)\n\n => Array\n(\n => 182.64.148.162\n)\n\n => Array\n(\n => 175.176.87.8\n)\n\n => Array\n(\n => 5.62.57.6\n)\n\n => Array\n(\n => 119.160.96.229\n)\n\n => Array\n(\n => 49.205.180.226\n)\n\n => Array\n(\n => 95.142.120.59\n)\n\n => Array\n(\n => 183.82.116.204\n)\n\n => Array\n(\n => 202.89.69.186\n)\n\n => Array\n(\n => 39.48.165.36\n)\n\n => Array\n(\n => 192.140.149.81\n)\n\n => Array\n(\n => 198.16.70.28\n)\n\n => Array\n(\n => 103.25.250.236\n)\n\n => Array\n(\n => 106.76.202.244\n)\n\n => Array\n(\n => 47.8.8.165\n)\n\n => Array\n(\n => 202.5.145.213\n)\n\n => Array\n(\n => 106.212.188.243\n)\n\n => Array\n(\n => 106.215.89.2\n)\n\n => Array\n(\n => 119.82.83.148\n)\n\n => Array\n(\n => 123.24.164.245\n)\n\n => Array\n(\n => 187.67.51.106\n)\n\n => Array\n(\n => 117.196.119.95\n)\n\n => Array\n(\n => 95.142.120.66\n)\n\n => Array\n(\n => 156.146.59.35\n)\n\n => Array\n(\n => 49.205.213.148\n)\n\n => Array\n(\n => 111.223.27.206\n)\n\n => Array\n(\n => 49.205.212.86\n)\n\n => Array\n(\n => 103.77.42.103\n)\n\n => Array\n(\n => 110.227.62.25\n)\n\n => Array\n(\n => 122.179.54.140\n)\n\n => Array\n(\n => 157.39.239.81\n)\n\n => Array\n(\n => 138.128.27.234\n)\n\n => Array\n(\n => 103.244.176.194\n)\n\n => Array\n(\n => 130.105.10.127\n)\n\n => Array\n(\n => 103.116.250.191\n)\n\n => Array\n(\n => 122.180.186.6\n)\n\n => Array\n(\n => 101.53.228.52\n)\n\n => Array\n(\n => 39.57.138.90\n)\n\n => Array\n(\n => 197.156.137.165\n)\n\n => Array\n(\n => 49.37.155.78\n)\n\n => Array\n(\n => 39.59.81.32\n)\n\n => Array\n(\n => 45.127.44.78\n)\n\n => Array\n(\n => 103.58.155.83\n)\n\n => Array\n(\n => 175.107.220.20\n)\n\n => Array\n(\n => 14.255.9.197\n)\n\n => Array\n(\n => 103.55.63.146\n)\n\n => Array\n(\n => 49.205.138.81\n)\n\n => Array\n(\n => 45.35.222.243\n)\n\n => Array\n(\n => 203.190.34.57\n)\n\n => Array\n(\n => 205.253.121.11\n)\n\n => Array\n(\n => 154.72.171.177\n)\n\n => Array\n(\n => 39.52.203.37\n)\n\n => Array\n(\n => 122.161.52.2\n)\n\n => Array\n(\n => 82.145.41.170\n)\n\n => Array\n(\n => 103.217.123.33\n)\n\n => Array\n(\n => 103.150.238.100\n)\n\n => Array\n(\n => 125.99.11.182\n)\n\n => Array\n(\n => 103.217.178.70\n)\n\n => Array\n(\n => 197.210.227.95\n)\n\n => Array\n(\n => 116.75.212.153\n)\n\n => Array\n(\n => 212.102.42.202\n)\n\n => Array\n(\n => 49.34.177.147\n)\n\n => Array\n(\n => 173.242.123.110\n)\n\n => Array\n(\n => 49.36.35.254\n)\n\n => Array\n(\n => 202.47.59.82\n)\n\n => Array\n(\n => 157.42.197.119\n)\n\n => Array\n(\n => 103.99.196.250\n)\n\n => Array\n(\n => 119.155.228.244\n)\n\n => Array\n(\n => 130.105.160.170\n)\n\n => Array\n(\n => 78.132.235.189\n)\n\n => Array\n(\n => 202.142.186.114\n)\n\n => Array\n(\n => 115.99.156.136\n)\n\n => Array\n(\n => 14.162.166.254\n)\n\n => Array\n(\n => 157.39.133.205\n)\n\n => Array\n(\n => 103.196.139.157\n)\n\n => Array\n(\n => 139.99.159.20\n)\n\n => Array\n(\n => 175.176.87.42\n)\n\n => Array\n(\n => 103.46.202.244\n)\n\n => Array\n(\n => 175.176.87.16\n)\n\n => Array\n(\n => 49.156.85.55\n)\n\n => Array\n(\n => 157.39.101.65\n)\n\n => Array\n(\n => 124.253.195.93\n)\n\n => Array\n(\n => 110.227.59.8\n)\n\n => Array\n(\n => 157.50.50.6\n)\n\n => Array\n(\n => 95.142.120.25\n)\n\n => Array\n(\n => 49.36.186.141\n)\n\n => Array\n(\n => 110.227.54.161\n)\n\n => Array\n(\n => 88.117.62.180\n)\n\n => Array\n(\n => 110.227.57.8\n)\n\n => Array\n(\n => 106.200.36.21\n)\n\n => Array\n(\n => 202.131.143.247\n)\n\n => Array\n(\n => 103.46.202.4\n)\n\n => Array\n(\n => 122.177.78.217\n)\n\n => Array\n(\n => 124.253.195.201\n)\n\n => Array\n(\n => 27.58.17.91\n)\n\n => Array\n(\n => 223.228.143.162\n)\n\n => Array\n(\n => 119.160.96.233\n)\n\n => Array\n(\n => 49.156.69.213\n)\n\n => Array\n(\n => 41.80.97.54\n)\n\n => Array\n(\n => 122.176.207.193\n)\n\n => Array\n(\n => 45.118.156.6\n)\n\n => Array\n(\n => 157.39.154.210\n)\n\n => Array\n(\n => 103.48.197.173\n)\n\n => Array\n(\n => 103.46.202.98\n)\n\n => Array\n(\n => 157.43.214.102\n)\n\n => Array\n(\n => 180.191.125.73\n)\n\n => Array\n(\n => 157.39.57.227\n)\n\n => Array\n(\n => 119.152.107.157\n)\n\n => Array\n(\n => 103.166.58.254\n)\n\n => Array\n(\n => 139.135.54.30\n)\n\n => Array\n(\n => 185.199.102.101\n)\n\n => Array\n(\n => 59.103.204.4\n)\n\n => Array\n(\n => 202.14.123.34\n)\n\n => Array\n(\n => 103.48.197.243\n)\n\n => Array\n(\n => 39.34.158.129\n)\n\n => Array\n(\n => 156.146.59.38\n)\n\n => Array\n(\n => 110.227.51.220\n)\n\n => Array\n(\n => 157.45.123.212\n)\n\n => Array\n(\n => 110.227.52.20\n)\n\n => Array\n(\n => 43.242.176.136\n)\n\n => Array\n(\n => 223.233.71.146\n)\n\n => Array\n(\n => 216.73.160.38\n)\n\n)\n```\nLosing My Job: The farm and farmhouse\n Layout: Blue and Brown (Default) Author's Creation\n Home > Losing My Job\n\n# Losing My Job\n\nOctober 14th, 2020 at 04:19 pm\n\nSadness.", null, "The design company I have worked for over the last  8 years is dissolving and my clients and I have been transferred to a new owner. I'm pretty sad about it. I think I will continue getting my tiny monthly maintenance payments (like \\$125) but I doubt I will receive any new clients. I am also losing a lot of the free subscriptions I have been using all these years such as Photoshop, my email, etc. If I were to purchase all the things on my own it would cost well over \\$100 a month, therefore cancelling any income. But not having the subscriptions will affect my personal clients, and also my own projects. Sigh.\n\nThankfully I didn't depend on that income and have just used it for debt pay down. I am mostly sad about now being responsible for paying for all my programs, and because my boss was awesome and I will miss him. I usually fly to his house once a year and visit with his family. Hopefully we can stay in touch.\n\nNow I have to decide if I want to try to branch out and go back to freelancing, look for a new employer, or if I am going to take a bit of a hiatus because of Covid and my new baby.\n\nThe other design partner I have worked with has been giving me a little work lately. So I have that to keep my busy for now.\n\n### 7 Responses to “Losing My Job”\n\n1. Wink Says:\n\nLosing a job is tough, I'm so sorry. But hopefully some other doors will open for you! Take care.\n\n2. LivingAlmostLarge Says:\n\nI am so sorry for the job loss. Good luck with what you decide to do.\n\n3. My English Castle Says:\n\nOh, I'm sorry to hear that. It's good that you don't have to rely on that job, but still it was clear how much you enjoy it. Best of luck finding something.\n\n4. late.start Says:\n\nThat's rough. Even though you don't depend upon it for income, it sounds like there were aspects of it that you liked and were helpful to you.\n\n5. CB in the City Says:\n\nI'm sorry to hear that. Even though you don't rely on the income, it's sad when anyone loses a job!\n\n6. terri77 Says:\n\nSorry for the job loss. Maybe if you contact them about the subscriptions they’ll extend the same access to you?\n\n7. Petunia 100 Says:\n\nSorry to hear of the job loss.\n\n(Note: If you were logged in, we could automatically fill in these fields for you.)\n Name: * Email: Will not be published. Subscribe: Notify me of additional comments to this entry. URL: Verification: * Please spell out the number 4.  [ Why? ]\n\nvB Code: You can use these tags: [b] [i] [u] [url] [email]" ]
[ null, "https://www.savingadvice.com/forums/core/images/smilies/frown.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9801296,"math_prob":0.99936205,"size":1557,"snap":"2021-43-2021-49","text_gpt3_token_len":426,"char_repetition_ratio":0.14101739,"word_repetition_ratio":0.0,"special_character_ratio":0.31278098,"punctuation_ratio":0.10818713,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99972326,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-06T08:35:04Z\",\"WARC-Record-ID\":\"<urn:uuid:d8e34163-3696-46b5-b34a-579ffb6a2c03>\",\"Content-Length\":\"328511\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:10ca16bc-2cce-410a-930b-dc8647e7e625>\",\"WARC-Concurrent-To\":\"<urn:uuid:bd9c41bd-bfb9-4a06-bb87-8a17f50be01c>\",\"WARC-IP-Address\":\"173.231.200.26\",\"WARC-Target-URI\":\"https://klarose.savingadvice.com/2020/10/14/losing-my-job_221427/\",\"WARC-Payload-Digest\":\"sha1:K7IGFFDFYM5QHXTQ32ERSC7OHFO3SIIA\",\"WARC-Block-Digest\":\"sha1:XN4EDBKXWK4OYYS44RP3NMYJYANSR6TQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363290.59_warc_CC-MAIN-20211206072825-20211206102825-00235.warc.gz\"}"}
https://math.stackexchange.com/questions/2698401/how-to-solve-phin-n-for-n
[ "# How to solve $\\phi(n)=n$ for $n$?\n\nI wish to solve $\\phi(n)=n$ for $n$ where $\\phi(n)$ is the Euler's Totient function.\n\nI solved this by splitting this into three possible cases:\n\n($1$) $n$ is prime\n\n($2$) $n$ is composite\n\n($3$) $n=1$.\n\n($1$) gives contradiction as $\\phi(n)=n-1\\not=n$.\n\n($2$) gives contradiction as $\\phi(n)\\geq\\frac{1}{2}n$.\n\n($3$) Works and is the only left choice so we conclude that $n=1$.\n\nIs there a nicer way to answer this question?\n\n• $\\phi(n)\\geq\\frac{1}{2}n$ doesn't contradict $\\phi(n) = n$. Besides, it isn't true (look at $n = 6$). We also don't have $\\phi(n)\\leq \\frac12n$ (look at $n = 9$). – Arthur Mar 19 '18 at 7:22\n\nThere are only $n-1$ positive integers below $n$, so unless $\\gcd(n, n) = 1$ we must have $\\phi(n)\\leq n-1$.\nNote that $$n=\\phi(n)=n\\prod_p\\left(1-\\frac1p\\right)=n\\implies\\prod_p\\left(1-\\frac1p\\right)=1$$ which does not hold for any primes $p$, forcing $n=1$." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8431762,"math_prob":1.0000077,"size":417,"snap":"2019-51-2020-05","text_gpt3_token_len":141,"char_repetition_ratio":0.13075061,"word_repetition_ratio":0.0,"special_character_ratio":0.36211032,"punctuation_ratio":0.07865169,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000095,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-19T19:10:05Z\",\"WARC-Record-ID\":\"<urn:uuid:c641ec91-72ad-452b-8f47-a4fc7154c8e2>\",\"Content-Length\":\"142696\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:59cc3424-8f0f-4cf4-bec7-97d2e2917fea>\",\"WARC-Concurrent-To\":\"<urn:uuid:811d0b2e-b024-4988-9c7c-dca7d628937f>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/2698401/how-to-solve-phin-n-for-n\",\"WARC-Payload-Digest\":\"sha1:5GQZBIFAZENYA365VRJZZBGAACJ73ZWU\",\"WARC-Block-Digest\":\"sha1:MGCVO52OCOXVZ6ZTGSOWBBPZ4VALADTN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250594705.17_warc_CC-MAIN-20200119180644-20200119204644-00440.warc.gz\"}"}
https://ykbap.nobetcieczane.xyz/finding-the-area-of-polygons-using-the-coordinate-plane-worksheet-answers.html
[ "Area of Coordinate Polygons. Calculate the area of basic polygons drawn on a coordinate plane. Coordinate plane is a grid on which points can be plotted. The horizontal axis is labeled with positive numbers to the right of the vertical axis and negative numbers to the left of the vertical axis. Read More... Create and Print your own Math Worksheets First, number the vertices in order, going either clockwise or counter-clockwise, starting at any vertex.The area is then given by the formula. Where x1 is the x coordinate of vertex 1 and yn is the y coordinate of the nth vertex etc. Notice that the in the last term, the expression wraps around back to the first vertex again! Hope this helped.\n\n# Finding the area of polygons using the coordinate plane worksheet answers\n\n## F1 2019 spain car setup\n\nRattlegore server horde alliance ratio\n\nArea of Coordinate Polygons. Calculate the area of basic polygons drawn on a coordinate plane. Coordinate plane is a grid on which points can be plotted. The horizontal axis is labeled with positive numbers to the right of the vertical axis and negative numbers to the left of the vertical axis. Read More... Create and Print your own Math Worksheets Polygons Coordinates. Showing top 8 worksheets in the category - Polygons Coordinates. Some of the worksheets displayed are Name date, Lesson 8 drawing polygons on the coordinate plane, Identifying polygons 1, Drawing polygons on the coordinate plane, Area of coordinate polygons, 3 points in the coordinate, Geometry honors coordinate geometry proofs, Ordered pairs. Skin fungus treatment\n\nDraw polygons in the coordinate plane given coordinates for the vertices; use coordinates to find the length of a side joining points with the same first coordinate or the same second coordinate. Apply these techniques in the context of solving real-world and mathematical problems. Area Of Polygons On Coordinate Plane. Showing top 8 worksheets in the category - Area Of Polygons On Coordinate Plane. Some of the worksheets displayed are Name date, Perimeter and area of polygons g, Lesson 9 determining area and perimeter of polygons on, Lesson 9 determining area and perimeter of polygons on, Perimeter and area in the coordinate plane, 3 points in the coordinate, Perimeter ...\n\nPolygons Coordinates. Showing top 8 worksheets in the category - Polygons Coordinates. Some of the worksheets displayed are Name date, Lesson 8 drawing polygons on the coordinate plane, Identifying polygons 1, Drawing polygons on the coordinate plane, Area of coordinate polygons, 3 points in the coordinate, Geometry honors coordinate geometry proofs, Ordered pairs. Apr 11, 2013 · area and perimeter of polygons in coordinate plane LaabsMath. ... Polygons in the Coordinate Plane - Duration: ... Finding Area of Shapes on A Coordinate Plane - Duration: ... Draw polygons in a plane given coordinates for the vertices and find the length of a side (6.G.3) The vertices of a quadrilateral are A (2,4), B (3,9), C (&,8) and D (8,1). Draw the quadrilateral in a coordinate plane. The vertices of a rectangle are F (1,6), G (7,6), H (&,2) and J (1,2).\n\nArk claiming abandoned dinos pveMr xikheto 2020 baixarHow can you find the perimeter and area of a polygon in a coordinate plane? We need you to answer this question! If you know the answer to this question, please register to join our limited beta ... Area of Coordinate Polygons. Calculate the area of basic polygons drawn on a coordinate plane. Coordinate plane is a grid on which points can be plotted. The horizontal axis is labeled with positive numbers to the right of the vertical axis and negative numbers to the left of the vertical axis. Read More... Create and Print your own Math Worksheets The vertices of eight polygons are given below. For each polygon: Plot the points in the coordinate plane and connect the points in the order that they are listed. Color the shape the indicated color and identify the type of polygon it is. Find the area.\n\nThis Analyzing Polygons Using Coordinates Worksheet is suitable for 10th - 12th Grade. In this analyzing polygons worksheet, students find the slope of a line on a coordinate plane. They use the slope to identify parallel and perpendicular lines. 6.G.A.3: Draw polygons in the coordinate plane given coordinates for the vertices; use coordinates to find the length of a side joining points with the same first coordinate or the same second coordinate. Apply these techniques in the context of solving real-world and mathematical problems.\n\nMazda life expectancy\nWhy are there cockroaches in my shower\nSpca laurentides\nReact router exact with params\nGraphing Polygon And Area. Displaying top 8 worksheets found for - Graphing Polygon And Area. Some of the worksheets for this concept are Work, 6 area of regular polygons, Area of a rectangle, Perimeter and area in the coordinate plane, Polygons in the coordinate plane, Area of a shape, Name date, 6 introduction to polygons. Softphone for linuxChocolate serial cast in surya tv\nUsing Coordinates to Solve Perimeter & Area Problems ... Using coordinates, find the perimeter and area of a triangle whose vertices are the points (-8,0), (4,6), and (7,0). ... or the point's ..." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.79870117,"math_prob":0.9745566,"size":3767,"snap":"2020-10-2020-16","text_gpt3_token_len":778,"char_repetition_ratio":0.22747807,"word_repetition_ratio":0.51954395,"special_character_ratio":0.21104327,"punctuation_ratio":0.13908206,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9969947,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-03-28T23:31:50Z\",\"WARC-Record-ID\":\"<urn:uuid:de6df110-e846-401b-8944-f95f22db68a6>\",\"Content-Length\":\"51315\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c95e17eb-6c2e-49c6-ba07-180fa2c18493>\",\"WARC-Concurrent-To\":\"<urn:uuid:0967b8fb-437e-4cae-9a70-af81e1f4adf0>\",\"WARC-IP-Address\":\"104.27.168.242\",\"WARC-Target-URI\":\"https://ykbap.nobetcieczane.xyz/finding-the-area-of-polygons-using-the-coordinate-plane-worksheet-answers.html\",\"WARC-Payload-Digest\":\"sha1:E7QABVHXGZCT4D2YJYWOWCI33V7VWIGT\",\"WARC-Block-Digest\":\"sha1:QOUR3IIHCRP6MUDEZOW3IZSWX7Y24R6Z\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370493121.36_warc_CC-MAIN-20200328225036-20200329015036-00535.warc.gz\"}"}
https://www.automateexcel.com/formulas/compound-interest-calculate-excel/
[ "# Compound Interest Formula in Excel and Google Sheets\n\nThis tutorial will demonstrate various ways to calculate compound interest in Excel and Google Sheets.", null, "## What is Compound Interest?\n\nWhen you invest money, you can earn interest on your investment. Say, for example, you invest \\$3,000 with a 10% annual interest rate, compounded annually. One year from the initial investment (called the principal), you earn \\$300 (\\$3,000 x 0.10) in interest, so your investment is worth \\$3,300 (\\$3,000 + \\$300). For the next period, you earn interest based on the gross figure from the previous period: \\$330 (\\$3,300 x 0.10) because your investment was worth \\$3,300. Now, it is worth \\$3,630.\n\nThe general formula for compound interest is: FV = PV(1+r)n, where FV is future value, PV is present value, r is the interest rate per period, and n is the number of compounding periods.\n\n## How to Calculate Compound Interest in Excel\n\nOne of the easiest ways is to apply the formula: (gross figure) x (1 + interest rate per period).\n\nIf you are investing \\$1,000 with a 15% interest rate, compounded annually, below is how you would calculate the value of your investment after one year.\n\n``= B2 * (1 + \\$A2)``", null, "In this case B2 is the Principal, and A2 is the Interest Rate per Period. The “\\$” is used in the formula to fix the reference to column A, since the interest rate is constant in this example.\n\nYou can calculate the value of your investment after two years by simply copying and pasting the formula into cell D2, as shown below.", null, "C2 is the current gross figure. Notice how B2 automatically changes to C2, since the cell reference has changed. You could copy the formula over additional columns to calculate the compounded value in future years. We would recommend structuring a table like this (vertically instead of horizontally):\n\n### Rolling Total Compound Interest Table", null, "The process above for calculating compound interest is easy, but if you want to figure out the value of your investment after 10 years, for example, this process is not efficient. Instead you could use a generalized compound interest formula.\n\n## General Compound Interest Formula (for Daily, Weekly, Monthly, and Yearly Compounding)\n\nA more efficient way of calculating compound interest in Excel is applying the general interest formula: FV = PV(1+r)n, where FV is future value, PV is present value, r is the interest rate per period, and n is the number of compounding periods.\n\nSay, for instance that you are investing \\$5,000 with a 10% annual interest rate, compounded semi-annually, and you want to figure out the value of your investment after five years. The spreadsheet below shows how this calculation can be done on Excel.\n\n``= B1 * (1 + \\$B2/2)^(B3 * B4)``", null, "In this case, PV is the Principal, r is (Annual Interest Rate) / 2 because interest is compounded semi-annually (twice per year), n is (Compounding Periods per Year) x (Year), and FV is the Investment Value. This process is more efficient than the first one because you don’t have to calculate the gross figure after each period, saving quite a few calculation steps.\n\n## FV Function and Compound Interest\n\nLastly, you can calculate compound interest with Excel’s built-in Future Value Function. Similar to the previous process, the FV function calculates the future value of an investment based on the values of certain variables.", null, "The variables (as shown above) are:\nrate is the interest rate for each period.\n\nnper is the number of compounding periods.\n\npmt is the additional payment per period, and it is represented as a negative number. If there is no value for “pmt,” put a value of zero.\n\npv (optional) is the principal investment, which is also represented as a negative number. If there is no value for “pv,” you must include a value for “pmt.”\n\ntype (optional) indicates when additional payments occur. “0” indicates that the payments occur in the beginning of the period, and “1” indicates that the payments are due at the end of the period.\n\nThe previous semi-annual compound interest example can be completed with the FV function.\n\n``= FV(B2 / B3, B3 * B4, 0, -B1)``", null, "The “rate” is (Annual Interest Rate) / (Compounding Period per Year), “nper” is (Compounding Periods per Year) x (Years), “pmt” is 0, and “pv” is – (Principal).\n\nUnderstanding how to calculate compound interest is important for predicting investment performance, whether it’s for retirement planning or your personal portfolio, and Excel is an excellent tool to do so.", null, "" ]
[ null, "https://www.automateexcel.com/excel/wp-content/uploads/2020/06/Compound-Interest-Formula-in-Excel.png", null, "https://www.automateexcel.com/excel/wp-content/uploads/2016/05/compound-interest-formula-excel.png", null, "https://www.automateexcel.com/excel/wp-content/uploads/2016/05/excel-formula-for-compound-interest.png", null, "https://www.automateexcel.com/excel/wp-content/uploads/2020/06/excel-compound-interest-rolling-total.png", null, "https://www.automateexcel.com/excel/wp-content/uploads/2016/05/annual-compound-interest-excel.png", null, "https://www.automateexcel.com/excel/wp-content/uploads/2016/05/future-value-function-compound-interest.png", null, "https://www.automateexcel.com/excel/wp-content/uploads/2016/05/semi-annual-compound-interest-excel.png", null, "https://www.automateexcel.com/excel/wp-content/uploads/2020/06/Calculate-Compound-Interest-in-Google-Sheets.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9268788,"math_prob":0.98171324,"size":4614,"snap":"2023-14-2023-23","text_gpt3_token_len":1054,"char_repetition_ratio":0.17028199,"word_repetition_ratio":0.12113402,"special_character_ratio":0.2373212,"punctuation_ratio":0.11811024,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9993437,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16],"im_url_duplicate_count":[null,2,null,5,null,5,null,2,null,6,null,5,null,7,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-27T23:07:38Z\",\"WARC-Record-ID\":\"<urn:uuid:73807eff-3290-4301-97bb-bc6389c7d59a>\",\"Content-Length\":\"140003\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cf002c8c-57b5-4b3a-977f-a67a1ba89a8d>\",\"WARC-Concurrent-To\":\"<urn:uuid:27dcd26a-349c-40c2-a8f7-2e1fda9fd803>\",\"WARC-IP-Address\":\"172.66.43.120\",\"WARC-Target-URI\":\"https://www.automateexcel.com/formulas/compound-interest-calculate-excel/\",\"WARC-Payload-Digest\":\"sha1:CILN2Z76D53BGBRM2L4PLHB5HQAQYNMS\",\"WARC-Block-Digest\":\"sha1:PLQ5GYCVH4CLOZN24F557QP3DNCRY7S2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296948708.2_warc_CC-MAIN-20230327220742-20230328010742-00354.warc.gz\"}"}
https://vlsiverify.com/system-verilog/systemverilog-casting
[ "SystemVerilog Casting - VLSI Verify\n\nTutorials\n\nCasting is a process of converting from one data type into another data type for compatibility.\n\n## Importance of Casting\n\nIn SystemVerilog, a data type is essential to mention while declaring a variable and it can hold values of the same data type.\n\nFor example, the int data type can not hold real data type values. If we try doing so, it will lead to a compilation error. Casting helps to resolve this problem.\n\n## Types of Casting in SystemVerilog\n\nThere are two types of casting in SystemVerilog\n\n1. Static Casting\n2. Dynamic Casting\n\n### Static Casting in SystemVerilog\n\nAs the name suggests, static casting is only applicable to fixed data types. It does not apply to the Object-Oriented programming concept.\n\nSyntax:\n\n``<data_type>'(value or variable or expression)``\n1. It converts values or variables from one data type to another data type.\n2. Static casting is checked during compile time. So, there will not be any run time error.\n\n#### Static Casting Example\n\nIn the below example, real to int, int to real, a string to int, expression in casting, concatenation in casting is used.\n\n``````module casting_example;\nstring name;\nint num;\nreal r_num;\ninitial begin\nname = \"A\";\nr_num = 2.8;\n\nnum = int'(name); //Takes ascii value for string\nnum = int'(r_num);\n\nr_num = 2.125 + real'({4'h1, 4'hA}); // 'h1A = 'd26\nnum = int'((num == 65)?r_num: 4.7);\n\n\\$display(\"casting from string to int: num = %0d\", num);\n\\$display(\"casting from real to int: num = %0d\", num);\n\\$display(\"casting from int to real: r_num = %0f\", r_num);\n\\$display(\"casting an expression from real to int: num = %0d\", num);\nend\nendmodule``````\n\nOutput:\n\n``````casting from string to int: num = 65\ncasting from real to int: num = 3\ncasting from int to real: r_num = 28.125000\ncasting an expression from real to int: num = 28``````\n\n### Dynamic Casting in SystemVerilog\n\nDynamic casting is used to cast the assigned values to the variables that might not be ordinarily valid. The \\$cast is the system method.\n\nThe \\$cast can be either function or task\n\nSyntax:\n\n``````function int \\$cast(destination, source);\n``````\n\nIn both \\$cast as a function or task, \\$cast will try to assign source value or expression to the destination variable. If dynamic casting fails due to incompatible assignments, the destination variable will remain unchanged. The only difference between \\$cast as a function and as a task is mentioned below.\n\n\\$cast as a task: If \\$cast fails, it will cause a runtime error.\n\n\\$cast as a function: As \\$cast as a function returns 1 for legal casting, otherwise it returns 0. But run time error will not occur for failed casting and the destination variable will be unchanged.\n\n#### \\$cast as a task example\n\nIn the below example, dynamic casting is used where source variable is integer and desitination variable is enum variable. When value assignment happens for other values than enumerated one, casting fails so that simulation terminated with run time error.\n\n``````module dynamic_cast_example;\ntypedef enum {DIODE=10, BJT=100, MOSFET=250, FINFET=300} devices;\ninitial begin\ndevices dev;\n\n\\$cast(dev, 250 + 50);\n\\$display(\"A: Device used = %s\",dev.name());\n\n\\$cast(dev, 250 + 20);\n\\$display(\"B: Device used = %s\",dev.name());\nend\nendmodule``````\n\nOutput:\n\n``````A: Device used = FINFET\n\\$cast(dev, 250 + 20);\n|\n*E,INVCST (./testbench.sv,9|8): Invalid cast: the source expression can not be cast to the type of the destination variable.``````\n\n#### \\$cast as a function example\n\nThe first \\$cast is a valid assignment, and the second \\$cast has an invalid assignment. Notice that, simulation is not terminated with run time error.\n\n``````module dynamic_cast_example;\ntypedef enum {DIODE=10, BJT=100, MOSFET=250, FINFET=300} devices;\ninitial begin\ndevices dev;\n\nif(\\$cast(dev, 250 + 50))\n\\$display(\"A: Device used = %s\",dev.name());\nelse\n\\$display(\"A: Dynamic casting failed\");\n\nif(\\$cast(dev, 250 + 20))\n\\$display(\"B: Device used = %s\",dev.name());\nelse\n\\$display(\"B: Dynamic casting failed\");\nend\nendmodule``````\n\nOutput:\n\n``````A: Device used = FINFET\nB: Dynamic casting failed``````\n\nDynamic casting is also used to cast the parent class handle to its derived class as mentioned in Polymorphism section.\n\nSystem Verilog Tutorials" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.734618,"math_prob":0.96260685,"size":4177,"snap":"2023-40-2023-50","text_gpt3_token_len":1087,"char_repetition_ratio":0.13970764,"word_repetition_ratio":0.094512194,"special_character_ratio":0.26861385,"punctuation_ratio":0.16444983,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97138274,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-11-30T02:10:11Z\",\"WARC-Record-ID\":\"<urn:uuid:5ebd1ee8-d702-4d0c-a00e-5133e5a9eca2>\",\"Content-Length\":\"203938\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0bb6be2b-5740-44f6-bd08-acea5995d77d>\",\"WARC-Concurrent-To\":\"<urn:uuid:229f2d84-618f-4dd0-adec-38a67b83c849>\",\"WARC-IP-Address\":\"3.210.81.252\",\"WARC-Target-URI\":\"https://vlsiverify.com/system-verilog/systemverilog-casting\",\"WARC-Payload-Digest\":\"sha1:GXYRL25DBANJYZJDP65YVPF4O6I5VKIE\",\"WARC-Block-Digest\":\"sha1:CFAWNH2WHNKKTCSWYYGJNUF4LTJG6L7Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100164.15_warc_CC-MAIN-20231130000127-20231130030127-00205.warc.gz\"}"}
https://www.theschoolrun.com/primary-school-maths
[ "", null, "# What your child learns in maths at primary school", null, "Unsure about what your child will be learning in maths at primary school? Here’s your guide to what your child will learn from EYFS (Nursery & Reception), through Key Stage 1 (Years 1 and 2) to the end of Key Stage 2 (Years 3, 4, 5 and 6).\n\nThere is a lot more to maths at primary school than addition, subtraction and reciting the times tables! Here’s a rundown of all the things your child will be learning – from number recognition in Nursery through to equivalent fractions in Year 6 – with lots of suggestions for how you can use TheSchoolRun to support their numeracy learning journey.\n\n## Maths in Early Years Foundation Stage\n\nProblem solving, reasoning and numeracy are the first stage of maths. Your child will be playing with numbers every day and using a range of familiar objects to help them understand basic mathematical ideas. They will be playing number games, singing counting songs, making models and using a role-play area, such as a pretend shop or cafe. Maths will also be linked to any topic work they are doing. Areas they will be covering will include:\n\n• Counting up to ten and beyond\n• Recognising numbers up to nine\n• Counting on and back using a number line\n• Counting out a number of objects from a group\n• Sharing objects into equal groups\n• Understanding that ‘addition’ means adding on, and ‘subtraction’ means taking away\n• Finding the total number of objects in two groups by counting them all\n• Naming and describing the shape and size of 2D and 3D shapes\n• Creating their own patterns\n• Building models and shapes\n\nSome useful worksheets to support EYFS maths:\n\nFor more information about Reception maths read our guide to the way it's taught in this year group, with suggestions for practical activities to do at home, too.\n\n## Maths In Key Stage 1\n\nChildren in KS1 will be learning about maths in a practical hands-on way, using everyday objects to solve problems and do simple calculations. They will be working individually, as a whole class and in groups, and will be learning to think about the methods they use for solving problems. They will be talking about their methods and using pictures, lists and tables to present their results.\n\n### What your child will be learning in KS1 maths\n\n• Reading and writing numbers 0 to 20 and beyond\n• Counting up to 100 objects and beyond\n• Learning which pairs of numbers add up to 20 (number bonds)\n• Recognising number patterns\nOdd and even numbers\n• Using a number line\n• The 2, 5 and 10 times tables, plus division facts\n• Adding and subtracting one-digit and two-digit numbers\n• Doubling and halving\n• Finding a quarter, a third and a half of a shape or quantity\n• Simple mental maths\n• Recognising, naming and describing shapes\n• Using shapes to make models and pictures\n• Finding lines of symmetry\n• Measuring and weighing\n• Addition and subtraction of small amounts of money\n• Knowing that a quarter turn is a right angle\n• Recognising and using mathematical symbols\n• Drawing and interpreting block graphs and pictograms\n• Telling the time on an analogue clock to the nearest five minutes\n• Naming and describing 2D and 3D shapes\n\nSome useful worksheets to support KS1 maths:\n\nFor more information about what your child learns in Y1 maths read our detailed outline of the curriculum; for Y2 maths you'll find KS1 SATs preparation ideas and tips from teachers.\n\n## Maths in Key Stage 2\n\nDuring KS2 the children become much more confident with maths: they are adding, subtracting, multiplying and dividing, as well as doing mental calculations and solving problems using time, measure or money. By the end of Year 6 the children should have a secure grasp of their times tables up to 10. Calculators are introduced during this Key Stage, and the children are taught how to use them correctly.\n\n### What your child will learn in KS2 maths:\n\n• Order, partition and round numbers to three decimal places\nNegative numbers\nFactors and multiples\nPrime numbers less than 100\nSquare numbers\nCube numbers\n• All the times tables up to 12 x 12\n• Add, subtract, divide and multiply numbers of up to four digits\n• Know equivalents between decimals, fractions and percentages\nRatio and proportion\nAlgebra (taught in Year 6)\n• Problems involving decimals, fractions and percentages\n• Use of brackets\n• Measure and draw acute, obtuse, reflex and right angles\n• Calculate the sum of angles around a point, on a straight line and (only in Year 6) in a triangle and quadrilateral\n• Calculate perimeter and area\n• Visualise and describe 2D and 3D shapes\n• Symmetry\nRotation, reflection and translation of shapes\n• Measure length, mass and capacity\n• Convert units of measurement\n• Tell the time from a 12- or 24-hour clock and calculate time intervals\n• Draw and interpret line graphs, bar charts, pie charts and pictograms\n• Calculate the mean, median and mode average, plus the range (from September 2015, only the mean will be taught, in Year 6)\nProbability\n\nSome useful worksheets to support KS2 maths:\n\nFor more information about Y3 maths, Y4 maths, Y5 maths and Y6 maths read our guides to each year group and what is taught when.\n\nTo find specific resources to help support your child at home, browse all KS2 maths worksheets." ]
[ null, "https://www.facebook.com/tr", null, "https://www.theschoolrun.com/sites/theschoolrun.com/files/styles/188-148/public/article_images/img_4959.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9145797,"math_prob":0.9199156,"size":5192,"snap":"2020-10-2020-16","text_gpt3_token_len":1155,"char_repetition_ratio":0.124325365,"word_repetition_ratio":0.02090209,"special_character_ratio":0.21552388,"punctuation_ratio":0.07034632,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9923425,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-16T22:21:44Z\",\"WARC-Record-ID\":\"<urn:uuid:d3d8cb4d-7ec4-4cb4-be88-c7fb36a66e71>\",\"Content-Length\":\"85540\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:48dc7dcf-7b7d-4f63-aa28-037262a9ac32>\",\"WARC-Concurrent-To\":\"<urn:uuid:bd970f26-9b7e-4309-b7ba-c9f797580685>\",\"WARC-IP-Address\":\"104.31.79.194\",\"WARC-Target-URI\":\"https://www.theschoolrun.com/primary-school-maths\",\"WARC-Payload-Digest\":\"sha1:D3OQ7E3MD6FUDAA6J4KQQ2WVTWLQPSPL\",\"WARC-Block-Digest\":\"sha1:NO4WIKHAW7HSXXHVWD6BEGU6Z72UAQ52\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875141430.58_warc_CC-MAIN-20200216211424-20200217001424-00412.warc.gz\"}"}
https://study.sagepub.com/sue2/student-resources/chapter-1/excel-functions
[ "# Excel Functions\n\nAVERAGEIF\n\nThe AVERAGEIF function is used to calculate the average (mean) value of a range of numbers based on a condition. (2:26)\n\n## COUNTIF\n\nThe COUNTIF function is used to count values based on a condition. (01:34)\n\n## IF\n\nThe IF function is used to return a value based on a true/false condition. (1:59)\n\n## SUBTOTAL\n\nThe SUBTOTAL function is used to calculate subtotals and grandtotals. (2:50)\n\n## SUMIF\n\nThe SUMIF function can is to aggregate a range of numbers based on a condition. (2:07)\n\n## Summary Statistics\n\nThis video contains examples of the following summary statistics: Mean, Median, Mode, Standard Deviation, Maximum, Minimum, Range. (3:32)\n\n## VLOOKUP\n\nThe VLOOKUP function is used to lookup values in a range of cells and return a corresponding value. (3:08)\n\n## VLOOKUP Age Range\n\nThis video shows how to use VLOOKUP to ages to predefined ranges for reporting. (3:03)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7992627,"math_prob":0.9028294,"size":859,"snap":"2022-40-2023-06","text_gpt3_token_len":217,"char_repetition_ratio":0.14853801,"word_repetition_ratio":0.073529415,"special_character_ratio":0.23981373,"punctuation_ratio":0.13372093,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9990496,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-27T11:27:24Z\",\"WARC-Record-ID\":\"<urn:uuid:26bb7e11-8fc4-48d6-bfef-6a274eb17c9a>\",\"Content-Length\":\"52532\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:33430e4d-db74-4f00-9bfc-afc803da61b8>\",\"WARC-Concurrent-To\":\"<urn:uuid:0790dac0-a8d7-48b9-8fc0-ae8a8240012a>\",\"WARC-IP-Address\":\"23.185.0.2\",\"WARC-Target-URI\":\"https://study.sagepub.com/sue2/student-resources/chapter-1/excel-functions\",\"WARC-Payload-Digest\":\"sha1:CIPXNXMGUXF6Y4NEXXVA44J6JF6HZYBJ\",\"WARC-Block-Digest\":\"sha1:MVEBHXD77UF3ULPGYXLZWA64EMDHJYZA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764494976.72_warc_CC-MAIN-20230127101040-20230127131040-00299.warc.gz\"}"}
https://www.imsc.res.in/~vikram/lpco/lpco.html
[ "### LPCO\n\n#### Tentative Schedule\n\n• Lecture 1: Admin matters, Introduction, Optimization problems, Convexity, Convex opt, general overview.\n• Lecture 2: Two forms of LP (canonical and equational form), basic feasible solutions.\n• Lecture 3: Some Geometry behind LP (linear spaces, affine spaces, ...).\n• Lecture 4: Starting examples of the simplex method, and introduction to the simplex tableau.\n• Lecture 5: A historical viewpoint of the simplex method, completing the argument for correctness of the method.\n• Lecture 6: Getting initial feasible solutions, pivot rules, termiantion and cycling.\n• Lecture 7: Lower bound on worst case (Klee-Minty example), Kalai-Kleitman bound on diameter of polyhedra.\n• Lecture 8: Randomized algorithms for lp (Clarkson's algorithms, Matousek-Sharir-Welzl).\n• Lecture 9: Randomized algorithms for lp continued (Clarkson's algorithms, Matousek-Sharir-Welzl).\n• Lecture 10: Randomized algorithms for lp continued (Clarkson's algorithms, Matousek-Sharir-Welzl).\n• Lecture 11: Abstract LP-type problems.\n• Lecture 12: Fundamental theorem of linear inequalities.\n• Lecture 13: Equivalence of Polyhedral cones and finitely generated cones (Farkas-Minkowski-Weyl).\n• Lecture 14: Fundamental Theorem of Polyhedra theory and (variants of) Farkas's Lemma.\n• Lecture 15: Duality in LP (algebraic viewpoint, and proof via Simplex method).\n• Lecture 16: Duality in LP (proof based on Farkas's lemma, geometric viewpoint and applications).\n• Lecture 17: Ellipsoid method (introduction, optimization reduced to feasibility, basics of ellipsoids).\n• Lecture 18: Ellipsoid method (lower bounds on volume of simplices, algorithm details).\n• Lecture 19: Ellipsoid method (algorithm analysis, feasibility to separation, weak violation using weak separation oracle).\n• Lecture 20: Interior point methods (via non-linear constrained optimization).\n• Lecture 21: Interior point methods (the algorithm).\n• Lecture 22: Interior point methods (convergence analysis).\n• Lecture 23: The perfect matching polytope.\n• Lecture 24: Goemans-Williamson -- Approximating max-cut.\n• Lecture 25: GW -- tightness of the approximation ratio. Vector programming and SDP.\n• Lecture 26: Dualtiy in SDP.\nNotes will be updated after every lecture.\n\n### References\n\n#### Books and Papers\n\n• B. Gartner and J. Matousek: Understanding and using linear programming\n• Schrijver: Theory of Linear and Integer Programming" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7268621,"math_prob":0.95040727,"size":2472,"snap":"2020-10-2020-16","text_gpt3_token_len":630,"char_repetition_ratio":0.17382497,"word_repetition_ratio":0.037572253,"special_character_ratio":0.23584142,"punctuation_ratio":0.20714286,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9895335,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-20T21:59:43Z\",\"WARC-Record-ID\":\"<urn:uuid:012c933b-fe0a-4a05-864a-175379f13d66>\",\"Content-Length\":\"4087\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ccf10c32-8bcb-4c43-b415-ac121b9b2c9d>\",\"WARC-Concurrent-To\":\"<urn:uuid:71ef4426-75c5-485a-9144-fc457607e9bf>\",\"WARC-IP-Address\":\"61.95.189.10\",\"WARC-Target-URI\":\"https://www.imsc.res.in/~vikram/lpco/lpco.html\",\"WARC-Payload-Digest\":\"sha1:BGOWHKZVNIY6WCIKRNWMDMKEOM4IH5WJ\",\"WARC-Block-Digest\":\"sha1:4POA4QJGZGI5FHYKNGNLVSLB3QTNMOP4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875145282.57_warc_CC-MAIN-20200220193228-20200220223228-00030.warc.gz\"}"}
https://machinelearningmastery.com/how-to-implement-the-frechet-inception-distance-fid-from-scratch/
[ "SALE! Use code blackfriday for 40% off everything!\nHurry, sale ends soon! Click to see the full catalog.\n\n# How to Implement the Frechet Inception Distance (FID) for Evaluating GANs\n\nLast Updated on October 11, 2019\n\nThe Frechet Inception Distance score, or FID for short, is a metric that calculates the distance between feature vectors calculated for real and generated images.\n\nThe score summarizes how similar the two groups are in terms of statistics on computer vision features of the raw images calculated using the inception v3 model used for image classification. Lower scores indicate the two groups of images are more similar, or have more similar statistics, with a perfect score being 0.0 indicating that the two groups of images are identical.\n\nThe FID score is used to evaluate the quality of images generated by generative adversarial networks, and lower scores have been shown to correlate well with higher quality images.\n\nIn this tutorial, you will discover how to implement the Frechet Inception Distance for evaluating generated images.\n\nAfter completing this tutorial, you will know:\n\n• The Frechet Inception Distance summarizes the distance between the Inception feature vectors for real and generated images in the same domain.\n• How to calculate the FID score and implement the calculation from scratch in NumPy.\n• How to implement the FID score using the Keras deep learning library and calculate it with real images.\n\nKick-start your project with my new book Generative Adversarial Networks with Python, including step-by-step tutorials and the Python source code files for all examples.\n\nLet’s get started.\n\n• Updated Oct 2019: Fixed minor typo in the description of the method.", null, "How to Implement the Frechet Inception Distance (FID) From Scratch for Evaluating Generated Images\nPhoto by dronepicr, some rights reserved.\n\n## Tutorial Overview\n\nThis tutorial is divided into five parts; they are:\n\n1. What Is the Frechet Inception Distance?\n2. How to Calculate the Frechet Inception Distance\n3. How to Implement the Frechet Inception Distance With NumPy\n4. How to Implement the Frechet Inception Distance With Keras\n5. How to Calculate the Frechet Inception Distance for Real Images\n\n## What Is the Frechet Inception Distance?\n\nThe Frechet Inception Distance, or FID for short, is a metric for evaluating the quality of generated images and specifically developed to evaluate the performance of generative adversarial networks.\n\nThe FID score was proposed and used by Martin Heusel, et al. in their 2017 paper titled “GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium.”\n\nThe score was proposed as an improvement over the existing Inception Score, or IS.\n\nFor the evaluation of the performance of GANs at image generation, we introduce the “Frechet Inception Distance” (FID) which captures the similarity of generated images to real ones better than the Inception Score.\n\nThe inception score estimates the quality of a collection of synthetic images based on how well the top-performing image classification model Inception v3 classifies them as one of 1,000 known objects. The scores combine both the confidence of the conditional class predictions for each synthetic image (quality) and the integral of the marginal probability of the predicted classes (diversity).\n\nThe inception score does not capture how synthetic images compare to real images. The goal in developing the FID score was to evaluate synthetic images based on the statistics of a collection of synthetic images compared to the statistics of a collection of real images from the target domain.\n\nDrawback of the Inception Score is that the statistics of real world samples are not used and compared to the statistics of synthetic samples.\n\nLike the inception score, the FID score uses the inception v3 model. Specifically, the coding layer of the model (the last pooling layer prior to the output classification of images) is used to capture computer-vision-specific features of an input image. These activations are calculated for a collection of real and generated images.\n\nThe activations are summarized as a multivariate Gaussian by calculating the mean and covariance of the images. These statistics are then calculated for the activations across the collection of real and generated images.\n\nThe distance between these two distributions is then calculated using the Frechet distance, also called the Wasserstein-2 distance.\n\nThe difference of two Gaussians (synthetic and real-world images) is measured by the Frechet distance also known as Wasserstein-2 distance.\n\nThe use of activations from the Inception v3 model to summarize each image gives the score its name of “Frechet Inception Distance.”\n\nA lower FID indicates better-quality images; conversely, a higher score indicates a lower-quality image and the relationship may be linear.\n\nThe authors of the score show that lower FID scores correlate with better-quality images when systematic distortions were applied such as the addition of random noise and blur.", null, "Example of How Increased Distortion of an Image Correlates with High FID Score.\nTaken from: GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium.\n\n## How to Calculate the Frechet Inception Distance\n\nThe FID score is calculated by first loading a pre-trained Inception v3 model.\n\nThe output layer of the model is removed and the output is taken as the activations from the last pooling layer, a global spatial pooling layer.\n\nThis output layer has 2,048 activations, therefore, each image is predicted as 2,048 activation features. This is called the coding vector or feature vector for the image.\n\nA 2,048 feature vector is then predicted for a collection of real images from the problem domain to provide a reference for how real images are represented. Feature vectors can then be calculated for synthetic images.\n\nThe result will be two collections of 2,048 feature vectors for real and generated images.\n\nThe FID score is then calculated using the following equation taken from the paper:\n\n• d^2 = ||mu_1 – mu_2||^2 + Tr(C_1 + C_2 – 2*sqrt(C_1*C_2))\n\nThe score is referred to as d^2, showing that it is a distance and has squared units.\n\nThe “mu_1” and “mu_2” refer to the feature-wise mean of the real and generated images, e.g. 2,048 element vectors where each element is the mean feature observed across the images.\n\nThe C_1 and C_2 are the covariance matrix for the real and generated feature vectors, often referred to as sigma.\n\nThe ||mu_1 – mu_2||^2 refers to the sum squared difference between the two mean vectors. Tr refers to the trace linear algebra operation, e.g. the sum of the elements along the main diagonal of the square matrix.\n\nThe sqrt is the square root of the square matrix, given as the product between the two covariance matrices.\n\nThe square root of a matrix is often also written as M^(1/2), e.g. the matrix to the power of one half, which has the same effect. This operation can fail depending on the values in the matrix because the operation is solved using numerical methods. Commonly, some elements in the resulting matrix may be imaginary, which often can be detected and removed.\n\n### Want to Develop GANs from Scratch?\n\nTake my free 7-day email crash course now (with sample code).\n\nClick to sign-up and also get a free PDF Ebook version of the course.\n\n## How to Implement the Frechet Inception Distance With NumPy\n\nImplementing the calculation of the FID score in Python with NumPy arrays is straightforward.\n\nFirst, let’s define a function that will take a collection of activations for real and generated images and return the FID score.\n\nThe calculate_fid() function listed below implements the procedure.\n\nHere, we implement the FID calculation almost directly. It is worth noting that the official implementation in TensorFlow implements elements of the calculation in a slightly different order, likely for efficiency, and introduces additional checks around the matrix square root to handle possible numerical instabilities.\n\nI recommend reviewing the official implementation and extending the implementation below to add these checks if you experience problems calculating the FID on your own datasets.\n\nWe can then test out this function to calculate the inception score for some contrived feature vectors.\n\nFeature vectors will probably contain small positive values and will have a length of 2,048 elements. We can construct two lots of 10 images worth of feature vectors with small random numbers as follows:\n\nOne test would be to calculate the FID between a set of activations and itself, which we would expect to have a score of 0.0.\n\nWe can then calculate the distance between the two sets of random activations, which we would expect to be a large number.\n\nTying this all together, the complete example is listed below.\n\nRunning the example first reports the FID between the act1 activations and itself, which is 0.0 as we expect (Note: the sign of the score can be ignored).\n\nThe distance between the two collections of random activations is also as we expect: a large number, which in this case was 358.\n\nYou may want to experiment with the calculation of the FID score and test other pathological cases.\n\n## How to Implement the Frechet Inception Distance With Keras\n\nNow that we know how to calculate the FID score and to implement it in NumPy, we can develop an implementation in Keras.\n\nThis involves the preparation of the image data and using a pretrained Inception v3 model to calculate the activations or feature vectors for each image.\n\nFirst, we can load the Inception v3 model in Keras directly.\n\nThis will prepare a version of the inception model for classifying images as one of 1,000 known classes. We can remove the output (the top) of the model via the include_top=False argument. Painfully, this also removes the global average pooling layer that we require, but we can add it back via specifying the pooling=’avg’ argument.\n\nWhen the output layer of the model is removed, we must specify the shape of the input images, which is 299x299x3 pixels, e.g. the input_shape=(299,299,3) argument.\n\nTherefore, the inception model can be loaded as follows:\n\nThis model can then be used to predict the feature vector for one or more images.\n\nOur images are likely to not have the required shape. We will use the scikit-image library to resize the NumPy array of pixel values to the required size. The scale_images() function below implements this.\n\nNote, you may need to install the scikit-image library. This can be achieved as follows:\n\nOnce resized, the image pixel values will also need to be scaled to meet the expectations for inputs to the inception model. This can be achieved by calling the preprocess_input() function.\n\nWe can update our calculate_fid() function defined in the previous section to take the loaded inception model and two NumPy arrays of image data as arguments, instead of activations. The function will then calculate the activations before calculating the FID score as before.\n\nThe updated version of the calculate_fid() function is listed below.\n\nWe can then test this function with some contrived collections of images, in this case, 10 32×32 images with random pixel values in the range [0,255].\n\nWe can then convert the integer pixel values to floating point values and scale them to the required size of 299×299 pixels.\n\nThen the pixel values can be scaled to meet the expectations of the Inception v3 model.\n\nThen calculate the FID scores, first between a collection of images and itself, then between the two collections of images.\n\nTying all of this together, the complete example is listed below.\n\nRunning the example first summarizes the shapes of the fabricated images and their rescaled versions, matching our expectations.\n\nNote: the first time the InceptionV3 model is used, Keras will download the model weights and save them into the ~/.keras/models/ directory on your workstation. The weights are about 100 megabytes and may take a moment to download depending on the speed of your internet connection.\n\nThe FID score between a given set of images and itself is 0.0, as we expect, and the distance between the two collections of random images is about 35.\n\n## How to Calculate the Frechet Inception Distance for Real Images\n\nIt may be useful to calculate the FID score between two collections of real images.\n\nThe Keras library provides a number of computer vision datasets, including the CIFAR-10 dataset. These are color photos with the small size of 32×32 pixels and is split into train and test elements and can be loaded as follows:\n\nThe training dataset has 50,000 images, whereas the test dataset has only 10,000 images. It may be interesting to calculate the FID score between these two datasets to get an idea of how representative the test dataset is of the training dataset.\n\nScaling and scoring 50K images takes a long time, therefore, we can reduce the “training set” to a 10K random sample as follows:\n\nTying this all together, we can calculate the FID score between a sample of the train and the test dataset as follows.\n\nRunning the example may take some time depending on the speed of your workstation.\n\nAt the end of the run, we can see that the FID score between the train and test datasets is about five.\n\nThis section provides more resources on the topic if you are looking to go deeper.\n\n## Summary\n\nIn this tutorial, you discovered how to implement the Frechet Inception Distance for evaluating generated images.\n\nSpecifically, you learned:\n\n• The Frechet Inception Distance summarizes the distance between the Inception feature vectors for real and generated images in the same domain.\n• How to calculate the FID score and implement the calculation from scratch in NumPy.\n• How to implement the FID score using the Keras deep learning library and calculate it with real images.\n\nDo you have any questions?\n\n## Develop Generative Adversarial Networks Today!", null, "#### Develop Your GAN Models in Minutes\n\n...with just a few lines of python code\n\nDiscover how in my new Ebook:\n\nIt provides self-study tutorials and end-to-end projects on:\nDCGAN, conditional GANs, image translation, Pix2Pix, CycleGAN\nand much more...\n\n### 34 Responses to How to Implement the Frechet Inception Distance (FID) for Evaluating GANs\n\n1.", null, "Ismail September 4, 2019 at 2:50 pm #\n\nHi Jason,\n\nThanks a lot for your tutorials and keep touching lives with your awesome tutorials.\n\n•", null, "Jason Brownlee September 5, 2019 at 6:47 am #\n\n2.", null, "Mr Conan November 14, 2019 at 1:19 pm #\n\nHi Jason,\n\nMay I know is this method suitable to measure for synthetic time series data? Or is there any suitable approach to measure?\n\n•", null, "Jason Brownlee November 14, 2019 at 1:45 pm #\n\nNo.\n\nI’m not sure off the cuff, sorry.\n\n3.", null, "Hitesh January 30, 2020 at 10:08 pm #\n\nHi, Thnx for valuable tutorial. Suppose i have generated data for two classes from two classes Positive & Negative, by running GAN two times. Then should i have to measure FID by taking same classes i.e. Positive original vs Positive Generated and same for negative. Or i have to mix the classes i.e. (Positive original + Negative Original) vs (Positive Generate + negative Generated).\n\n•", null, "Jason Brownlee January 31, 2020 at 7:47 am #\n\nNot sure I follow, sorry.\n\nFID is run on generated images regardless of “class”.\n\n4.", null, "mohammadhosseinashoori April 21, 2020 at 4:14 am #\n\nhello\nthanks for this great tutorial\n\nits important to consider a batch size?\nin other implementation i see batch size for calculating fid\n\n•", null, "Jason Brownlee April 21, 2020 at 6:06 am #\n\nI guess it does not matter for the calculation, but does for the efficiency of the calculation – e.g. running batches of images through the model.\n\n•", null, "mohammadhosseinashoori April 21, 2020 at 6:48 am #\n\ni have a another question\n\nwhen i want to calculate fid score between real and genereated images\n\ni must use test dataset or train dataset or both is allowed ???\n\nthank you very much\n\n•", null, "Jason Brownlee April 21, 2020 at 7:44 am #\n\nYou are generating new images, there is no train/test dataset in this case.\n\n•", null, "mohammadhosseinashoori April 22, 2020 at 1:18 am #\n\nhello\nthank you for replay\n\nconsider a conditinal gan such as Pix2Pix\nfor calculating FID we need two directory of images (real and fake images)\n\nthis image(input images to generator and target images) must be from test dataset?\n\nThank you very much for explaining\n\n•", null, "Jason Brownlee April 22, 2020 at 6:01 am #\n\nAh yes, I see. I forgot how fid worked. It’s been a year.\n\n5.", null, "Siddarth Venkateswaran May 6, 2020 at 12:08 pm #\n\nHey Jason, great tutorials as usual. I have got a custom dataset with a dimension of 64*64*1(grayscale) per image. In order to scale it up with the Inception model, should I convert it to the RGB color-space?\n\n•", null, "Jason Brownlee May 6, 2020 at 1:38 pm #\n\nHmmm, I don’t have a good off the cuff answer. Perhaps try it and see what happens.\n\n•", null, "Siddarth Venkateswaran May 6, 2020 at 9:05 pm #\n\nHey Jason, I tried it but got an error stating that the input image depth must be 3. So I did an np.dstack((img, img, img)) on my dataset to make it as per the model requirements and it worked. As usual, thanks for your amazing blogs, they are really helping me implement my projects.\n\n•", null, "Jason Brownlee May 7, 2020 at 6:50 am #\n\nWell done!\n\n6.", null, "Shahid Afghan Yousafzai May 7, 2020 at 6:39 pm #\n\nAmazing Work Once Again, I am using the CelebA dataset, how many images will be enough to generate for calculating FID.\n\n•", null, "Jason Brownlee May 8, 2020 at 6:29 am #\n\nThanks.\n\nHundreds or perhaps thousands.\n\n•", null, "Shahid Afghan Yousafzai May 8, 2020 at 7:29 pm #\n\nthank you, i did apply your FID implementation with some modification on 4000+ images, the quality of the images is ok, yet i get an FID score of 20000+, while the same images gives FID of 200+ on other implementations, probably my modification and addition of ImageDataGenerator might be responsible for that.\n\n•", null, "Jason Brownlee May 9, 2020 at 6:11 am #\n\nInteresting.\n\n7.", null, "Aditya Bodkhe May 31, 2020 at 3:53 pm #\n\nThank you so much , for everything that i’m searching about GAN you have a tutorial with awesome code explanations .Keep Going\n\n•", null, "Jason Brownlee June 1, 2020 at 6:17 am #\n\nThanks!\n\n8.", null, "Washington Ramos June 16, 2020 at 12:55 pm #\n\nThanks a lot. I’m doing my thesis on GANs and you’re saving me!\n\n•", null, "Jason Brownlee June 16, 2020 at 1:40 pm #\n\nYou’re welcome!\n\n9.", null, "Shakib Yazdani July 19, 2020 at 5:19 pm #\n\nThank you for all your great tutorials on GANs.\nA question that crosses my mind is whether IS or FID scores are just metrics or we can use them as loss functions too ( 1 – FID)?\n\n•", null, "Jason Brownlee July 20, 2020 at 6:07 am #\n\nOff the cuff, they are just metrics.\n\n10.", null, "Simon Thomas July 24, 2020 at 2:08 pm #\n\nHi Jason,\n\nYou will have to check, but skimage resize automatically changes the range from 0-255 to 0-1. So the output of the function will be (299, 299, 3) between 0-1. You then apply preprocess_input, which is defined as:\n\ndef preprocess_input(x):\nx /= 255.\nx -= 0.5\nx *= 2.\nreturn x\n\nPresumably you are double scaling. You can add preserve_range=True in resize to avoid that.\n\nWhen doing anything except classification with pretrained networks they tend to be kind of robusts to details like these, but then of course, that it what makes them terrible in terms of adversarial robustness.\n\n•", null, "Jason Brownlee July 25, 2020 at 6:04 am #\n\nThanks for the tip Simon! I’ll investigate.\n\nresize() does not appear to change the range of the pixel values.\n\n11.", null, "SK September 1, 2020 at 8:07 am #\n\nHi Jason,\n\nHow do we calculate the FID score if the dataset size is less than 2048 images?\n\n•", null, "Jason Brownlee September 1, 2020 at 10:50 am #\n\n2048 is not related to the number of images used to calculate the score.\n\n•", null, "SK September 1, 2020 at 2:22 pm #\n\nHi Jason,\n\nIn the Official Implementation in TensorFlow, GitHub – they say:\n\nIMPORTANT: The number of samples to calculate the Gaussian statistics (mean and covariance) should be greater than the dimension of the coding layer, here 2048 for the Inception pool 3 layer. Otherwise the covariance is not full rank resulting in complex numbers and nans by calculating the square root.\n\nWe recommend using a minimum sample size of 10,000 to calculate the FID otherwise the true FID of the generator is underestimated.\n\nIn my case I do not have that many samples. Is it still Ok to calculate the FID on very little samples (<2048)?\n\n•", null, "Jason Brownlee September 2, 2020 at 6:22 am #\n\nFair enough.\n\nPerhaps don’t use the official implementation to meet the requirements you listd.\n\n12.", null, "Dominique September 18, 2020 at 6:26 pm #\n\nDear Jason,\n\nI have finished the first two parts of your book “GAN with Python”. I have written a review about it:\n•", null, "" ]
[ null, "https://3qeqpr26caki16dnhd19sv6by6v-wpengine.netdna-ssl.com/wp-content/uploads/2019/08/How-to-Implement-the-Frechet-Inception-Distance-FID-From-Scratch-for-Evaluating-Generated-Images.jpg", null, "https://3qeqpr26caki16dnhd19sv6by6v-wpengine.netdna-ssl.com/wp-content/uploads/2019/06/Example-of-How-Increased-Distortion-of-an-Image-Correlates-with-High-FID-Score.png", null, "https://3qeqpr26caki16dnhd19sv6by6v-wpengine.netdna-ssl.com/wp-content/uploads/2019/07/Generative-Adversarial-Networks-with-Python-220.png", null, "https://secure.gravatar.com/avatar/73a6cac48c16cce2f9e4401d7edebda0", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/0ed4ecf7d1d631907b90cc46a32a63bc", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/4555088d70ba4bd14d0eab27b2653d24", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/fb01344f6674071821e1dc44abd5d530", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/fb01344f6674071821e1dc44abd5d530", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/fb01344f6674071821e1dc44abd5d530", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/d4aeae079f796c9e1eb8a7f912258ef8", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/d4aeae079f796c9e1eb8a7f912258ef8", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/5a19bddaf4d8d0bdb250903d013d34e6", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/5a19bddaf4d8d0bdb250903d013d34e6", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/bcc8ed7e73b7dbbff3e2d9fe9597815a", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/69a0cfd99b2f93ebc8d2cad0df4ff00a", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/a617f5fc40c8d395ba6210978e58664e", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/051e4b55f7ab058e739d5de573511171", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/e1afc34b749deb1046d1fbf65ef67b45", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/e1afc34b749deb1046d1fbf65ef67b45", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null, "https://secure.gravatar.com/avatar/36d340c366e43694f102fcde6ad2d9d4", null, "https://secure.gravatar.com/avatar/a0942b56b07831ac15d4a168a750e34a", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7941011,"math_prob":0.9303519,"size":28833,"snap":"2020-45-2020-50","text_gpt3_token_len":7222,"char_repetition_ratio":0.15928406,"word_repetition_ratio":0.32333907,"special_character_ratio":0.26344812,"punctuation_ratio":0.12642202,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9798546,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74],"im_url_duplicate_count":[null,3,null,3,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-29T23:19:24Z\",\"WARC-Record-ID\":\"<urn:uuid:f5b093cd-1dd3-4eb0-bfce-413eb36d0e5d>\",\"Content-Length\":\"331891\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:95d78b23-3583-47e4-9f5b-d28c01ba2ee0>\",\"WARC-Concurrent-To\":\"<urn:uuid:7ec61d8d-3714-4a55-a2b3-726c9c3d1b33>\",\"WARC-IP-Address\":\"35.196.45.101\",\"WARC-Target-URI\":\"https://machinelearningmastery.com/how-to-implement-the-frechet-inception-distance-fid-from-scratch/\",\"WARC-Payload-Digest\":\"sha1:PRPESMHOHQYJJ3K6WWJ2PHE3BIKWEJ2A\",\"WARC-Block-Digest\":\"sha1:IQT47AFV7AJHMGBP7NNB4CA35I7TNVST\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141203418.47_warc_CC-MAIN-20201129214615-20201130004615-00037.warc.gz\"}"}
https://site.financialmodelingprep.com/weighted-average-cost-of-capital/MYSZ
[ "# Weighted Average Cost Of Capital\n\n#### \\$2.81\n\n+0.08 (+2.93%)\n###### DCFDCF Levered\nShare price \\$ 2.81 1.236 0.53 0.00 5.00% 9.350 0.61 1.50 2.11 28.95 71.05\n\nThere are a number of methods that can be used to determine discount rates. A good approach – and the one we’ll use in this tutorial – is to use the weighted average cost of capital (WACC) – a blend of the cost of equity and after-tax cost of debt. A company has two primary sources of financing – debt and equity – and, in simple terms, WACC is the average cost of raising that money. WACC is calculated by multiplying the cost of each capital source (debt and equity) by its relevant weight and then adding the products together to determine the WACC value." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8956221,"math_prob":0.9910809,"size":936,"snap":"2022-40-2023-06","text_gpt3_token_len":283,"char_repetition_ratio":0.123390555,"word_repetition_ratio":0.0,"special_character_ratio":0.29807693,"punctuation_ratio":0.11167513,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95863765,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-29T02:28:44Z\",\"WARC-Record-ID\":\"<urn:uuid:cd5b21f5-4e52-4c09-b151-cf8bf8a9894a>\",\"Content-Length\":\"72884\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fc81bfab-0007-4b2d-87ee-35b433c73e6f>\",\"WARC-Concurrent-To\":\"<urn:uuid:272e846d-d64d-4622-b49a-e9b4628f0e13>\",\"WARC-IP-Address\":\"18.67.65.94\",\"WARC-Target-URI\":\"https://site.financialmodelingprep.com/weighted-average-cost-of-capital/MYSZ\",\"WARC-Payload-Digest\":\"sha1:FEZKCQVFPKUALWGIIEW575FMESKYUUCC\",\"WARC-Block-Digest\":\"sha1:BBRJ7AFO6FMI4KMIW646UM2WWGKFD7V3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499697.75_warc_CC-MAIN-20230129012420-20230129042420-00354.warc.gz\"}"}
https://alistairtheoptimist.org/addition-subtraction-and-multiplication-worksheets/
[ "## Alistairtheoptimist - Free Worksheet For Kids", null, "# Addition Subtraction And Multiplication Worksheets", null, "", null, "## Mixed problems worksheets for practice adding subtracting decimal numbers worksheets.", null, "## Math worksheets teaching squared multiplication to 100 worksheets.", null, "## 100 horizontal additionsubtractionmultiplication questions the facts 1 to 10.", null, "## Addition subtraction and multiplication worksheets free math teaching squared.", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "SMLF", null, "", null, "Exponents and radicals worksheets integers with simple... Browse more ›", null, "Free math worksheets and printouts single digit addition... Browse more ›", null, "## Free Printable Addition And Subtraction Worksheets", null, "## Solving Equations By Adding Or Subtracting Worksheets\n\nAdd and subtract linear equations worksheet education... Browse more ›", null, "Free printable addition worksheets 3 digits column... Browse more ›\n\n###### Recommended Worksheet", null, "", null, "Free math worksheets... Browse more ›", null, "### Math For 8th Graders Worksheets...\n\n8th grade math problems... Browse more ›", null, "Adding fractions worksheets... Browse more ›", null, "##### Worksheets For 5th Grade Math...\n\nLong division worksheets... Browse more ›", null, "###### Net Ionic Equations Worksheet...\n\nNet ionic equations worksheet... Browse more ›" ]
[ null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/math-worksheets-teaching-squared-multiplication-to-100-.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/addition-subtraction-and-multiplication-worksheets-free-100-horizontal-additionsubtractionmultiplication-questions-.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/mixed-problems-worksheets-for-practice-adding-subtracting-decimal-numbers-.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/math-worksheets-teaching-squared-multiplication-to-100-.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/100-horizontal-additionsubtractionmultiplication-questions-the-facts-1-to-10--618x800.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/addition-subtraction-and-multiplication-worksheets-free-math-teaching-squared-.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/mixed-problems-worksheets-for-practice-adding-and-subtracting-money--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/100-horizontal-additionsubtractionmultiplication-questions-the-facts-1-to-10--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/free-math-worksheets-download-excel-microsoft--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/worksheets-for-all-download-and-share-free-on-addition-drill-100-problems-math--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/basic-math-multiplication-sample-worksheet-maker-this-tool-can-be-used-to-create-the-following-problem-types-addition-subtraction-division-mixed--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/addition-subtraction-multiplication-division-worksheet-free-612792-and--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/mixed-problems-worksheets-for-practice-single-digit-adding-subtracting--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/k-6-mixed-addition-subtraction-multiplication-and-division-worksheet--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/basic-math-division-sample-worksheet-maker-this-tool-can-be-used-to-create-the-following-problem-types-addition-subtraction-multiplication-mixed--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/addition-subtraction-and-multiplication-worksheets-free-100-horizontal-additionsubtractionmultiplication-questions--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/addition-subtraction-and-multiplication-worksheets-free-math-teaching-squared--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/addition-subtraction-multiplication-and-division-worksheets--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/k-6-mixed-addition-subtraction-multiplication-and-division-answers-worksheet-answer-sheet--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/hundreds-of-free-math-worksheets-addition-subtraction-multiplication-and-division--250x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/basic-math-mixed-sample-worksheet-maker-this-tool-can-be-used-to-create-the-following-problem-types-addition-subtraction-multiplication-division--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/worksheets-for-all-download-and-share-free-on-grade-7-math-problems-fractions-edugain-global--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/mixed-problems-worksheets-for-practice-adding-subtracting-multiplying-dividing--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/mixed-problems-worksheets-for-practice-adding-subtracting-decimal-numbers--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/free-math-printouts-from-the-teachers-guide-three-digit-subtraction-worksheets--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/math-worksheets-teaching-squared-multiplication-to-100-.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/addition-subtraction-multiplication-and-division-make-your-own-test--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/math-worksheets-basic-addition-subtraction-multiplication-mixed-operations-asm-vertical-100-0115-001-pin-and-division-fractions--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/the-addition-and-subtraction-relationships-with-families-that-add-to-12-a-math-worksheet--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/addition-and-subtraction-worksheets-2nd-grade-math-wordms-mixed-kindergarten-facts-photo-all-operations-791x1024-story--618x800.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/exponents-and-radicals-worksheets-integers-with-simple-exponent--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/free-math-worksheets-and-printouts-single-digit-addition-fluency-drills--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/additionsubtraction-free-printable-worksheets-worksheetfun-addition-and-subtraction-one-worksheet-.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/add-and-subtract-linear-equations-worksheet-education-com--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/free-printable-addition-worksheets-3-digits-column-sheet-no-carrying--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/reading-comprehension-5th-grade-worksheets-free-library-fifth-worksheet-follow-the-recipe--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/free-math-worksheets-and-printouts-single-digit-addition-fluency-drills--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/8th-grade-math-problems-practice-worksheets--300x300.jpg", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/adding-fractions-worksheets-improper-addition-different-denominators--300x300.png", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/long-division-worksheets-for-5th-grade-math-3-digits-by-2-1--300x300.gif", null, "https://alistairtheoptimist.org/wp-content/uploads/2018/02/net-ionic-equations-worksheet-water-written-as-h-2-ol-primary-1-pages-worsheet-key-.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7424904,"math_prob":0.81638515,"size":1026,"snap":"2019-43-2019-47","text_gpt3_token_len":199,"char_repetition_ratio":0.26810175,"word_repetition_ratio":0.014285714,"special_character_ratio":0.20955166,"punctuation_ratio":0.23353294,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9782561,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82],"im_url_duplicate_count":[null,3,null,1,null,1,null,3,null,1,null,1,null,5,null,1,null,1,null,1,null,1,null,1,null,9,null,1,null,1,null,1,null,1,null,1,null,2,null,1,null,1,null,1,null,4,null,1,null,2,null,3,null,1,null,1,null,1,null,1,null,1,null,null,null,2,null,6,null,2,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-17T01:04:32Z\",\"WARC-Record-ID\":\"<urn:uuid:6f8e1e60-88d0-4b43-badf-ea66257aec28>\",\"Content-Length\":\"93261\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1898e035-047b-4d0c-b696-b98f939f6e73>\",\"WARC-Concurrent-To\":\"<urn:uuid:e441efe9-70dc-4b4b-b675-0d77e51b8b0d>\",\"WARC-IP-Address\":\"104.27.131.146\",\"WARC-Target-URI\":\"https://alistairtheoptimist.org/addition-subtraction-and-multiplication-worksheets/\",\"WARC-Payload-Digest\":\"sha1:EORLQSGIRP4MHPGE6CCC5W4MDJG7F6FA\",\"WARC-Block-Digest\":\"sha1:OK7TEHKOCPDRMGEKPMZMX7OEFD46HAQQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496668772.53_warc_CC-MAIN-20191116231644-20191117015644-00515.warc.gz\"}"}
https://codegolf.stackexchange.com/questions/224823/write-a-program-with-infinite-expected-output
[ "# Write a program with infinite expected output\n\nWrite a program that halts producing a random finite numerical output with probability 1. The expected value of the outputs of the program must be infinite.\n\nFor physical limits, you can assume your language and related functions use infinite precision numbers. E.g. for languages with random function providing range $$\\[0,1)\\$$, it returns a real in $$\\[0,1)\\$$. (Anyway I need to choose from 1/rnd and while(rnd)print(1))\n\nShortest code wins. Would be quite small for lots of language though.\n\nThere are two easy-seen ways to do this, both are accepted given the question: (in Javascript)\n\n_=>1/Math.random() // ∫₀¹1/xdx=∞\n_=>{c='1';while(Math.random()<.5)c+='1';return c} // Not golfed to easier get understood for other language user, at least I try to\n// 1/2+11/4+111/8+1111/16+...=∞\n\n• The 1/random() answers don't have an infinite expected value since they are limited by the precision of the rng (i.e. that fraction has a finite maximum possible value)\n– Leo\nMay 1, 2021 at 8:38\n• @Leo Default assumes infinity precision right?\n– l4m2\nMay 1, 2021 at 11:00\n• @Leo not only that, random() can output zero which would cause the program to give invalid output May 1, 2021 at 13:01\n• This question is good, but currently is not well defined. Since most random libraries are just pseudo-random ones, and probably rely on the current timestamp for a seed, should we assume that the program is run at a random time? May 1, 2021 at 13:43\n• I am voting to reopen now that it has been clarified that the output must be finite, and that we can assume infinite precision. May 2, 2021 at 9:46\n\n# R, 9 bytes\n\nrf(1,1,1)\n\n\nTry it online!\n\nOutputs a realization of the $$\\F(1,1)\\$$ distribution. The $$\\F(d_1,d_2)\\$$-distribution has infinite mean for $$\\d_2 \\leq 2\\$$.\n\nOne way of defining the $$\\F(1,1)\\$$ distribution is as follows: let $$\\X_1,X_2\\$$ be independent $$\\\\mathcal N(0,1)\\$$ random variables. Then $$\\\\frac{X_1^2}{X_2^2}\\sim F(1,1)\\$$.\n\nUsing the $$\\F\\$$ distribution comes out 1 byte shorter than the 2 more obvious solutions 1/runif(1) and rcauchy(1).\n\nThe plot below shows the evolution of the sample mean, for sample size ranging from 1 to 1e6; you can see that it diverges.", null, "Alternate solution for the same byte count:\n\nrt(1,1)^2\n\n\nwhich outputs the square of a realization of Student's distribution $$\\t(1)\\$$. It has infinite expected value, since the $$\\t(1)\\$$ distribution has infinite variance. The square is needed to guarantee that the output is positive; without it, the expected value is undefined, since the realizations are often enough arbitrarily large positive or negative numbers.\n\n• Really nice! I think we were typing-in our answers at the same time, so I'm glad they came out with the same bytes (although I think yours is better...) May 1, 2021 at 10:20\n• @DominicvanEssen I was happy it worked with rf, as we never get to use that function usually! May 1, 2021 at 13:46\n• Hmmm why does the $F(1,1)$ sample means have such strange jagged patterns in the graph? May 2, 2021 at 0:52\n• @BenjaminWang That is what always occurs for the sample mean of independent and identically distributed random variables with infinite expected value. Intuitively: very occasionally, we obtain a huge realization $X_i$, which massively pushes the sample mean up. If the next realizations $X_{i+1},X_{i+2},\\ldots$ are smaller, the sample mean will slowly decrease as the weight of $X_i$ decreases, until it jumps up the next time a huge realization occurs. May 2, 2021 at 8:48\n• @BenjaminWang On the other hand, if the expected value is finite, then the sample mean converges to it by the law of large numbers (see plot at the link). May 2, 2021 at 8:49\n\n# Jelly, 6 bytes\n\n1ḤXḂ$¿ Try it online! -1 byte thanks to Jonathan Allan 50% chance to output 1, 50% chance to output double this value. -2 bytes using a while loop inspired by Aaron Miller's answer. ## Explanation 1 ¿ While ..$\nX Random integer from 1 to (current value)\nḂ % 2 (this ensures 50% chance no matter how large the current value is - except if it's 1)\nḤ Double the current value\n\n\nUnfortunately, Jelly doesn't have a \"random decimal from 0 to 1\" built-in, otherwise this could be <random><reciprocal>.\n\n## Proof of validity\n\nThe probability to output $$\\2^x\\$$ is $$\\2^{-x-1}\\$$ for all $$\\x\\in\\mathbb{Z}^+\\$$. Therefore, the expected output is $$\\\\sum\\limits_{n=0}^\\infty 2^n\\cdot 2^{-n-1}=\\sum\\limits_{n=0}^\\infty\\frac12\\rightarrow\\infty\\$$\n\n• I'd suggest golfing to 2ḤX’$¿, but that seems to rapidly snowball out of control whenever it gets past 4... May 1, 2021 at 10:53 • 1ḤXḂ$¿ or 2ḤXḂ$¿ are the same thing just without $x=0$. May 1, 2021 at 18:39 • @JonathanAllan Ah, clever. Thanks. May 1, 2021 at 18:40 # Retina, 5 bytes ?+ 1 Try it online! Explanation: ?+ Loop a random number of times with an exponential distribution... 1 Double the length. (Actually you get 2ⁿ-1, but that's still enough to diverge to infinity.) # Python 3, 37 bytes from random import* print(1/random()) Try it online! I had a slightly cool solution but now this is just the trivial solution. # Vyxal, 67 3 bytes Thanks to @hyper-neutrino for helping me to understand what expected output is. Thanks to @Lyxal for porting a different answer than I did for -4 bytes. ∆ṘĖ Try it Online! Explanation: ∆Ṙ # Random float in range [0.0, 1.0) Ė # Reciprocal # Implicit output # Thue, 29 bytes Edit: +9 bytes to fix issue spotted by @RossMillikan. 1::=.10 10::=~1 .0::=~0 ::= 1 Try it online! The TIO interpreter requires a trailing newline, and outputs each digit on a different line, which is not required. Here is an interpreter without these restrictions. Outputs in binary (meta link). Each step has a 50% chance to double the binary integer, or to start outputting it. The proven formula from other answers. • I don't think this is acceptable. It sounds like the chance of$n\\ 1$s being output decreases as$2^{-n}$. In that case the expected value converges. Absent a startup transient it is just$2$. May 3, 2021 at 2:42 • @RossMillikan Thank you, fixed. May 3, 2021 at 19:52 # C++ (gcc), 169119 118 bytes #include<bits/stdc++.h> int main(){std::mt19937 p((uint64_t)new int);std::string s=\"1\";while(p()%2)s+=s;std::cout<<s;} Try it online! This solution is directly derived from the linked paradox in the question. The output string is composed of 1 digits so technically it can be interpreted as a number. The random number generator is seeded with the address of a heap variable. The address changes each time the program is run. Another option is to use the address of a newly allocated heap variable: mt19937 rng((uint64_t) new char); (source) # Pyth, 4 bytes /1OZ Try it online! /1 # 1 divided by OZ # Random float between 0 and 1 # Bash, 24 bytes echo 32767/$RANDOM|bc -l\n\n\nTry it online!\n\nPrints a random number between $$\\1\\$$ and $$\\\\infty\\$$.\n\n# Charcoal, 7 bytes\n\n1W‽²↑KA\n\n\nTry it online! Link is to verbose version of code. Explanation:\n\n1\n\n\nPrint 1.\n\nW‽²\n\n\nRepeat a random number of times with an exponential distribution...\n\n↑KA\n\n\n... duplicate the output.\n\n• 52 bytes? More like 7 bytes. May 1, 2021 at 8:36\n• @Lyxal Yeah, I normally remember to paste the succinct byte count at the same time as I paste the succinct code over the verbose code but I only got four hours of sleep last night :-(\n– Neil\nMay 1, 2021 at 10:07\n\n# MATL, 3 bytes\n\n1r/\n\n\nTry it online!\n\nThis produces the output 1/x, where x is uniformly distributed on the interval (0,1). This has infinite mean.\n\n# Python 3, 31 bytes\n\nfrom time import*\nprint(time())\n\n\nTry it online!\n\nThe Python 3 random library uses the current time for a seed. Therefore, it is necessary to specify the random distribution of time that the program is run, to ensure that the simple 1/random() is valid. Depending on the yet-to-come specification, my answer may or may not be valid.\n\n# R, 9 bytes\n\n1/rexp(1)\n\n\nTry it online!\n\nrexp(1) - a single random sample from an exponential distribution with a (default) rate parameter of 1 - is the shortest R random function call with a nonzero probability density at zero (there are other shorter random functions [rt and rf], but unfortunately they each lack default values for required parameters, so the function calls are no shorter*).\n\n*Edit: no shorter, but both can be made just-as-short: see Robin Ryder's answer\n\n• For the second solution, you can use the fact that 1/0=Inf with e.g. 1/rpois(1,1) (12 bytes), which sometimes outputs Inf. May 2, 2021 at 9:05\n• @RobinRyder - Thanks - you're right, of course (even though I was trying to find a way to use a different approach to the R built-in random distributions). Anyway, it looks like both of these approaches are now outlawed by the new 'finite numerical output' rule... May 2, 2021 at 22:08\n\n# Befunge-93, 8 7 bytes\n\n2?.#*@#\n\n\nTry it online!\n\nThis is basically just the St. Petersburg paradox. Every time the pointer reaches the ? and goes either left or right, it has a 1/2 chance of doubling the top of the stack and a 1/2 chance of just outputting the top of the stack and halting.\n\nExplanation of the code:\n\n2?.#*@#\n\n2 Push 2 onto the stack.\n? Change the direction of the pointer to a random direction:\n2 * If left, double the top of the stack.\n. @ If right, output the top of the stack and halt.\n? If up/down, the pointer returns to the ?.\n\n\n# APL, 5 bytes\n\n÷1-?0\n\n\nThe program generates a random number from the range [0; 1), then substracts it from 1 to get the range (0; 1], and takes the reciprocal, so we get a number from the range [1; +∞).\n\n# ><>, 3 bytes\n\n1nx\n\n\nTry it online!\n\nHas an infinite expected value, due to diverging more quickly than exponentially more unlikely repunits. Will nevertheless always terminate when it empties its own stack, when the random trampoline takes more left turns than right turns.\n\n# Random Brainfuck, 5 bytes\n\n+[?.]\n\n\nThrow a D256 until you throw a 0\n\nTry it online!" ]
[ null, "https://i.stack.imgur.com/I8o2jm.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.80874956,"math_prob":0.96437514,"size":1086,"snap":"2023-14-2023-23","text_gpt3_token_len":283,"char_repetition_ratio":0.10536044,"word_repetition_ratio":0.0,"special_character_ratio":0.2744015,"punctuation_ratio":0.124423966,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9931261,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-08T16:33:02Z\",\"WARC-Record-ID\":\"<urn:uuid:83f54984-f38f-4f0d-98c7-32c37a5c4087>\",\"Content-Length\":\"350458\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3969250f-1284-4272-bbd0-1960745010e7>\",\"WARC-Concurrent-To\":\"<urn:uuid:6f7bbe46-bf42-431e-9ea8-896e30545d83>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://codegolf.stackexchange.com/questions/224823/write-a-program-with-infinite-expected-output\",\"WARC-Payload-Digest\":\"sha1:SSIHXMCH63VHKCZGGFBVHUHZXJTOVKP3\",\"WARC-Block-Digest\":\"sha1:PICJ4IBVQUL5BS4H47UPVVMW2POZPEFO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224655027.51_warc_CC-MAIN-20230608135911-20230608165911-00793.warc.gz\"}"}
https://mathstat.slu.edu/escher/index.php?title=Instructor:Spherical_Geometry_Exercises_Solutions&diff=prev&oldid=7953
[ "# Difference between revisions of \"Instructor:Spherical Geometry Exercises Solutions\"\n\n### General Questions\n\n1. Yes, every point on the sphere has exactly one antipodal point.\n2. There are really two valid choices here: 1) A is between B and C if A is on a geodesic segment joining B and C, or 2) A is between B and C if A is on the short geodesic segment joining B and C. In both cases, St. Louis is between the poles. In case 1, the north pole is between the south pole and St. Louis, but not in case 2.\n3. Draw the picture.\n4. Draw the picture.\n5. Draw the picture (it should look a lot like question 4's picture).\n6. 300°\n7. $360 - \\frac{(n+2)180^\\circ}{n}$\n8. Draw a geodesic segment connecting two corners of the quadrilateral. This splits the quadrilateral into two triangles. The sum of angles in the quadrilateral is the sum of the angles in the two triangles, which is larger than 180° + 180° = 360°.\n9. The north and south edges of Colorado are not geodesics - they are made from parallels. This means Colorado is not a quadrilateral, it has curved edges.\n10. draw some examples\n11. 5- and 6 gons\n12. 2-gons with angle 90 degrees.\n\n### Defects and Area\n\n1. defect = sum of angles - 180; to obtain the area we first find the fraction of the sphere: defect/720. Then we compute fraction * area of the whole sphere.\n2. defect square = sum of angles - 360. Fraction = defect / 720. Area = fraction*area of sphere.\n3. a. 90°; b. 1/8; c. 90°; d. 1/8; e. 36°; f. 1/20; g. 90°; h. 1/16; i. 90°; j. 180°\n4. 720°\n5. 720°\n6. A biangle with corner angle $\\theta$ covers $\\theta/360^\\circ$ of the sphere.\n7. Five triangles at each vertex gives 360°/5 = 72° corner angles, so each triangle has angle sum 72°+72°+72° = 216° for a defect of 36°, and an area fraction of 36°/720° = 1/20.\n\n### Spheres and Polyhedra\n\n• No. Any three points on the sphere give a flat triangle, but it's possible to pick four points on a sphere that don't lie at the corners of a flat quadrilateral.\n• Build the models!\n• Tetrahedrons.\n• Octahedrons.\n• 12.\n• 60.\n• Draw the pictures.\n• The regular tessellation by squares (it's self-dual).\n• a. Tetrahedron; b. Octahedron; c. Cube; d. Icosahedron; e. Dodecahedron\n• He's relating duality of polyhedron to gender roles. In particular, he (arbitrarily) puts the \"female\" solids inside the \"male\" solids because they are subservient. He's also got to reach to include the tetrahedron, which is self-dual, and therefore a hermaphrodite (!??). Good thing Kepler lived around the turn of the 16th century, because this sort of gender stereotyping was typical then.\n•", null, "• Although tessellations of the plane suggest infinity because they can be continued forever, Escher felt the necessity of an edge harmed the effect. Escher says that as you turn the ball, the neverending series of motifs suggests infinity. On the other hand, there are only finitely many motifs on the ball. Which is more compelling?\n• Because there are two different corner angles for the rhombus.\n• Corner angles are 90°-120°-90°-120°.\n• Defect is 60°. Covers 1/12 of the sphere.\n• 12 faces, 24 edges, 14 vertices. Yes, 12 - 24 + 14 = 2.\n• a. 45°-90°-60°; b. 15°; c. 48; d. 48 faces, 72 edges, 26 vertices.\n• a. 60 faces, 90 edges, 32 vertices; b. It's a soccer ball.\n• 144 faces, 324 edges, 180 vertices. Euler characteristic is 0.\n• 60 faces, 120 edges, 60 vertices. Euler characteristic is 0.\n• a. They are close, since the diameter is 10 and circumference should be $10\\pi$, about 31.4 cubits; b. On a sphere, the diameter of a circle with diameter $d$ is less than $d\\times\\pi$, so it could possibly be built; c. A sphere of diameter about 19.1 cubits (a pretty small planet!)." ]
[ null, "https://mathstat.slu.edu/escher/images/thumb/f/f7/Tetrahedron-colored.svg/112px-Tetrahedron-colored.svg.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8503775,"math_prob":0.98742867,"size":5397,"snap":"2020-45-2020-50","text_gpt3_token_len":1556,"char_repetition_ratio":0.14574449,"word_repetition_ratio":0.53846157,"special_character_ratio":0.31832498,"punctuation_ratio":0.12929475,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9943145,"pos_list":[0,1,2],"im_url_duplicate_count":[null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-01T18:40:57Z\",\"WARC-Record-ID\":\"<urn:uuid:7b584049-d532-47f7-a1ec-8c6430ab49d9>\",\"Content-Length\":\"32542\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b9728271-4cc5-4be5-aee8-b89dab301b71>\",\"WARC-Concurrent-To\":\"<urn:uuid:d684d296-7a44-4b8d-b8a8-5878e4b0ebd7>\",\"WARC-IP-Address\":\"165.134.107.78\",\"WARC-Target-URI\":\"https://mathstat.slu.edu/escher/index.php?title=Instructor:Spherical_Geometry_Exercises_Solutions&diff=prev&oldid=7953\",\"WARC-Payload-Digest\":\"sha1:OOWXATZ3B2ZVUWVBZPL6MJXEJG6ORSFE\",\"WARC-Block-Digest\":\"sha1:BVHF3NSCMUZ74WMUMXSKFC4HWXLS5EJM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141681209.60_warc_CC-MAIN-20201201170219-20201201200219-00446.warc.gz\"}"}
http://www.gypsis-havaneser.de/astm/calculate-_909.html
[ " calculate steel plate weight - Q235B Steel Plates", null, "Toll Free Call", null, "Our Email\n\n## calculate steel plate weight\n\n### Calculator for Steel sheets and plates\n\nCalculator for Steel sheets and plates Calculators. Steel sheets and plates Seamless steel pipes - circular Hollow structural sections - circular Hollow structural sections - square Hollow structural sections - rectangular Round steel bars Square steel bars Flat bars Equal angles Unequal angles Channels - GOST Channels - UPN Beams - IPN Beams - IPE Beams - HEA (IPBL) Beams - HEB (IPB) How do you calculate the weight of a piece of steel?How do you calculate the weight of a piece of steel?You can calculate the weight of steel by using the weight equation W = m_g for the weight _W in newtons, mass m in kilograms and gravitational acceleration constant 9.8 m/s 2. The mass of an object measures the amount of matter an object contains while weight is the force that the object exerts on the Earth due to gravity. Sep 25 2019How to Calculate the Weight of Steel Sciencing What is weight of steel plate per square foot?What is weight of steel plate per square foot? Standard Thickness Weight Per Square Foot 3/16 inches 7.66 1/4 10.21 5/16 12.75 3/8 15.32 23 more rows calculate steel plate weight Jun 19 2020Turner Steel Co., Inc - Plates\n\n### Calculate Weight of Flat Bar Metal Weight Calculator\n\nCalculate Flat Plate Weight Select Material Steel Aluminum Lead Brass Bronze Cast Polyamide Chromium Copper Derlin Fiber Gold Iron Magnesium Molybdenum Nickel Silver SS 304/310 SS 316/321 SS 410/430 Titanium Tin Teflon Platinum Polyamide Polythene Zinc Zirconium Select MaterialCalculate Weight of Flat Bar Metal Weight CalculatorCalculate Flat Plate Weight Select Material Steel Aluminum Lead Brass Bronze Cast Polyamide Chromium Copper Derlin Fiber Gold Iron Magnesium Molybdenum Nickel Silver SS 304/310 SS 316/321 SS 410/430 Titanium Tin Teflon Platinum Polyamide Polythene Zinc Zirconium Select MaterialCalculate Weight of a Steel Plate Chapel SteelCalculate the weight of a steel plate with Chapel's conversion calculator. Calculate the weight of a steel plate with Chapel's conversion calculator. About CHAPEL STEEL. Career Portal Español. Contact CHAPEL STEEL. Email Request Info. Our Response to COVID-19. Toggle navigation. PRODUCTS . Structural, Carbon & HSLA Steel Plate. ASTM A36;\n\n### Calculators\n\nSteel Plate Products. Carbon & High Strength Low Alloy (HSLA) Structural Steel Plate. A36; A572 Grade 42, 50, 60, 65; CSA G40.21 Grade 44W, 50W, 50A; A709 Grade 36 calculate steel plate weightCalculators Steel Plate Products. Carbon & High Strength Low Alloy (HSLA) Structural Steel Plate. A36; A572 Grade 42, 50, 60, 65; CSA G40.21 Grade 44W, 50W, 50A; A709 Grade 36 calculate steel plate weightHow To Calculate Weight Of Mild Steel Plate - L & T calculate steel plate weightHere I have considered a Mild Steel plate, whose Length, Breadth and Thickness is 1 meter, 1 meter, and 10 mm or 0.01 meter respectively. So to calculate the weight of the Mild Steel plate, First, we need to calculate the Volume of the Mild Steel plate. The volume of Plate = Length x Breadth x Thickness = 1 x 1 x 0.01 = 0.01 m³\n\n### How Weight of Steel calculation (Bars, Sheets, Plates calculate steel plate weight\n\nOct 17, 2017The content of carbon in steel is between 0.002% to 2.14% by its own weight of the steel caculation (bars,sheets,plates,) In plain-iron steel or in carbon alloys steels.How to Calculate the weight of Steel [Bars, Sheets & Plates]??Mar 17, 2020Calculate the theoretical unit weight of the steel section? Solution Diameter = 10mm Length = 12 meter By using the standard formula i.e. Weight = (d 2 /162.27) x Length = (10 2 /162.27) x 12 = 7.395 kg (Answer) In this way, we can easily calculate the weight of steel having different diameters by using the same procedure. How to Calculate the weight of Steel [Bars, Sheets & Plates]??Mar 17, 2020Calculate the theoretical unit weight of the steel section? Solution Diameter = 10mm Length = 12 meter By using the standard formula i.e. Weight = (d 2 /162.27) x Length = (10 2 /162.27) x 12 = 7.395 kg (Answer) In this way, we can easily calculate the weight of steel having different diameters by using the same procedure.\n\n### How to calculate weight of ms plate and their unit weight calculate steel plate weight\n\ndensity of steel = 7850 Kg/m3. Now weight of ms plate 6mm = volume ×density. weight of ms plate 6mm = 0.006 m3×7850 Kg/m3. 6 mm ms plate weight = 47.1 Kg/m2. That is 6mm ms plate weight per sq.meter. Now calculate weight of ms plate 6mm per sq.feet. We know that 1m2 = 10.764 sq.ft. So weight of ms plate 6mm per sq.feet is = 47.1/10.764 = 4 calculate steel plate weightMetal Calculator O'Neal Steel - Conversions and WeightsO'Neal Steel offers a simple and easy to use metal weight calculator including weight and conversions. just supply your specs and you're ready to go. calculate steel plate weight Plate weight does not allow for kerf. Inches to Millimeter Inches = Millimeter =Metal Weight Calculator - Steel Weight CalculatorMetal Weight Calculators can help determine the weight of any number of types of material. This Metal Weight Calculator can calculate the weight on round bar, flat bar, hex bar, plate, sheet, pipe, tube and square bar. This metal or steel calculator can help determine the weight on cut sizes or pieces of plate or any other type of cut metal.\n\n### Metal Weight Calculator - Steel Weight, Sheet metal, Pipe calculate steel plate weight\n\nThe best and most advanced online metal weight calculation site in the field. On our site you can calculate the weight of various materials on metal as close to real as possible.Metal Weight Calculator - steel weight calculator calculate steel plate weightMetal weight calculator online - free steel weight calculator. Has pre-entered densities for dozens of commonly-used metals and metal alloys like steel, aluminum, nickel, iron, copper, cadmium, gold, silver, etc. Calculate the weight of a steel beam, bar, tube, profiles, channels, or a simple metal sheet.Metal Weight Calculator Industrial Metal SupplyThe metal weight calculator allows you to calculate the weight in pounds for your steel, stainless steel, aluminum, iron, silver and much more!\n\n### People also askWhat formula is used to determine the weight of a steel plate?What formula is used to determine the weight of a steel plate?In order to find out weight, you should know the volume and density of the steel plate and then multiply volume with density i.e. volume x density. Formula for detecting the volume = Length x Breadth x Height i.e. 1 x 1 x 0.01 m = 0.01 m3. Density of steel = 7850 kg/m3. Therefore, weight will be = 0.01 x 7850 = 78.5 kg. Source.Reference engineeringfeed/estimate-weight-steel-plate How would I figure the weight of a steel plate?How would I figure the weight of a steel plate? The weight of a 1 inch thick 36\" (3 ft) x 96\" (8 ft) steel plate with weight 40.8 lb/ft2 (from table above) can be calculated as W = (40.8 lb/ft2) (3 ft) (8 ft) = 979 lb Calculating Steel Plate WeightSteel Plates - Size & Weight - Engineering ToolBoxPlate Weight Calculator - Portland Bolt\n\nPlate Weight Calculator. Plate Type Thickness in. Width in. Length in. Outside Diameter in. Hole Diameter in. Quantity Weight Each lbs. Total Weight lbs. Use this free tool to easily estimate the weight of carbon steel plates. Whether your plates are round or square, it will automatically account for plates with or without holes calculate steel plate weightRound Weight Calculator / Online Round Weight Calculator calculate steel plate weightSteel Weight Calculator, stainless steel pipe weight calculator, Metal Weight Calculator, Weight Calculator for metal sheets and plates, stainless steel pipe weight calculator, Carbon Pipe Weight Calculator, Calculator for Seamless steel pipes - circular, structural steel weight calculator\n\n### Stainless Plate Weight Calculator Metal Weight calculate steel plate weight\n\nOnline metal weight calculator which helps to calculate the weight of Stainless Plate metal. Stainless Plate Weight Calculation Material Alloy Steel Aluminum Beryllium Brass Bronze Cast Iron Columbium Copper Copper Alloys Gold Lead Magnesium Molybdenum Nickel Plastic Silver Stainless Steel Tantalum Titanium Tungsten Zinc ZirconiumStainless Steel Sheet Weight Calculator, Aluminium Plate calculate steel plate weightStainless Steel Gauge, Width and Length Weight Lbs. per Sq Ft. Est. Weight per Sheet; 7GA (.1874\") 48 x 96 7.871 251.9 48 x 120 7.871Steel Plate Weight Calculator In Kg, Steel Sheet Weight calculate steel plate weightWhether your plates are round or square, Steel Plate Weight Calculator will automatically calculate for plates with or without holes. Use this tool to estimate the weight of steel plates/coil/sheet.\n\n### Steel Plate Weight Calculator Metal Weight Calculation calculate steel plate weight\n\nOnline metal weight calculator which helps to calculate the weight of Steel Plate metal. Steel Plate Weight Calculation Material Alloy Steel Aluminum Beryllium Brass Bronze Cast Iron Columbium Copper Copper Alloys Gold Lead Magnesium Molybdenum Nickel Plastic Silver Stainless Steel Tantalum Titanium Tungsten Zinc ZirconiumSteel Plates - Size & Weight - Engineering ToolBoxSteel sheets and plates are typical stocked as size 2000 mm x 3000 mm. Weight per sq. meter of hot rolled mild steel plates can be calculated as. W = 7.85 t (2) where . W = weight of steel plate (kg/m 2) t = plate thickness (mm) Steel Plate Weight Calculator - Metric Units. width (mm) length (mm) thickness (mm) density (kg/m 3)Steel Plates - Size & Weight - Engineering ToolBoxSteel sheets and plates are typical stocked as size 2000 mm x 3000 mm. Weight per sq. meter of hot rolled mild steel plates can be calculated as. W = 7.85 t (2) where . W = weight of steel plate (kg/m 2) t = plate thickness (mm) Steel Plate Weight Calculator - Metric Units. width (mm) length (mm) thickness (mm) density (kg/m 3)\n\n### Steel Weight Calculation Formula for All Types of Steel calculate steel plate weight\n\nThere so many types of steel in the world. Such as the screw thread steel, steel tube, steel round bar, square steel and etc. So it is necessary to calculate its weight in the work time. The information of the steel weight calculation formula can help you get over it. First of all, I need to show something for you guys about the unit of calculate steel plate weightSteel Weight Calculator - Stainless, Aluminum, Nickel calculate steel plate weightMetal, shape, weight, size, and number of pieces. Steel Weight Calculator - Stainless, Aluminum, Nickel, Titanium & More! TW Metals JavaScript seems to be disabled in your browser.Steel Weight Calculator Specialty Steel Co.Steel Weight Calculator used to estimate the weight of steel in squares, rectangles, flats, rounds & hexagons. Call us at 800-321-8500 for questions or comments.\n\n### Steel Weight Calculator. West Yorkshire Steel\n\nSteel weight calculator providing theoretical weights. As a guide the calculator provides theoretical weights for round, square, flat, hexagonal and octagonal steel bar. It can also be used to calculate theoretical weights of sheet/plate and tube/ring steel.Theoretical Metal Weight Calculation Formula (30 Types of calculate steel plate weightIf youre working in the metalworking industry, even youre engineers, you will try to find one calculator to help you calculate the weight of various metals and steels including ms plate, gi sheet, structural steel, ms angle, mild steel, steel bar, square tube, angle, aluminum etc.Tom Ormonde Calculate the Weight of SteelAug 07, 2019Time for the first example, a rather large steel plate. Weight of a Steel Plate - Worked Example. Weight of Steel Member = Density x Volume \\= 485 x 15 x 100 x 200 \\= 145,500,000 lbs. Worked Example - Weight of Steel Column. Now we will look at the weight of a steel column per unit length, this time in metric.\n\n### Weight Calculator - Ryerson\n\nThe calculator can help you estimate the weight of metal parts in various quantities. Simply select the material, alloy, and shape, and enter number of pieces f calculate steel plate weightWeight Calculator - RyersonThe calculator can help you estimate the weight of metal parts in various quantities. Simply select the material, alloy, and shape, and enter number of pieces f calculate steel plate weightWeight Calculator for metal sheet and plateHigh Yield Steel Plate; Armour Steel Plate; Boiler Quality Steel Plate; Nickel Alloys; Titanium; Aluminium Alloy. Aluminium 5052; Aluminium 6063; Aluminum 5083; Aluminium 6082/6061; Blog; Work With Us; Contact; Weight Calculator. Stainless Steel > Stainless Steel\n\n### Weight Calculator for metal sheets and plates\n\nMar 05, 2017Weight calculator for sheet metal. Steel, aluminium and stainless steel are the most used construction materials. A precise weight calculation is extremely important for big metal constructions, in the the transport sector and for lifting facilities. It is also important to know the weight for machining metal sheets no matter the material.Weight Calculators - Weight of a Steel Plate - Radisson ImpexOnline weight calculator for Steel Plate, Weight Calculators - Weight of a Steel Plate, Weight Calculator for metal sheets and plates, ms plate weight calculation, steel weight table, ms plate weight chart, structural steel weight calculator, Calculator for Steel sheets and plates, Steel Plates - Size & WeightWeight of a Steel Circle Conversion and Weight CalculatorsHow to Calculate the Weight of a Steel Plate Kloeckner calculate steel plate weightCalculating the Weight of Carbon Steel Plate. To calculate the weight of carbon steel plate, youll need to know the thickness, width, length, and quantity.The typical density for carbon steel plate is 0.284 pounds per cubic inches (490 pounds/cubic feet) (imperial) or 7.85 tons/cubic meters (metric).\n\n### calculate steel plate weight\n\ncalculate steel plate weight formulasteel plate weight formulasteel plate weights chartweight of steel calculatorplate metal weight calculatormild steel plate weight calculatormetal plate weightformula for weight of steelcalculate steel plate weightcalculate steel plate weight formulasteel plate weight formulasteel plate weights chartweight of steel calculatorplate metal weight calculatormild steel plate weight calculatormetal plate weightformula for weight of steelSome results are removed in response to a notice of local law requirement. For more information, please see here.How to Calculate the Weight of a Steel Plate Kloeckner calculate steel plate weightCalculating the Weight of Carbon Steel Plate. To calculate the weight of carbon steel plate, youll need to know the thickness, width, length, and quantity.The typical density for carbon steel plate is 0.284 pounds per cubic inches (490 pounds/cubic feet) (imperial) or 7.85 tons/cubic meters (metric).calculate steel plate weightcalculate steel plate weight formulasteel plate weight formulasteel plate weights chartweight of steel calculatorplate metal weight calculatormild steel plate weight calculatormetal plate weightformula for weight of steelWeight Calculator for metal sheet and plateHigh Yield Steel Plate; Armour Steel Plate; Boiler Quality Steel Plate; Nickel Alloys; Titanium; Aluminium Alloy. Aluminium 5052; Aluminium 6063; Aluminum 5083; Aluminium 6082/6061; Blog; Work With Us; Contact; Weight Calculator. Stainless Steel > Stainless Steel\n\n### Black Steels\n\nMaybe You Like\n\ncalculate steel plate weight price, Best price calculate steel plate weight, calculate steel plate weight chemical composition, calculate steel plate weight yield strength, calculate steel plate weight equivalent, calculate steel plate weight properties, calculate steel plate weight in China, what is calculate steel plate weight,\n\n## Get Free Consultation\n\nGet the most professional technical answers and quotation solutions\nOr if you need quick assistance\nMail Us 24/7 For Customer Support At mildsteels@yeah.net" ]
[ null, "http://www.gypsis-havaneser.de/skin/images/icons/icon-call-1.png", null, "http://www.gypsis-havaneser.de/skin/images/icons/icon-mail-1.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7823989,"math_prob":0.9984716,"size":13960,"snap":"2021-04-2021-17","text_gpt3_token_len":3118,"char_repetition_ratio":0.2939954,"word_repetition_ratio":0.38587698,"special_character_ratio":0.2252149,"punctuation_ratio":0.12623274,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97375834,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-21T14:35:34Z\",\"WARC-Record-ID\":\"<urn:uuid:f1f80149-2cb8-4668-aac0-ac93b17f215d>\",\"Content-Length\":\"45547\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9492ca5a-2c36-4fe2-af49-c14c086630c9>\",\"WARC-Concurrent-To\":\"<urn:uuid:4e1ca465-deba-436f-b21c-5527fbd37f32>\",\"WARC-IP-Address\":\"45.76.23.35\",\"WARC-Target-URI\":\"http://www.gypsis-havaneser.de/astm/calculate-_909.html\",\"WARC-Payload-Digest\":\"sha1:JMBYBNLAUZKB3A2EINU3PNYIOQRVMQIA\",\"WARC-Block-Digest\":\"sha1:H42DCIJFHEEOGFR744PBEFSGTYMJR3N6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703524858.74_warc_CC-MAIN-20210121132407-20210121162407-00106.warc.gz\"}"}
https://xarray-spatial.org/reference/_autosummary/xrspatial.proximity.great_circle_distance.html
[ "# xrspatial.proximity.great_circle_distance#\n\nxrspatial.proximity.great_circle_distance(x1: float, x2: float, y1: float, y2: float, radius: float = 6378137) float[source]#\n\nCalculates great-circle (orthodromic/spherical) distance between (x1, y1) and (x2, y2), assuming each point is a longitude, latitude pair.\n\nParameters\n• x1 (float) – x-coordinate (latitude) between -180 and 180 of the first point.\n\n• x2 (float) – x-coordinate (latitude) between -180 and 180 of the second point.\n\n• y1 (float) – y-coordinate (longitude) between -90 and 90 of the first point.\n\n• y2 (float) – y-coordinate (longitude) between -90 and 90 of the second point.\n\nReturns\n\ndistance – Great-Circle distance between two points.\n\nReturn type\n\nfloat\n\nReferences\n\nExamples\n\n```>>> from xrspatial import great_circle_distance\n>>> point_a = (123.2, 82.32)\n>>> point_b = (178.0, 65.09)\n>>> # Calculate Great Circle Distance\n>>> dist = great_circle_distance(\n... point_a,\n... point_b,\n... point_a,\n... point_b)\n>>> print(dist)\n2378290.489801402\n```" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6479356,"math_prob":0.9970025,"size":1248,"snap":"2022-27-2022-33","text_gpt3_token_len":368,"char_repetition_ratio":0.15273312,"word_repetition_ratio":0.16216215,"special_character_ratio":0.34695512,"punctuation_ratio":0.24774775,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9974762,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-01T19:36:45Z\",\"WARC-Record-ID\":\"<urn:uuid:f2cddc73-1df0-4b96-af62-01caec7a4784>\",\"Content-Length\":\"26706\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f1587570-de5c-41e8-9a7b-0f1adeba9889>\",\"WARC-Concurrent-To\":\"<urn:uuid:8369f52b-e456-4593-a5ff-89d432140173>\",\"WARC-IP-Address\":\"104.21.20.106\",\"WARC-Target-URI\":\"https://xarray-spatial.org/reference/_autosummary/xrspatial.proximity.great_circle_distance.html\",\"WARC-Payload-Digest\":\"sha1:Q6BJJ6KUBO2GOEEZP2YBYN773X7QCWG2\",\"WARC-Block-Digest\":\"sha1:CSEUYJ5I5O4JQDJQ6VI75MHZ76TQDMF4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103945490.54_warc_CC-MAIN-20220701185955-20220701215955-00060.warc.gz\"}"}
https://patents.google.com/patent/US9514213B2/en
[ "# US9514213B2 - Per-attribute data clustering using tri-point data arbitration - Google Patents\n\nPer-attribute data clustering using tri-point data arbitration Download PDF\n\n## Info\n\nPublication number\nUS9514213B2\nUS9514213B2 US13/833,757 US201313833757A US9514213B2 US 9514213 B2 US9514213 B2 US 9514213B2 US 201313833757 A US201313833757 A US 201313833757A US 9514213 B2 US9514213 B2 US 9514213B2\nAuthority\nUS\nUnited States\nPrior art keywords\ndata\nsimilarity\npoints\narbiter\ndata points\nPrior art date\nLegal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)\nActive, expires\nApplication number\nUS13/833,757\nOther versions\nUS20140280146A1 (en\nInventor\nAlan Paul Wood\nAleksey M. Urmanov\nAnton A. Bougaev\nCurrent Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)\nOracle International Corp\nOriginal Assignee\nOracle International Corp\nPriority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)\nFiling date\nPublication date\nApplication filed by Oracle International Corp filed Critical Oracle International Corp\nPriority to US13/833,757 priority Critical patent/US9514213B2/en\nAssigned to ORACLE INTERNATIONAL CORPORATION reassignment ORACLE INTERNATIONAL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOUGAEV, ANTON A., URMANOV, ALEKSEY M., WOOD, ALAN PAUL\nPublication of US20140280146A1 publication Critical patent/US20140280146A1/en\nApplication granted granted Critical\nPublication of US9514213B2 publication Critical patent/US9514213B2/en\nApplication status is Active legal-status Critical\nAdjusted expiration legal-status Critical\n\n## Images\n\n•", null, "•", null, "•", null, "•", null, "•", null, "•", null, "•", null, "•", null, "•", null, "•", null, "•", null, "•", null, "## Classifications\n\n• G06F17/30598\n• GPHYSICS\n• G06COMPUTING; CALCULATING; COUNTING\n• G06FELECTRIC DIGITAL DATA PROCESSING\n• G06F16/00Information retrieval; Database structures therefor; File system structures therefor\n• G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data\n• G06F16/28Databases characterised by their database models, e.g. relational or object models\n• G06F16/284Relational databases\n• G06F16/285Clustering or classification\n\n## Abstract\n\nSystems, methods, and other embodiments associated with clustering using tri-point arbitration are described. In one embodiment, a method includes selecting a data point pair and a set of arbiter points. A tri-point arbitration similarity is calculated for data point pairs based, at least in part, on a distance between the first and second data points and the arbiter points. In one embodiment, similar data points are clustered.\n\n## Description\n\nBACKGROUND\n\nClustering or data grouping is one of the fundamental data processing activities. Clustering seeks to uncover otherwise hidden relationships between data objects with the goal of using the relationships to predict outcomes based on new data objects. For example, by identifying clusters in a set of patient data, an analyst can identify subgroups of patients with different success rates to specific treatments based on patients' data. The treatment plan for a new patient can then be based on the relationship between the new patient's data and the data for patients in the various subgroups, thus maximizing the success probability for the selected treatment regimen.\n\nClustering, as a data analysis tool, creates groups of data that are “close” together, where “close” implies a distance metric. Distance calculations used in clustering are defined by an analyst for the type of data based on the analyst's subjective intuition and/or experience about the similarity of the data. In some clustering techniques, the analyst selects a number of clusters to be created. Thus, the analyst's bias is present in some form in the resulting clustering, which may be overfit to existing data and produce arbitrarily uncertain results on new data.\n\nBRIEF DESCRIPTION OF THE DRAWINGS\n\nThe accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate various systems, methods, and other embodiments of the disclosure. It will be appreciated that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent one embodiment of the boundaries. In some embodiments one element may be designed as multiple elements or that multiple elements may be designed as one element. In some embodiments, an element shown as an internal component of another element may be implemented as an external component and vice versa. Furthermore, elements may not be drawn to scale.\n\nFIG. 1 illustrates an embodiment of a system associated with similarity analysis with tri-point data arbitration.\n\nFIG. 2 illustrates an embodiment of a method associated with similarity analysis with tri-point data arbitration.\n\nFIG. 3 illustrates results of one embodiment of similarity analysis with tri-point data arbitration given an example set of data points.\n\nFIG. 4 illustrates an embodiment of a method associated with similarity analysis with tri-point data arbitration.\n\nFIG. 5 illustrates an embodiment of a method associated with similarity analysis with tri-point data arbitration.\n\nFIG. 6 illustrates an embodiment of a method associated with data clustering using tri-point data arbitration.\n\nFIG. 7 illustrates an embodiment of a system associated with per-attribute similarity analysis with tri-point data arbitration.\n\nFIG. 8 illustrates an embodiment of a method associated with data clustering using tri-point data arbitration.\n\nFIG. 9 illustrates an embodiment of a method associated with data clustering using tri-point data arbitration.\n\nFIG. 10 illustrates results of one embodiment of data clustering using tri-point data arbitration given an example set of data points.\n\nFIG. 11 illustrates an embodiment of a computing system in which example systems and methods, and equivalents, may operate.\n\nDETAILED DESCRIPTION\n\nData clustering systems and methods described herein are based upon a similarity metric determined by way of tri-point arbitration. Tri-point arbitration removes the analyst bias from the similarity analysis by substituting, as arbiter of similarity (e.g., distance), other data points in a data set. The use of tri-point arbitration to produce a similarity metric between data points is described herein with reference to FIGS. 1-6. Data clustering using the similarity metric as determined by tri-point arbitration is described herein with reference to FIGS. 7-11.\n\nSimilarity Analysis with Tri-Point Arbitration\n\nThe basic building block of traditional similarity analysis in machine learning and data mining is categorizing data and their attributes into known and well-defined domains and identifying appropriate relations for handling the data and their attributes. For example, similarity analysis includes specifying equivalence, similarity, partial order relations, and so on. In trivial cases when all attributes are numeric and represented by real numbers, comparing data point attributes is done by using the standard less-than, less-than-or-equal, more-than, and more-than-or-equal relations, and comparing points by computing distances (e.g., Euclidean) between the two points. In this case, the distance between two data points serves as the measure of similarity between the data points. If the distance is small, the points are deemed similar. If the distance is large, the points are deemed dissimilar.\n\nA matrix of pair-wise distances between all data points in a data set is a standard similarity metric that is input to a variety of data mining and machine learning tools for clustering, classification, pattern recognition, and information retrieval. Euclidean distance is one possible distance between data points for use in the pair-wise matrix. A variety of other distance-based measures may be used depending on the specific domain of the data set. However, the distance based measures used in traditional machine learning are understandably all based on two data points.\n\nOne of the deficiencies of the traditional two data point distance approach to similarity analysis is the subjectivity that is introduced into the analysis by an outside analyst. An outside analyst determines the threshold on distances that indicate similarity. This leads to non-unique outcomes which depend on the analyst's subjectivity in threshold selection.\n\nTraditionally, a determination as to what constitutes “similarity” between data points in a data set is made by an analyst outside the data set. For example, a doctor searching for patients in a data set having “similar” age to a given patient specifies an age range in her query that, in her opinion, will retrieve patients with a similar age. However, the age range that actually represents “similar” ages depends upon the data set itself. If the data set contains patients that are all very similar in age to the given patient, the query may be over-selective, returning too many patients to effectively analyze. If the data set contains patients that have ages that have a wide variety of ages, the query may be under-selective, missing the most similar patients in the data set.\n\nAnother deficiency in the traditional two point distance approach to similarity analysis is the conceptual difficulty of combining attributes of different types into an overall similarity of objects. The patient age example refers to a data point with a single, numerical, attribute. Most machine learning is performed on data points that have hundreds of attributes, with possibly non-numerical values. Note that the analyst will introduce their own bias in each dimension, possibly missing data points that are actually similar to a target data point. Some pairs of points may be close in distance for a subset of attributes of one type and far apart in distance for another subset of attribute types. Thus, the analyst may miss data points that are similar to the target data point for reasons that are as yet unappreciated by the analyst. Proper selection of the similarity metric is fundamental to the performance of clustering, classification and pattern recognition methods used to make inferences about a data set.\n\nSystems and methods are described herein that cluster based on similarity analysis based on tri-point arbitration. Rather than determining similarity by an external analyst, tri-point arbitration determines similarity with an internal arbiter that is representative of the data set itself. Thus, rather than expressing similarity based on distances between two points and forcing the analyst to determine a range of distances that is similar, the systems and methods herein use three points to determine similarity, thereby replacing the external analyst with an internal arbiter point that represents the data set, i.e., introducing an internal analyst into similarity determination.\n\nTri-point arbitration is realized through the introduction of an arbiter data point into the process of evaluation of two or more data points for processing attributes and attribute combinations allowing for inference about possible relationships between the data points. The term “data point” is used in the most generic sense and can represent points in a multidimensional metric space, images, sound and video streams, free texts, genome sequences, collections of structured or unstructured data of various types. The disclosed tri-point arbitration techniques uncover the intrinsic structure in a group of data points, facilitating inferences about the interrelationships among data points in a given data set or population. The disclosed tri-point arbitration techniques have extensive application in the fields of data mining, machine learning, and related fields that in the past have relied on two point distance based similarity metrics.\n\nWith reference to FIG. 1, one embodiment of a learning tool 100 that performs similarity analysis using tri-point arbitration is illustrated. The learning tool 100 inputs a data set D of data points {x1, . . . , xk} and calculates a similarity metric using tri-point arbitration. The learning tool 100 includes a tri-point arbitration logic 110 and a similarity logic 120. The tri-point arbitration logic 110 selects a data point pair (x1, x2) from the data set. The tri-point arbitration logic 110 also selects an arbiter point (a1) from a set of arbiter points, A, that is representative of the data set. Various examples of sets of arbiter points will be described in more detail below.\n\nThe tri-point arbitration logic 110 calculates a tri-point arbitration coefficient for the data point pair based, at least in part, on a distance between the first and second data points and the selected arbiter point a1. The tri-point arbitration logic 110 calculates additional respective tri-point arbitration coefficients for the data point pair (x1, x2) based on respective arbiter points (a2-an). The tri-point arbitration coefficients for the data pair are combined in a selected manner to create an aggregate tri-point arbitration coefficient for the data pair. The aggregate tri-point arbitration coefficient for the data point pair, denoted ρTAC(x1, x2|A), is provided to the similarity logic 120. The tri-point arbitration logic 110 computes aggregate tri-point arbitration coefficients for the other data point pairs in the data set and also provides those tri-point arbitration coefficients to the similarity logic 120.\n\nFIG. 2 illustrates one embodiment of a tri-point arbitration technique that may be used by the tri-point arbitration logic 110 to compute the tri-point arbitration coefficient. A plot 200 illustrates a spatial relationship between the data points in the data point pair (x1, x2) and an arbiter point a. Recall that the data points and arbiter point will typically have many more dimensions than the two shown in the simple example plot 200. The data points and arbiter points may be points or sets in multi-dimensional metric spaces, time series, or other collections of temporal nature, free text descriptions, and various transformations of these. A tri-point arbitration coefficient for data points (x1, x2) with respect to arbiter point a is calculated as shown in 210, where ρ designates a two-point distance determined according to any appropriate technique:\n\n$ρ ⁢ ⁢ TAC ⁡ ( x 1 , x 2 ❘ a ) = min ⁢ ⁢ { ρ ⁡ ( x 1 , a ) , ρ ⁡ ( x 2 , a ) } - ρ ⁡ ( x 1 , x 2 ) max ⁢ ⁢ { ρ ⁡ ( x 1 , x 2 ) , min ⁢ ⁢ { ρ ⁡ ( x 1 , a ) , ρ ⁡ ( x 2 , a ) } }$\nThus, the tri-point arbitration technique illustrated in FIG. 2 calculates the tri-point arbitration coefficient based on a first distance between the first and second data points, a second distance between the arbiter point and the first data point, and a third distance between the arbiter point and the second data point.\n\nValues for the tri-point arbitration coefficient for a single arbiter point, ρTAC(x1, x2|a), range from −1 to 1. In terms of similarities, ρTAC(x1, x2)|a)>0 when both distances from the arbiter to either data point are greater than the distance between the data points. In this situation, the data points are closer to each other than to the arbiter. Thus a positive tri-point arbitration coefficient indicates similarity, and the magnitude of the positive coefficient indicates a level of similarity. ρTAC(x1, x2|a)=+1 indicates a highest level of similarity, where the two data points are coincident with one another.\n\nIn terms of dissimilarity, ρTAC(x1, x2|a)<0 results when the distance between the arbiter and one of the data points is more than the distance between the data points. In this situation, the arbiter is closer to one of the data points than the data points are to each other. Thus a negative tri-point arbitration coefficient indicates dissimilarity, and the magnitude of the negative coefficient indicates a level of dissimilarity. ρTAC(x1, x2|a)=−1 indicates a complete dissimilarity between the data points, when the arbiter coincides with one of the data points.\n\nA tri-point arbitration coefficient equal to zero results when the arbiter and data points are equidistant from one another. Thus ρTAC(x1, x2|a)=0 designates complete indifference with respect to the arbiter point, meaning that the arbiter point cannot determine whether the points in the data point pair are similar or dissimilar. If both data points and the arbiter are coincident, ρTAC(x1, x2|a)=0.\n\nReturning to FIG. 1, the similarity logic 120 determines a similarity metric for the data set based, at least in part, on the aggregate tri-point arbitration coefficients for the data point pairs. In one embodiment, the similarity metric is a pair-wise matrix, MTAC, of tri-point arbitration coefficients using the empirical formulation:\n\n$M TAC = ρ ⁢ ⁢ ETAC ⁢ ⁢ ( x 1 , x 1 ❘ A ) … ρ ⁢ ⁢ ETAC ⁡ ( x 1 , x k ❘ A ) ρ ⁢ ⁢ ETAC ⁡ ( x 2 , x 1 ❘ A ) … ρ ⁢ ⁢ ETAC ⁡ ( x 2 , x k ❘ A ) … … ρ ⁢ ⁢ ETAC ⁡ ( x k , x 1 ❘ A ) … ρ ⁢ ⁢ ETAC ⁡ ( x k , x k ❘ A )$\n\nThe illustrated pair-wise MTAC matrix arranges the aggregate tri-point arbitration coefficient for the data points in rows and columns where rows have a common first data point and columns have a common second data point. When searching for data points that are similar to a target data point within the data set, either the row or column for the target data point will contain tri-point arbitration coefficients for the other data points with respect to the target data point. High positive coefficients in either the target data point's row or column may be identified to determine the most similar data points to the target data point. Further, the pair-wise MTAC matrix can be used for any number of learning applications, including clustering and classification based on the traditional matrix of pair-wise distances. The matrix may also be used as the proxy for similarity/dissimilarity of the pairs.\n\nAs already discussed above, the arbitration point(s) represent the data set rather than an external analyst. There are several ways in which a set of arbitration points may be selected that represents the data set. The set of arbitration points A may represent the data set based on an empirical observation of the data set. For example, the set of arbitration points may include all points in the data set. The set of arbitration points may include selected data points that are weighted when combined to reflect a contribution of the data point to the overall data set. The aggregate tri-point arbitration coefficient calculated based on a set of arbitration points that are an empirical representation of the data set (denoted ρETAC(x1, x2|A) may be calculated as follows:\nρETAC(x 1 ,x 2 |A)=Σi=1 m w iρTAC(x 1 ,x 2 |a i)\nwhere Σi=1 mwi=1\nSetting wi=1/m for all i in the above equation calculates the average.\n\nVariations of aggregation of arbitration points including various weighting schemes may be used. Other examples of aggregation may include majority/minority voting, computing median, and so on.\n\nFor a known or estimated probability distribution of data points in the data set, the set of arbitration points corresponds to the probability distribution, f(a). The aggregate tri-point arbitration coefficient calculated based on the probability distribution (denoted ρPTAC) may be calculated as follows:\n\n$ρ ⁢ ⁢ PTAC ⁢ ⁢ ( x 1 , x 2 ❘ f ⁡ ( a ) ) = ∫ a lo a hi ⁢ ρ ⁢ ⁢ TAC ⁢ ⁢ ( x 1 , x 2 ❘ a ) ⁢ f ⁡ ( a ) ⁢ ⁢ ⅆ a$\n\nAs an illustration, the ρPTAC for a uniformly distribution of data points in intervals computed analytically in closed form are given by the following equations assuming the Euclidean distance.\n\nFor a1<x1−(x2-x1)<x<x2<x2+(x2−x1)<a2, the ρPTAC is given by:\n\n$ρ ⁢ ⁢ PTAC ⁢ ⁢ ( x 1 , x 2 ❘ f ⁡ ( a ) ) = ⁢ x 1 - ( x 2 - x 1 ) - a 1 a 2 - a 1 + ⁢ x 2 - x 1 a 2 - a 1 ⁢ ( log ⁡ ( x 2 - x 1 ) - log ⁢ ⁢ ( x 1 - a 1 ) ) + ⁢ 5 8 ⁢ x 2 - x 1 a 2 - a 1 - ⁢ 3 2 ⁢ x 2 - x 1 a 1 - a 1 + ⁢ 5 8 ⁢ x 2 - x 1 a 2 - a 1 - ⁢ 3 2 ⁢ x 2 - x 1 a 2 - a 1 + ⁢ a 2 - ( x 2 + ( x 2 - x 1 ) ) a 2 - a 1 - ⁢ x 2 - x 1 a 2 - a 1 ⁢ ( log ⁡ ( a 2 - x 2 ) - log ⁡ ( x 2 - x 1 ) )$\n\nFor x1−(x2−x1)<a1 and x2+(x2−x1)<a2, the ρPTAC is:\n\n$ρ ⁢ ⁢ PTAC ⁡ ( x 1 , x 2 ❘ f ⁡ ( a ) ) = ⁢ ( x 1 - a 1 ) 2 2 ⁢ ( x 2 - x 1 ) ⁢ ( a 2 - a 1 ) + x 2 ⁢ - x 1 8 ⁢ ( a 2 - a 1 ) - ⁢ x 1 + ( x 2 - x 1 ) ⁢ / ⁢ 2 - a 1 a 2 - a 1 + ⁢ 5 8 ⁢ x 2 - x 1 a 2 - a 1 - ⁢ 3 2 ⁢ x 2 - x 1 a 2 - a 1 + ⁢ a 2 - ( x 2 + ( x 2 - x 1 ) ) a 2 - a 1 - ⁢ x 2 - x 1 a 2 - a 1 ⁢ ( log ⁡ ( a 2 - x 2 ) - log ⁡ ( x 2 - x 1 ) )$\n\nAnd for x1−(x2−x1)>a1 and x2+(x2−x1)>a2, the PTAC is:\n\n$ρ ⁢ ⁢ PTAC ⁡ ( x 1 , x 2 ❘ f ⁡ ( a ) ) = ⁢ x 1 - ( x 2 - x 1 ) - a 1 a 2 - a 1 + ⁢ x 2 - x 1 a 2 - a 1 ⁢ ( log ⁡ ( x 2 - x 1 ) - log ⁡ ( x 1 - a 1 ) ) + ⁢ 5 8 ⁢ x 2 - x 1 a 2 - a 1 - ⁢ 3 2 ⁢ x 2 - x 1 a 2 - a 1 + ⁢ x 2 - x 1 8 ⁢ ( a 2 - a 1 ) + ( a 2 - x 2 ) 2 2 ⁢ ( x 2 - x 1 ) ⁢ ( a 2 - a 1 ) - ⁢ a 2 - ( x 2 - ( x 2 - x 1 ) ⁢ / ⁢ 2 ) a 2 - a 1$\n\nThus, the tri-point arbitration coefficient can be calculated using an empirical observation of the data point values in the data set, an estimated distribution of the data point values in the data set or an actual distribution of data point values in the data set.\n\nUsing tri-point arbitration with an arbiter point that represents the data set yields more appealing and practical similarity results than using a traditional two point distance approach. FIG. 3 graphically illustrates a similarity metric 300 that classifies data points as being more similar to either triangle (coordinates −1,0), circle (coordinates 0,0), or diamond (coordinates 1,0). Analysis begins by considering all possible pairs of points {triangle, x} using the other two as a set of analysts: A\\triangle={diamond, circle}. The corresponding ρETAC(triangle, x|A\\triangle) are computed. The same procedure is repeated for all pairs {diamond, x} and A\\diamond={triangle, circle} and for the circle. All points for which ρETAC(diamond, x)>max(ρETAC(triangle, x), ρETAC(circle, x)) are marked as points similar to diamond. And similarly points similar to triangle and circle are marked.\n\nThe resulting structuring is presented in FIG. 3. All points lying in the // hashed region A are similar to the triangle point. All points lying in \\\\ hashed region C are similar to the diamond point. All points within the un-hashed region B are similar to the circle point. Note that there are regions in which distance-wise points may be closer to the “circle” point but are actually more similar to triangle or diamond. Given a query point q one finds the most similar object from the data set {“red”, “green”, “blue”} by determining in which region the point q falls.\n\nFIG. 4 illustrates one embodiment of a method 400 for performing tri-point arbitration. The method includes, at 410, selecting a data point pair including a first data point and a second data point from the data set. The method includes, at 420, selecting an arbiter point that is representative of the data set. At 430, the method includes calculating a tri-point arbitration coefficient for the data point pair based, at least in part, on a distance between the first and second data points and the arbiter point. The method includes, at 440, producing a similarity metric for the data set based, at least in part, on the tri-point arbitration coefficients for data point pairs in the set of data points calculated using the selected arbiter point.\n\nArbiter Point Selection\n\nIn the embodiments discussed above, the set of arbiters is in some way representative of the data set itself. For example, the arbiter points used to determine similarity between two points may be all other points in the data set, an arbitrary subset of data points from the data set, a statistical representation of the data set, and so on. In one embodiment, the set of arbiter points is not directly representative of the data set. For example, a set of doctors may be used as a set of arbiters for determining similarity between patient data. Thus tri-point arbitration can be performed with respect to any set of arbiters, and in this manner the perspective used to determine similarity is expressed in the selection of arbiters.\n\nProcessing Queries to Find Similar Points\n\nFIG. 5 illustrates one embodiment of a method 500 that uses tri-point arbitration to return data points that are similar to a target data point in response to a query that specifies the target data point. Recall the example of the doctor searching for patients that are similar to her patient. The method includes, at 510, receiving a query to return data points in a data point set that are similar to a target data point. The method includes, at 520, augmenting the data set with the target data point. Thus, the data set is augmented with a target data point that describes the doctor's patient (the target data point may include 100s of attributes).\n\nThe method includes, at 530, calculating respective aggregate tri-point arbitration coefficients for respective data point pairs in the augmented data set. The aggregate tri-point arbitration coefficients are calculated by determining a set of arbiter points that represent data in the augmented data set. For each data point pair in the augmented data set and each arbiter point in the set of arbiter points: i) an arbiter point is selected from the set of arbiter points; ii) a tri-point arbitration coefficient is calculated for the data point pair given the selected arbiter based, at least in part, on a distance between the data point pair and the selected arbiter point; and iii) tri-point arbitration coefficients calculated for the data point pair are aggregated to produce the aggregate tri-point arbitration coefficient for the data point pair.\n\nThe method includes, at 540, identifying data point pairs that have aggregate tri-point arbitration coefficients that, when the target data point is used as the arbiter, meet a similarity criteria as similar data point pairs. For example, a row or column in a pair-wise matrix of tri-point arbitration coefficients that corresponds to the target data point may be analyzed to return positive values which indicate similarity between a data point pair and the target data point. The method includes, at 550, returning the similar data point pairs.\n\nDistances between points and arbiters may be combined in different ways to compute a similarity metric for the points. In one embodiment, as described above, for a pair of points, the distances between attributes of the pair of points and an arbiter point are combined to compute a “per-arbiter similarity.” The per-arbiter similarities are combined to compute the similarity metric for the pair of points. In one embodiment, for each pair of data points, the per-arbiter similarities for all arbiters are combined into the similarity metric by taking an average of the per-arbiter similarities for the data points.\n\nIn one embodiment, the distance between two points is computed using all numerical attributes. Multi-dimensional data is combined into a single distance measurement and this distance measurement is used to determine the similarity between the arbiter and a pair of points. This approach can be difficult to apply to situations with non-numeric data. For example, if two of the attributes are a person's age and gender, then the “distance” between male and female has to be artificially converted to a number that can be compared with age difference.\n\nIn one embodiment, instead of the average of the similarity metrics, a number of arbiters who deem the pair of points similar is used as the similarity metric. The minimum threshold value for the similarity metric that will result in data points being deemed similar by an arbiter may be varied, depending on a desired degree of similarity or other statistics-based factors as described below. The similarity metric for each pair of data points becomes an entry in the similarity matrix MTAC.\n\nPer-Attribute Tri-Point Similarity Analysis\n\nIn another embodiment that may be more suitable for data containing non-numeric attributes converted into numeric values, the arbiter and a pair of points are compared in each dimension separately and then the results of the comparison for all arbiters in each dimension are combined to create an overall comparison. This approach is useful i) for non-numerical data, such as binary yes/no data or categorical data, ii) when the magnitude of the difference in a dimension doesn't matter, or iii) when some of the data attributes are more important than others. In this embodiment, the distances between attributes of the points and each given arbiter are not combined to compute per-arbiter similarities. Instead distances between attributes of the points and the arbiters are combined on a per attribute basis for all the arbiters to compute “per-attribute similarities.” The per-attribute similarities are combined to compute the similarity metric.\n\nFIG. 6 illustrates one embodiment of a method 600 that computes per-attribute similarities to create the similarity metrics in the similarity matrix MTAC. At 610, for a data set D, distances between each pair of data points are computed for each attribute. Distances between attributes of different types may be computed differently as described below. In the described embodiment, for each pair of data points, the other N-2 data points are arbiters. In other embodiments, a subset of data points, a statistical representation of the data points, or a set of arbiters not selected from the data set itself may be used as arbiters.\n\nAt 620, a per-attribute similarity is computed based on the distances, in the attribute, between the arbiters and each member of the pair of data points. The per-attribute similarity may be a number between −1 and 1.\n\nIf the arbiter is farther from both of the data points in the pair than the data points in the pair are from each other, then the pair of data points is similar to each other, for this attribute, from the point of view of the arbiter. Depending on the distances between the arbiter and the data points, the per-attribute similarity will be a positive number less than or equal to 1.\n\nOtherwise, if the arbiter is closer to either of the data points in the pair than the data points are to each other, then the pair of data points is not similar to each other, for this attribute, from the point of view of the arbiter. Depending on the distances between the arbiter and the data points, the per-attribute similarity will be a negative number greater than or equal to −1.\n\nWhen the arbiter and the data points are equidistant from one another, the data points may be deemed similar to one another, or this attribute and this arbiter may not be included in the similarity analysis. The similarities for each attribute for a given arbiter are combined to create a similarity metric for the pair of data points with respect to the given arbiter.\n\nPer-attribute distances can be combined in any number of ways to create a per-attribute similarity. Per-attribute distances can be weighted differently when combined to create a per-attribute similarity. Per-attribute distances for a selected subset of arbiters may be combined to create the per-attribute similarity. For example, all distances for a given numeric attribute for all arbiters can be combined for a pair of points to create a first per-attribute similarity, all distances for a given binary attribute can be combined for the pair of points to create a second per-attribute similarity, and so on.\n\nAt 630, the per-attribute similarities are combined into the similarity metric for the data point pair. The similarity metric may be computed as an average of the per-attribute similarities for the data points. The per-attribute similarities may be combined in any of a number of ways to compute the similarity metric. In one embodiment, a proportion of per-attribute similarities that indicate similarity may be used as the similarity metric. For example, if two data points are similar in a 3 out of 5 attributes, then the data points may be assigned a similarity metric of 3/5. At 640, the per-attribute similarity matrix is returned.\n\nCertain data points may be missing data for some attributes due to sampling or recording issues. One way to account for missing attribute data in one or both of a pair of data points, or the arbiter point, is to not count that attribute in the overall distance/similarity metric calculation for the data point pair. This does result in similarity metrics for different pairs of data points that are based on different subsets of attributes.\n\nDistance Calculation Techniques\n\nThe similarity depends on a notion of distance between the pair of data points being analyzed and the arbiter point. Any technique for determining a distance between data points may be employed when using tri-point arbitration to compute the similarity. Distances may be calculated differently depending on whether a data point has a numerical value, a binary value, or a categorical value. In one embodiment, all types of data points are converted into a numerical value and a Euclidean distance may be calculated. In general, some sort of distance is used to determine a similarity ranging between −1 and 1 for a pair of points using a given arbiter point. A few examples of techniques for determining distance and/or similarity for common types of data types follow.\n\nDistance between data points having a numerical value, such as age, blood pressure, and counts may be calculated as a difference or relative difference between the data point values. The distance may also take into account the range and meaning of the data values. For example, the physiological difference between a 1 year old and a 21 year old is normally far greater than the difference between a 21 year old and a 41 year old. To capture this information in the distance calculation, the distance between ages may be computed as a ratio between ages rather than a simple difference between ages. Any other function that captures information about the similarity between data points may be used to calculate distance between numerical data points.\n\nFor binary data, which includes gender, yes/no, right-handed/left-handed, and so on, the distance can be assigned a value of 1 if a pair of points has the same value or −1 if the pair of points has opposite values. However, the similarity for the same pair of points might be different depending on the arbiter point's value. If the pair of points have different values, regardless of the arbiter's value (which will coincide with the value of one of the points), then the similarity is determined to be −1. If the pair of points have the same value and the arbiter point has the opposite value, the similarity is determined to be 1. If the pair of points and the arbiter point all have the same value, the similarity may be determined to be 0, or the similarity for this arbiter and this pair of points may be excluded from the similarity metric computed for the pair of points. Put another way, the similarity between binary attributes of a data point pair can be determined as 1 if a Hamming distance between (x1) and (x2) is less than both a Hamming distance between (x1) and (a) and a Hamming distance between (x2) and (a). The similarity between binary attributes of a data point pair can be determined as −1 if the Hamming distance between (x1) and (x2) is greater than either the Hamming distance between (x1) and (a) or the Hamming distance between (x2) and (a). The similarity between binary attributes of a data point pair can be determined as 0 (or undefined) if a Hamming distance between (x1) and (x2) is equal to both the Hamming distance between (x1) and (a) and the Hamming distance between (x2) and (a).\n\nFor categorical data where values are selected from a finite set of values such as types of employment, types of disease, grades, ranges of numerical data, and so on, the distance can be assigned a value of 1 if a pair of points has the same value or −1 if the pair of points has different values. However, the similarity for the pair of points might be different depending on the arbiter point's value. If the pair of points have different values, regardless of the arbiter's value (which will coincide with the value of one of the points), then the similarity is determined to be −1. If the pair of points have the same value and the arbiter point has a different value, the similarity is determined to be 1. If the pair of points and the arbiter point all have the same value, the similarity may be determined to be 0, or the similarity for this arbiter and this pair of points may be excluded from the similarity metric computed for the pair of points. Based on a priori assumptions about similarity between category values, fractional similarity may be assigned to data point values that express degrees of similarity. For example, for data points whose values include several types of diseases and grades of each disease type, a similarity of ½ may be assigned to data points having the same disease type, but a different grade.\n\nA set of if-then rules may be used to assign a similarity to data point pairs given arbiter values. For example, if a data point can have the values of cat, dog, fish, monkey, or bird, a rule can specify that a similarity of 1/3 is assigned if the data points are cat and dog and the arbiter point is monkey. Another rule can specify that a similarity of −2/3 is assigned if the data points are cat and fish and the arbiter point is dog. In this manner, any assumptions about similarity between category values can be captured by the similarity metric.\n\nData Clustering Using Tri-Point Arbitration\n\nClustering, as a data analysis tool, creates groups of data that are “close” together, where “close” implies a distance metric that is used as a proxy for similarity. Both unsupervised and supervised clustering are based on pair-wise comparison of data points in the data set. The comparison is done by computing distances defined for the type of data or by devising heuristic scores that capture the analyst's subjective intuition and/or experience about similarity of data objects. When the attributes are numeric or can be converted to numeric, distance metrics, such as the Euclidean distance between two points shown in Equation (1) below, are applicable. This distance is based on a certain attribute or on attribute combinations, represented by the ai−bi for k attributes in Equation (1). For example, subgroups in a group of patients can be identified based on attributes such as age, gender, results of a certain test, type of disease, disease progression level, and/or genetic characteristics.\nd(a,b)=√{square root over ((a 1 −b 1)2+ . . . +(a k −b k)2)}  (1)\n\nAs an input to most clustering techniques, the distances between all pairs of points are calculated and stored, creating the distance matrix shown in Equation (2).\n\n$M d = ( d ⁡ ( x 1 , x 1 ) … d ⁡ ( x 1 , x k ) … d ⁡ ( x k , x 1 ) … d ⁡ ( x k , x k ) ) ( 2 )$\n\nAmong the most notable and widely used clustering algorithms are K-means clustering, hierarchical clustering, density-based clustering, distribution based clustering, and self organized clustering. Any of these methods may benefit from the use of tri-point arbitration to determine the distance or similarity between points. A tri-point clustering algorithm that is enabled by and devised based on tri-point arbitration to determine similarity is described with respect to FIGS. 8 and 9.\n\nK-means clustering creates k clusters by selecting k central locations, called centroids because they are usually the mean of the points in the cluster, and assigning each point to the nearest centroid based on Euclidean distance. An algorithm then iterates centroid selection to minimize the total sum of the distance from each data point to its nearest centroid. This creates spherical or elliptical clusters in n dimensions. The analyst specifies the number of centroids as an input parameter. The resulting clusters may vary significantly depending on the initial starting point and input number of clusters. Therefore, multiple runs and additional analysis may be required before the clustering results can be used.\n\nIn hierarchical clustering each point is initially a cluster, and the closest clusters are iteratively combined. The value of “close” can be measured by one of many metrics, as selected by the analyst, such as minimum, maximum, or average distance among cluster members. The algorithm stops combining clusters when the clusters are too far apart to be merged (an analyst selected distance criterion) or when there is a sufficiently small number of clusters (an analyst selected number criterion). It is also possible to perform hierarchical clustering top-down by starting with all the points in a single cluster and progressively splitting the clusters.\n\nDensity-based clustering (DBSCAN) starts with any point and grows a cluster by adding all points within a certain distance of the point and then adding all points within the same distance of those points. This method determines the number of clusters rather than requiring an initial number of clusters and can create clusters of arbitrary shapes. The analyst specifies the expected density of points in clusters or a threshold distance as a required input, which shapes up clustering results in accordance with the analyst's input.\n\nIn distribution-based clustering, clusters are defined as objects belonging to the same distribution, and statistical methods are used to find the clusters. This method assumes that distributions that fit the data can be defined and often suffers from overfitting complex models, especially for high-dimensional spaces.\n\nSelf-organized clustering is a combination of clustering followed by multi-dimensional projection for plotting. The clustering part of the algorithm(s) are very similar to algorithms used for k-means clustering. The analyst specifies the structure of the map to be used, which affects the resulting grouping. Self-organized clustering typically requires a large number of training points. The result may be significantly altered by presence of anomalous data points of “irrelevant” factors.\n\nThe attribute-based groupings found by cluster analysis may seem a natural division of the data but may not be effective for the purpose of the clustering, e.g., for treatment selection and predicting the outcome of a treatment regimen. Therefore, additional information is typically used in cluster creation to obtain better results. For example, for a group of patients treated with a certain drug, additional information can be available that indicates how well the treatment worked. In such situations, the analyst can evaluate the clustering based on patient attributes using the treatment results as a measure of the goodness of the grouping, and adjust the grouping algorithms to optimize the clustering. In this context, “optimize” means that when a new patient's attributes correlate with patients in a cluster, the response of the patient to treatment is similar to that of the patients in the cluster. This involves an element of supervision due to the introduction of a feedback mechanism into attribute-based clustering.\n\nIn essence, for distance-based clustering, the distance between the two points serves as a proxy for the similarity of two points. During the clustering process, the analyst adjusts parameters of the clustering process based on what the analyst thinks is similar and what is not. For example, using K-means clustering, the analyst would select a number of clusters that seems to give good results; using density-based clustering, the analyst would select a distance that seems to give good results. While this subjective approach may work in some situations, it will most likely fail in other situations or for slight changes in the underlying structure of the data or the data-generating mechanism. The analyst, by adjusting the parameters, may achieve arbitrarily accurate results on the existing set of data points, but an algorithm overfit to the existing data will produce arbitrarily uncertain results on new data. Such sensitivity to slight changes in the assumptions makes the resulting diagnostics systems unstable and unreliable for predictions based on the clusters.\n\nThe disclosed data clustering uses tri-point arbitration to evaluate the similarity between the data points. Rather than an analyst artificially specifying a distance that is “close enough,” a number of clusters, a size of cluster, or a cluster forming property such as density of points, in the disclosed data clustering each data point contributes to the determination of the similarity of all other pairs of data points. In one embodiment, the similarity determination made by the data points are accumulated, and pairs of data points that are determined to be similar by some aggregation of arbiters, such as a majority rule, are grouped in the same cluster. Aggregation can be based on any sort of distance metric or other criterion as described later, and each attribute or a group of attributes can be evaluated separately when aggregating. The analyst may alter the behavior of the aggregation rules, such a majority thresholds, but these parameters can be based on statistical analysis of the probability that randomly selected data would be voted to be similar, rather than on the analyst's intuition. Thus, the data, rather than the analyst, controls the cluster formation.\n\nFIG. 7 illustrates an example embodiment of a tri-point clustering tool 700. The tri-point clustering tool 700 is configured to use a set of one or more arbiter points A that are representative of a data set D to cluster similar data points in the data set. A first data point (x1) and a second data point (x2) are determined to be similar by an arbiter point (a) when a distance between (x1) and (x2) is less than: i) a distance between (x1) and (a) and ii) a distance between (x2) and (a).\n\nThe tri-point clustering tool 700 includes a tri-point similarity logic 710 and a clustering logic 630. The tri-point similarity logic 710 uses tri-point arbitration to produce a similarity matrix as shown below and as described above with reference to FIGS. 1-6. Given a data set D and a set of arbiters A to be used for clustering, the tri-point similarity logic 710 computes the similarity matrix on pair-wise tri-point arbitration coefficients as:\n\n$M TAC = ρ ⁢ ⁢ TAC ⁡ ( x 1 , x 1 ❘ A ) … ρ ⁢ ⁢ TAC ⁡ ( x 1 , x k ❘ A ) ρ ⁢ ⁢ TAC ⁡ ( x 2 , x 1 ❘ A ) … ρ ⁢ ⁢ TAC ⁡ ( x 2 , x k ❘ A ) … ρ ⁢ ⁢ TAC ⁡ ( x k , x 1 ❘ A ) … ρ ⁢ ⁢ TAC ⁡ ( x k , x k ❘ A ) ⁢ ⁢ Where ⁢ ⁢ ρ ⁢ ⁢ TAC ⁡ ( x i , x j ❘ A ) = 1  A  ⁢ ∑ k = 1  A  ⁢ ⁢ ρ ⁢ ⁢ TAC ⁢ ⁢ ( x i , x j ❘ a k ) ( 3 )$\n\nThe entries of the matrix are computed using simple averaging over arbiters. Any number of different weighting schemes may also be used. Each entry of the matrix is a number between −1 and 1, with 1 indicating perfect similarity between a data point pair and −1 indicating perfect dissimilarity.\n\nData Clustering\n\nThe clustering logic 730 inputs the similarity matrix computed by the tri-point similarity logic 710. The similarity matrix records the similarity metric for each pair of data points as determined by some predetermined set of arbiter points that may be representative of the other data points in the data set.\n\nThresholds for Similarity\n\nThe clusters that will be created using tri-point arbitration, especially the size of the clusters, are dependent on the criteria used to identify similar points. Two criteria affect the similarity determination. A first criterion specifies what similarity/distance will cause a pair of data points to be determined as similar with respect to a given arbiter. A second criterion specifies what will cause a pair of data points to be determined as similar with respect to the entire set of arbiters. In embodiment, the first criterion is a positive similarity metric and the second criterion is that 50% of all arbiters identify the data points as similar.\n\nUnlike other clustering techniques, a user does not have to input thresholds or other parameters such as the number of clusters for k-means clustering. In one embodiment, a threshold on the similarity metric that is greater than 0, such as 0.25, is used to require more significant similarity for clustering purposes. In one embodiment, a range of near-zero values for the similarity metric are identified. Any arbiters that yield a similarity metric for a pair of data points that falls within the range do not vote on the similarity of the data points.\n\nAnother variation is using statistical estimates to set the thresholds rather than subjective estimates. For example, for a distance based attribute, the probability of any 2 points out of 3 random points being the closest is 1/3, so the probability that an arbiter determines a pair is similar in a distance based attribute is 1/3 if all 3 points are randomly selected. If there are 2 independent distance based attributes, then the probability that the arbiter determines the pair is similar on neither attribute is 4/9 (2/3×2/3), similar on 1 is 4/9 (2/3×1/3+2/3×1/3), and similar on 2 is 1/9 (1/3×1/3). Probabilities for other attributes can be determined similarly and combined using simple statistics to determine the probability distribution for the distance metric.\n\nFor example, if there are 3 distance based attributes, the probability that an arbiter determines a random pair of points is similar based on more than half (2 or 3) of the attributes being similar is 0.26. If there are 8 arbiters that each have a 0.26 probability of determining a random pair of points is similar, the probability that more than half (5 or more arbiters) determine a random pair of points is similar is 0.03. This kind of analysis provides a confidence level that can be used by the analyst for selecting appropriate measurements and thresholds.\n\nWhen the attributes are independent, it is possible to use simple statistics to set a similarity threshold. For tri-point clustering, a similarity metric ranging from −1 to +1 is provided. For 3 random points comprising a pair and an arbiter, this measurement would be negative 2/3 of the time and positive 1/3 of the time. This is because the closest 2 out of 3 random points are equal with a probability of 1/3, so a random arbiter would determine that a random pair is close together 1/3 of the time. The Binomial distribution can be used to decide the probability that k or more out of n arbiters determine that the pair is close when a single arbiter has a probability p of determining that the pair is close:\n\n$∑ i = k n ⁢ ⁢ ( n k ) ⁢ ( p ) i ⁢ ( 1 - p ) n - i ( 4 )$\n\nFor 100 data points, there are 98 arbiters per pair. With p=1/3, the probability that half (49) or more of the arbiters determine that the pair of data points is similar is 0.05% for random points. Therefore, if a pair of data points is similar using a 50% threshold for the number of arbiters, it is highly probable that the pair of data points actually is similar. Besides randomness, this assumes a continuous distance measurement, which may not be true for binary and categorical data. In those cases, accommodations may need to be made such as the ones described in the following for per-attribute similarity.\n\nFor similarity-by-attribute, the binomial equation above applies on a per-attribute basis to continuous data. It is used on a recursive basis with n=number of attributes, k=threshold, e.g., half, and p=result from the binomial equation (4). For example, with 100 data points, p=0.05% from the previous paragraph. With 5 attributes, the chance that a pair of data points would be considered close in 3 or more attributes (n=5, k=3, p=0.0005) would be less than 10−12. This analysis can be modified for binary or categorical data. For binary data, if a pair of data points is determined to be similar whenever they have the same value (0 or 1, true or false, male or female, etc.), then p=0.5, and the probability that a pair of data points is similar will be 0,5. If instead, a pair of data points is determined to be similar only when they have the same value and the arbiter has a different value, then p=0.25, and the random probability that a pair of data points is voted close will be low.\n\nThe above calculations assume that the data is uniformly distributed. If 75% of the people in the sample are female, then the probability that 2 randomly chosen people are female is much higher than if the sample was 50% female. Let b0 be the probability that a sample value is 0, e.g., the fraction of the sample that is the value 0, and let b1 be the probability that a sample value is 1. Then the probability that 2 random points would match in that attribute is b0 2+b1 2. That is the appropriate value to use for p in the binomial equation (4) if a pair of data points is determined to be similar when they have the same value. If a pair of data points is determined to be similar only when they have the same value and the arbiter has a different value, then p=b0 2b1+b1 2b0.\n\nFor example, if the patient population is 90% male and 10% female, the probability that a random pair is the same gender is 82% (0.9×0.9+0.1×0.1) rather than 50%. To some degree, the tri-point arbitration automatically accounts for non-uniform distributions. If a pair of patients is male, then most of the other data points will have a tri-point arbitration coefficient of 0, at least for this attribute, because they are also male while 10% will have a tri-point arbitration coefficient of 1 because they are female. If a pair of patients is female, then 90% of data points will have a tri-point arbitration coefficient of 1 because they are male, which is a much more positive response. It would be likely to cluster all females together, but males would be likely to be in multiple clusters depending on other attributes. Thus, rare attribute values have more weight in cluster formation using tri-point arbitration.\n\nFor ternary data such as 3 categories, let b2 be the probability that the attribute has the third value, and the same ideas apply. If a pair of data points is determined to be similar only when they have the same value, p=b0 2+b1 2+b2 2. A more reasonable choice is p=b0 2(1−b0)+b1 2(1−b1)+b2 2(1−b2)+2b0b1b2, where the first 3 terms are the probability that the pair of data points have the same value which is a different value than the arbiter, and the last term is the probability that all 3 have different values and the pair have the closer values. In all these cases, it is possible to use an equation like the binomial equation (4) to determine the probability that a random arbiter would say a random pair is similar.\n\nIn various described embodiments, all data points are used as arbiters. It is also possible to subset the data or arbiters into groups and compare or combine clusters. In one embodiment, data points are initially assigned to multiple clusters, and a final cluster assignment is based on an aggregation rule involving only points in the cluster. In some cases it may be reasonable to have points that reside in multiple clusters, e.g., a car model type might belong in both a sports car cluster and a luxury car cluster. One algorithm variation is to assign points to multiple clusters, e.g., point B would be in a cluster with A and C if it was close to both of them, but A and C would be in different clusters because they are not close.\n\nFIG. 8 illustrates an example embodiment of a tri-point clustering method 800. The method 800 may be employed by the clustering logic 630 to cluster data points using the similarity matrix computed by the tri-point similarity logic 710. At 810, similar data points are identified. The data points are identified as being similar using tri-point arbitration as described above. For example, if a similarity matrix that records similarity metrics for data point pairs taken with respect to an aggregate of arbiter points is used, data point pairs having a similarity metric greater than some threshold value are identified as similar. For example, data points having a positive similarity metric may be identified as similar. If a greater degree of similarity is desired, a higher threshold on the similarity metric, such as ¼, may be used to identify similar data points.\n\nIn one embodiment, a majority rule is used to identify similar data points. In this embodiment, a number of arbiter points that identify a given data point pair as being similar is tallied for each data point pair. If a certain aggregation of arbiter points indicates that the data point pair is similar, then the pair of data points is identified as similar for clustering purposes. For example, if for a majority of arbiter points the tri-point similarity coefficients are positive, the data points may be identified as similar. Arbiter aggregation may be performed on a per-attribute basis or a per-attribute-group basis. Data point pairs identified as similar on a given number of attributes, or on selected attributes, may be identified as similar for clustering purposes. Alternatively, data points may be identified as similar on a per-attribute basis.\n\nAt 820, similar data points are clustered. Different criteria for membership in a cluster may be used. For example, data points that are similar to at least one other data point in the cluster may be included in the cluster. Data points may be assigned to all clusters that include at least one data point to which they are similar. Membership in a cluster may be limited to data points that are similar to at least a threshold number of other data points in the cluster. Clusters may be merged when a first cluster contains a threshold number of data points that have a similar data point in a second cluster.\n\nFIG. 9 illustrates an example embodiment of a method 900 for performing tri-point arbitration clustering. At 910, a first cluster is created with an initial pair of similar data points. As already discussed, a threshold on similarity may be established for cluster membership. At 920, data points that are similar to a member of the first cluster are subsumed into the first cluster until there are no remaining data points that are similar to a member of the first cluster. At 930, a remaining un-clustered data point, if any, is identified. At 940, a next cluster is created for the identified data point. At 950, the next cluster is grown by adding data points that are similar to the identified remaining data point until no data points remain that are similar to the identified remaining data point. The method continues until no remaining un-clustered data points remain at 930 and the clustering is complete.\n\nTri-Point Data Clustering Example\n\nReferring now to FIG. 10, this section contains an example of applying the tri-point arbitration clustering method to a common disease. There are about 500 patient data records, of which 10 are randomly selected for this example. The relevant attributes are shown in table 1000. The objective of this exemplary study is to group patients and then see if those groups show similar outcome characteristics (as shown by “outcome” column).\n\nWhile patient data is used in this example, tri-point clustering may be performed on any type of data upon which distances between data point attributes can be computed. Other types of patient data include genomic, clinical, environmental, and socio-economic data. Audio and visual data is also well suited for tri-point similarity analysis and clustering.\n\nThe attributes in the table 1000 and appropriate distance metrics for them are as follows. Attribute1 is the patient's age at initial diagnosis. Distance between ages is determined as the absolute value of the difference in the ages, the standard metric for a numerical value. If either member of the pair or the arbiter has a null value, this attribute is not used to compute a similarity metric. Note: an alternative for an arbiter null value would be to determine that the pair of points is similar to the arbiter if the distance between the pair is less than the average pair-wise distance.\n\nAttribute2 (male/female) is scored as described earlier for binary data. The pair of data points is similar is they have the same gender and the arbiter has a different gender. The pair is different is they have different gender. If the pair and arbiter all have the same value, the attribute gets a similarity metric of 0.\n\nAttribute3 performance score (0-100) quantifies patients' general well-being and activities of daily life with a score of 100 meaning unimpaired. This numeric data attribute uses the same distance metric as age.\n\nAttribute4 (yes/no) is disease specific parameter. This binary data attribute uses the same similarity metric as gender.\n\nAttribute5 (yes/no) is a disease specific parameter. This binary data attribute uses the same metric as gender.\n\nAttribute5 is a disease specific percentage (0-100). This attribute is treated as binary data for similarity analysis where the binary values are none (0) and some (>0).\n\nAttribute6 is a disease specific percentage (0-100). This attribute is treated as a numeric data attribute, but the similarity is based on the relative value of the difference instead of the absolute value, i.e.,\n\n$ X 1 - X 2  max ⁢ ⁢ ( X 1 , X 2 ) .$\n\nThere are 45 pairs of points for which a distance metric is calculated in each of 7 attributes. For example, patients 1 and 2 are similar in binary data Attribute4 and Attribute6, different in binary data gender and Attribute5, have a difference of 20 in Attribute3 performance score, have a relative difference of 0.11=(90-80)/90 in Attribute7, and are not scored on age because patient 2 does not have a value for age.\n\nWith N=10, there are 8 arbiters for the 45 pairs of points, meaning 360 calculations for each of 7 attributes. For example, with patient 5 as an arbiter of the pair of points {1,2}, age is not scored (e.g., the similarity for arbiter 5 for the attribute of age is not calculated) because patient 2 does not have a value for age. Attribute3 performance is has a similarity of 0 because the distance is 20 between both 1 and 2 and 1 and 5. Attribute4 has a similarity of 1, Attribute6 has a similarity of 0 because all points have a positive value, and the other 3 attributes have similarity of −1.\n\nThe arbiter similarity for each attribute are summed up and divided by the number of attributes that could be scored, a total of 360 scores. For pair {1,2} and arbiter 5, one similarity is −2 out of 6 attributes, or −0.33. For tri-point clustering using Euclidian distance, the distance from 1-2 is −0.23 and the distance from 1-5 and 2-5 are about −0.12, so another similarity for 1-2 with respect to arbiter 5 is −0.47.\n\nTable 1050 shows the pairs of points with average similarity metrics above 0 or that have 5 or more arbiter scores>=0. Points 1 and 2 are not shown as a pair in table 1050 because their score is −0.47 and less than five arbiters determined them to be similar. There are a number of arbiter scores that are 0 because there are few numerical attributes in the data, and they often have identical values, so most attribute scores are −1, 0, or 1. Note that the set of pairs considered as similar depends on threshold values.\n\nClusters are created depending on threshold values as follows:\n\n{1,2,3,4,5,6,9}, {7,8,10} using number of arbiters scores>=0\n\n{1,2,3,4,5,6,9}, {7,10}, {8} using number of arbiters scores>0\n\n{1,2,3,4,6,9}, {5}, {7,10}, {8} using number of arbiters scores>0.25\n\n{1,2,3,4,5,6,9}, {7,8,10} using average score>0\n\nThe final cluster results seem reasonable in terms of outcome.\n\nPatient 8, with the smallest outcome, is grouped by itself or with 2 other patients that have relatively small outcome. The large group of patients all have large outcomes, except Patient 4, which seems to be an outlier. This example is based on a small sample to demonstrate the techniques.\n\nFeature Selection Using Tri-Point Clustering\n\nWhen a data set has a large number of attributes, often more attributes than data points, it can be difficult to determine similarity and appropriate clusters. It can also be difficult to determine the reason that points were similar or clustered together due to the high dimensionality of the attribute space. This is often called overfitting the model. In these cases, data is often pre-processed using knowledge of the input data or statistical techniques such as principle components analysis to reduce the number of attributes. In machine learning, this is called feature selection when a subset of attributes is selected and feature extraction when subsets of attributes are combined. The assumption when doing feature selection or extraction is that many of the attributes are redundant or irrelevant for the purposes of clustering.\n\nTri-point arbitration can be used to perform feature selection for similarity measurements and clustering. For example, a first similarity matrix can be computed and then a set of attributes can be removed. A second similarity matrix is computed without the set of attributes. If there are no significant changes, it can be inferred that the removed attributes are not important for the calculations. The same computations can be made for clusters by using tri-point clustering to create clusters, remove a set of attributes, recompute the clusters, and determine if there are any changes. If there are no changes, it can be inferred that the removed attributes are not important for clustering purpose. If there are a small number of changes, an error metric can be used to determine if the changes are within a threshold that is acceptable given the dimensionality reduction achieved.\n\nGeneral Computer Embodiment\n\nFIG. 11 illustrates an example computing device in which example systems and methods described herein, and equivalents, may operate. The example computing device may be a computer 1000 that includes a processor 1102, a memory 1104, and input/output ports 1110 operably connected by a bus 1108. In one example, the computer 1100 may include a tri-point clustering logic 1130 configured to facilitate clustering using tri-point arbitration. In different examples, the tri-point clustering logic 1130 may be implemented in hardware, a non-transitory computer-readable medium with stored instructions, firmware, and/or combinations thereof. While the tri-point clustering logic 1130 is illustrated as a hardware component attached to the bus 1108, it is to be appreciated that in one example, the tri-point clustering logic 1130 could be implemented in the processor 1102.\n\nIn one embodiment, tri-point clustering logic 1130 is a means (e.g., hardware, non-transitory computer-readable medium, firmware) for performing clustering analysis using tri-point arbitration.\n\nThe means may be implemented, for example, as an ASIC programmed to perform tri-point arbitration. The means may also be implemented as stored computer executable instructions that are presented to computer 1100 as data 1116 that are temporarily stored in memory 1104 and then executed by processor 1102.\n\nThe tri-point clustering logic 1130 may also provide means (e.g., hardware, non-transitory computer-readable medium that stores executable instructions, firmware) for performing the methods illustrated in FIGS. 7-10.\n\nGenerally describing an example configuration of the computer 1100, the processor 1102 may be a variety of various processors including dual microprocessor and other multi-processor architectures. A memory 1104 may include volatile memory and/or non-volatile memory. Non-volatile memory may include, for example, ROM, PROM, and so on. Volatile memory may include, for example, RAM, SRAM, DRAM, and so on.\n\nA disk 1106 may be operably connected to the computer 1100 via, for example, an input/output interface (e.g., card, device) 1118 and an input/output port 1110. The disk 1106 may be, for example, a magnetic disk drive, a solid state disk drive, a floppy disk drive, a tape drive, a Zip drive, a flash memory card, a memory stick, and so on. Furthermore, the disk 1106 may be a CD-ROM drive, a CD-R drive, a CD-RW drive, a DVD ROM, and so on. The memory 1104 can store a process 1114 and/or a data 1116, for example. The disk 1106 and/or the memory 1104 can store an operating system that controls and allocates resources of the computer 1100.\n\nThe bus 1108 may be a single internal bus interconnect architecture and/or other bus or mesh architectures. While a single bus is illustrated, it is to be appreciated that the computer 1100 may communicate with various devices, logics, and peripherals using other busses (e.g., PCIE, 1394, USB, Ethernet). The bus 1108 can be types including, for example, a memory bus, a memory controller, a peripheral bus, an external bus, a crossbar switch, and/or a local bus.\n\nThe computer 1100 may interact with input/output devices via the i/o interfaces 1118 and the input/output ports 1110. Input/output devices may be, for example, a keyboard, a microphone, a pointing and selection device, cameras, video cards, displays, the disk 1106, the network devices 1120, and so on. The input/output ports 1110 may include, for example, serial ports, parallel ports, and USB ports.\n\nThe computer 1100 can operate in a network environment and thus may be connected to the network devices 1120 via the i/o interfaces 1118, and/or the i/o ports 1110. Through the network devices 1120, the computer 1100 may interact with a network. Through the network, the computer 1100 may be logically connected to remote computers. Networks with which the computer 1100 may interact include, but are not limited to, a LAN, a WAN, and other networks.\n\nIn another embodiment, the described methods and/or their equivalents may be implemented with computer executable instructions. Thus, in one embodiment, a non-transitory computer-readable medium is configured with stored computer executable instructions that when executed by a machine (e.g., processor, computer, and so on) cause the machine (and/or associated components) to perform the method.\n\nWhile for purposes of simplicity of explanation, the illustrated methodologies in the figures are shown and described as a series of blocks, it is to be appreciated that the methodologies are not limited by the order of the blocks, as some blocks can occur in different orders and/or concurrently with other blocks from that shown and described. Moreover, less than all the illustrated blocks may be used to implement an example methodology. Blocks may be combined or separated into multiple components. Furthermore, additional and/or alternative methodologies can employ additional blocks that are not illustrated.\n\nThe following includes definitions of selected terms employed herein. The definitions include various examples and/or forms of components that fail within the scope of a term and that may be used for implementation. The examples are not intended to be limiting. Both singular and plural forms of terms may be within the definitions.\n\nReferences to “one embodiment”, “an embodiment”, “one example”, “an example”, and so on, indicate that the embodiment(s) or example(s) so described may include a particular feature, structure, characteristic, property, element, or limitation, but that not every embodiment or example necessarily includes that particular feature, structure, characteristic, property, element or limitation. Furthermore, repeated use of the phrase “in one embodiment” does not necessarily refer to the same embodiment, though it may.\n\nASIC: application specific integrated circuit.\n\nCD: compact disk.\n\nCD-R: CD recordable.\n\nCD-RW: CD rewriteable.\n\nDVD: digital versatile disk and/or digital video disk.\n\nHTTP: hypertext transfer protocol.\n\nLAN: local area network.\n\nPCI: peripheral component interconnect.\n\nPCIE: PCI express.\n\nRAM: random access memory.\n\nDRAM: dynamic RAM.\n\nSRAM: synchronous RAM.\n\nROM: read only memory.\n\nPROM: programmable ROM.\n\nEPROM: erasable PROM.\n\nEEPROM: electrically erasable PROM.\n\nSQL: structured query language.\n\nOQL: object query language.\n\nUSB: universal serial bus.\n\nXML: extensible markup language.\n\nWAN: wide area network.\n\n“Computer-readable medium”, as used herein, refers to a non-transitory medium that stores instructions and/or data. A computer-readable medium may take forms, including, but not limited to, non-volatile media, and volatile media. Non-volatile media may include, for example, optical disks, magnetic disks, and so on. Volatile media may include, for example, semiconductor memories, dynamic memory, and so on. Common forms of a computer-readable medium may include, but are not limited to, a floppy disk, a flexible disk, a hard disk, a magnetic tape, other magnetic medium, an ASIC, a CD, other optical medium, a RAM, a ROM, a memory chip or card, a memory stick, and other media from which a computer, a processor or other electronic device can read.\n\nIn some examples, “database” is used to refer to a table. In other examples, “database” may be used to refer to a set of tables. In still other examples, “database” may refer to a set of data stores and methods for accessing and/or manipulating those data stores.\n\n“Data store”, as used herein, refers to a physical and/or logical entity that can store data on a non-transitory computer readable medium. A data store may be, for example, a database, a table, a file, a list, a queue, a heap, a memory, a register, and so on. In different examples, a data store may reside in one logical and/or physical entity and/or may be distributed between two or more logical and/or physical entities.\n\n“Logic”, as used herein, includes but is not limited to hardware, firmware, a non-transitory computer readable medium that stores instructions, and/or combinations of each to perform a function(s) or an action(s), and/or to cause a function or action from another logic, method, and/or system. Logic may include a microprocessor controlled by an algorithm, a discrete logic (e.g., ASIC), an analog circuit, a digital circuit, a programmed logic device, a memory device containing instructions, and so on. Logic may include one or more gates, combinations of gates, or other circuit components. Where multiple logics are described, it may be possible to incorporate the multiple logics into one physical logic. Similarly, where a single logic is described, it may be possible to distribute that single logic between multiple physical logics.\n\nWhile example systems, methods, and so on have been illustrated by describing examples, and while the examples have been described in considerable detail, it is not the intention of the applicants to restrict or in any way limit the scope of the appended claims to such detail. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the systems, methods, and so on described herein. Therefore, the disclosure is not limited to the specific details, the representative apparatus, and illustrative examples shown and described. Thus, this application is intended to embrace alterations, modifications, and variations that fall within the scope of the appended claims.\n\nTo the extent that the term “includes” or “including” is employed in the detailed description or the claims, it is intended to be inclusive in a manner similar to the term “comprising” as that term is interpreted when employed as a transitional word in a claim.\n\nTo the extent that the term “or” is used in the detailed description or claims (e.g., A or B) it is intended to mean “A or B or both”. When the applicants intend to indicate “only A or B but not both” then the phrase “only A or B but not both” will be used. Thus, use of the term “or” herein is the inclusive, and not the exclusive use. See, Bryan A. Garner, A Dictionary of Modern Legal Usage 624 (2d. Ed. 1995).\n\nTo the extent that the phrase “one or more of, A, B, and C” is used herein, (e.g., a data store configured to store one or more of, A, B, and C) it is intended to convey the set of possibilities A, B, C, AB, AC, BC, and/or ABC (e.g., the data store may store only A, only B, only C, A&B, A&C, B&C, and/or A&B&C). It is not intended to require one of A, one of B, and one of C. When the applicants intend to indicate “at least one of A, at least one of B, and at least one of C”, then the phrasing “at least one of A, at least one of B, and at least one of C” will be used.\n\n## Claims (41)\n\nWhat is claimed is:\n1. A non-transitory computer-readable medium storing computer-executable instructions that, when executed by of a computer cause the computer to perform functions, the instructions comprising instructions for:\nreceiving a set of un-clustered data points to be grouped into one or more clusters;\ncalculating respective distances between all pairs of data points in the set of un-clustered data points;\nselecting a set of one or more arbiter points that are representative of the set of un-clustered data points;\ncomputing a per-arbiter similarity for each pair of data points in the set of un-clustered data points, based at least in part on the distances between data points in the pair with respect to each arbiter point in the set of arbiter points, such that the similarity metric indicates that data points (x1) and (x2) in a given data point pair are similar with respect to a given arbiter point (a) when a distance between (x1) and (x2) is less than: i) a distance between (x1) and (a) and ii) a distance between (x2) and (a);\ncombining the per-arbiter similarities for each data point pair to compute a similarity metric for each data point pair;\nidentifying data points (x1) and (x2) as similar data points when the similarity metric for (x1) and (x2) exceeds a threshold; and\ngrouping the similar data points into the one or more clusters.\n2. The non-transitory computer-readable medium of claim 1, wherein the instructions further comprise identifying similar data points by identifying pairs of data points that are determined to be similar with respect to an aggregation of arbiter points in the set of arbiter points.\n3. The non-transitory computer-readable medium of claim 1, wherein (x1), (x2), and (a) include one or more numerical attribute values, and further comprising instructions for determining the similarity between (x1) and (x2) based, at least in part, on Euclidean distances between the numerical attributes of (x1) and (x2) and (a).\n4. The non-transitory computer-readable medium of claim 1, further comprising instructions for determining the similarity between (x1) and (x2) and (a) using a set of if-then rules that specify a similarity value based on given values of (x1) and (x2) and (a).\n5. The non-transitory computer-readable medium of claim 1, wherein (x1), (x2), and (a) include one or more binary attribute values, and further comprising instructions for determining the similarity between the binary attributes of (x1) and (x2) and (a) as:\ni) 1 if a Hamming distance between (x1) and (x2) is less than both a Hamming distance between (x1) and (a) and a Hamming distance between (x2) and (a);\nii) −1 if the Hamming distance between (x1) and (x2) is greater than either the Hamming distance between (x1) and (a) or the Hamming distance between (x2) and (a); and\niii) 0 if the Hamming distance between (xi) and (x2) is equal to both the Hamming distance between (x1) and (a) and the Hamming distance between (x2) and (a).\n6. The non-transitory computer-readable medium of claim 1, wherein data points in the data set each comprise values for a plurality of attributes, further comprising instructions for:\nfor each arbiter, computing the distance between data points (x1) and (x2), and a given arbiter (a) by combining selected per-attribute distances between the data points and (a);\ncomputing a per-arbiter similarity for each arbiter based, at least in part, on the distance; and\ncombining the per-arbiter similarities to compute the similarity metric.\n7. The non-transitory computer-readable medium of claim 1, wherein data points in the data set each comprise a plurality of attribute values; further comprising instructions for:\nfor each arbiter point (a) in the set of arbiter points, determining a set of per-attribute distances between selected attributes of the data points (x1), (x2), and (a), where each set of per-attribute distances includes distances on the same attribute between data points (x1), (x2) and the arbiter points; and\nfor respective sets of per-attribute distances, computing respective per-attribute similarities based, at least in part, on the set of per-attribute distances; and\ncombining the per-attribute similarities to compute the similarity metric.\n8. The non-transitory computer-readable medium of claim 7, further comprising instructions for combining sets of per-attribute distances for a selected group of attributes and computing a single per-attribute similarity for the combined sets of per-attribute distances.\n9. The non-transitory computer-readable medium of claim 7, further comprising instructions for determining the similarity metric based on a proportion of per-attribute similarities that indicate that (x1) and (x2) are similar.\n10. The non-transitory computer-readable medium of claim 7, further comprising instructions for i) determining a first per-attribute similarity based, at least in part, on a first subset of arbiters in A and ii) determining a second per-attribute similarity based on a second subset of arbiters in A that is different than the first subset.\n11. The non-transitory computer-readable medium of claim 10, further comprising instructions for i) determining the first per-attribute similarity based, at least in part, on an average of the first per-attribute distances and ii) determining the second per-attribute similarity based, at least in part, on an average of the second per-attribute distances.\n12. The non-transitory computer-readable medium of claim 10, further comprising instructions for combining the first per-attribute similarity with the second per-attribute similarity according to a weighting scheme.\n13. The non-transitory computer-readable medium of claim 1, wherein data points in the data set each comprise a plurality of attribute values, further comprising instructions for identifying attributes as redundant attributes that do not significantly contribute to similarity analysis for (x1) and (x2) by:\nselecting a subset of attributes;\ncomputing a second similarity metric for (x1) and (x2) by combining the similarity metrics for attributes that are not members of the subset;\ncomparing the similarity metric with the second similarity metric; and\nwhen a difference between the similarity metric and the second similarity metric is below a threshold, identifying attributes in the subset of attributes as redundant attributes.\n14. The non-transitory computer-readable medium of claim 1, further comprising instructions for determining the threshold based, at least in part, on probability that a random pair of data points will be identified as similar by an aggregation of arbiter points.\n15. The non-transitory computer-readable medium of claim 1, further comprising instructions for creating the one or more clusters by:\nselecting a first data point and a second data point for membership in a cluster, wherein the first data point and the second data point are identified as similar;\nadding, as members of the cluster, data points that are similar to any member of the cluster; and\nuntil all data points are members of clusters:\nselecting a remaining data point that is not a member of a cluster to form a new cluster;\nadding data points that are similar to the remaining data point as members to the new cluster.\n16. The non-transitory computer-readable medium of claim 15, further comprising instructions for removing a member data point from a cluster when the member data point is not similar to an arbiter aggregation selected from: a majority of arbiters, a minority of arbiters, an average of arbiters, a weighted average of arbiters, and a threshold number of arbiters.\n17. The non-transitory computer-readable medium of claim 16, further comprising instructions for adding a data point to two or more clusters for which the data point is similar to a threshold number of the member data points in the cluster.\n18. The non-transitory computer-readable medium of claim 1, where the arbiter points are not members of the data set.\n19. The non-transitory computer-readable medium of claim 1, wherein (x1), (x2), and (a) include one or more categorical attribute values, and further comprising instructions for:\nassigning distance metrics between categorical values of (x1), (x2), and (a);\ndetermining the similarity between (x1) and (x2) based, at least in part, on the assigned distance metrics.\n20. A computing system, comprising:\na processor connected to a non-transitory computer readable medium by a communication path;\na tri-point similarity logic stored on the non-transitory computer readable medium and including instructions that when executed by the processor to cause the processor to:\nreceive a set of un-clustered data points to be grouped into one or more clusters;\ncalculate respective distances between all pairs of data points in the set of un-clustered data points;\nselect a set of one or more arbiter points that are representative of the set of un-clustered data points;\ncompute a per-arbiter similarity for each pair of data points in the set of un-clustered data points, based at least in part on the distances between data points in the pair with respect to each arbiter point in the set of arbiter points, such that the similarity metric indicates that data points (x1) and (x2) in a given data point pair are similar with respect to a given arbiter point (a) when a distance between (x1) and (x2) is less than: i) a distance between (x1) and (a) and ii) a distance between (x2) and (a);\ncombine the per-arbiter similarities for each data point pair to compute a similarity metric for each data point pair;\nidentify data points (x1) and (x2) as similar data points when the similarity metric for (x1) and (x2) exceeds a threshold; and\na clustering logic stored on the non-transitory computer readable medium and including instructions that when executed by the processor cause the processor to group the similar data points into the one or more clusters of data points that are similar with respect to each other.\n21. The computing system of claim 20, where the tri-point similarity logic is configured to:\nfor each arbiter point (a) in the set of arbiter points, determine a set of per-attribute distances between selected attributes of the data points (x1), (x2), and (a), where each set of per-attribute distances includes distances on the same attribute between data points (x1), (x2) and the arbiter points; and\nfor respective sets of per-attribute distances, computing respective per-attribute similarities based, at least in part, on the set of per-attribute distances; and\ncombining the per-attribute similarities to compute the similarity metric.\n22. The computing system of claim 20, where the clustering logic is configured to:\nselect a first data point and a second data point for membership in a cluster, wherein the first data point and the second data point are identified as similar;\nadd, as members of the cluster, data points that are similar to any member of the cluster; and\nuntil all data points are members of clusters:\nselect a remaining data point that is not a member of a cluster to form a new cluster; and\nadd data points that are similar to the remaining data point as members to the new cluster.\n23. The computing system of claim 20, where the arbiter points are all other members of the data set.\n24. The computing system of claim 20, where the data points represent patients and attributes include one or more of genomic attributes, clinical attributes, environmental attributes, and socio-economic attributes.\n25. The computing system of claim 20, where the data points represent one or more of audio data, visual data, image data, audio stream data, visual stream data, free text data, genome sequence data, structured data, and unstructured data.\n26. A computer-implemented method, comprising:\nreceiving a set of un-clustered data points to be grouped into one or more clusters;\ncalculating respective distances between all pairs of data points in the set of un-clustered data points;\nselecting a set of one or more arbiter points that are representative of the set of un-clustered data points;\ncomputing a per-arbiter similarity for each pair of data points in the set of un-clustered data points, based at least in part on the distances between data points in the pair with respect to each arbiter point in the set of arbiter points, such that the similarity metric indicates that data points (x1) and (x2) in a given data point pair are similar with respect to a given arbiter point (a) when a distance between (x1) and (x2) is less than: i) a distance between (x1) and (a) and ii) a distance between (x2) and (a);\ncombining the per-arbiter similarities for each data point pair to compute a similarity metric for each data point pair;\nidentifying data points (x1) and (x2) as similar data points when the similarity metric for (x1) and (x2) exceeds a threshold; and\ngrouping the similar data points into the one or more clusters.\n27. The computer-implemented method of claim 26, wherein (x1), (x2), and (a) include one or more numerical attribute values, and the method further comprising determining the similarity between (x1) and (x2) based, at least in part, on Euclidean distances between the numerical attributes of (x1) and (x2) and (a).\n28. The computer-implemented method of claim 26, further comprising determining the similarity between (x1) and (x2) and (a) using a set of if-then rules that specify a similarity value based on given values of (x1) and (x2) and (a).\n29. The computer-implemented method of claim 26, wherein (x1), (x2), and (a) include one or more binary attribute values, and the method further comprising determining the similarity between the binary attributes of (x1) and (x2) and (a) as:\ni) 1 if a Hamming distance between (x1) and (x2) is less than both a Hamming distance between (x1) and (a) and a Hamming distance between (x2) and (a);\nii) −1 if the Hamming distance between (x1) and (x2) is greater than either the Hamming distance between (x1) and (a) or the Hamming distance between (x2) and (a); and\niii) 0 if the Hamming distance between (x1) and (x2) is equal to both the Hamming distance between (x1) and (a) and the Hamming distance between (x2) and (a).\n30. The computer-implemented method of claim 26, wherein data points in the data set each comprise values for a plurality of attributes, and the method further comprising:\nfor each arbiter, computing the distance between data points (x1) and (x2), and a given arbiter (a) by combining selected per-attribute distances between the data points and (a);\ncomputing a per-arbiter similarity for each arbiter based, at least in part, on the distance; and\ncombining the per-arbiter similarities to compute the similarity metric.\n31. The computer-implemented method of claim 26, wherein data points in the data set each comprise values for a plurality of attributes, and the method further comprising:\nfor each arbiter point (a) in the set of arbiter points, determining a set of per-attribute distances between selected attributes of the data points (x1), (x2), and (a), where each set of per-attribute distances includes distances on the same attribute between data points (x1), (x2) and the arbiter points; and\nfor respective sets of per-attribute distances, computing respective per-attribute similarities based, at least in part, on the set of per-attribute distances; and\ncombining the per-attribute similarities to compute the similarity metric.\n32. The computer-implemented method of claim 31, further comprising determining the similarity metric based on a proportion of per-attribute similarities that indicate that (x1) and (x2) are similar.\n33. The computer-implemented method of claim 31, further comprising: i) determining a first per-attribute similarity based, at least in part, on a first subset of arbiters in A and ii) determining a second per-attribute similarity based on a second subset of arbiters in A that is different than the first subset.\n34. The computer-implemented method of claim 33, further comprising i) determining the first per-attribute similarity based, at least in part, on an average of the first per-attribute distances and ii) determining the second per-attribute similarity based, at least in part, on an average of the second per-attribute distances.\n35. The computer-implemented method of claim 34, further comprising adding a data point to two or more clusters for which the data point is similar to a threshold number of the member data points in the cluster.\n36. The computer-implemented method of claim 33, further comprising instructions combining the first per-attribute similarity with the second per-attribute similarity according to a weighting scheme.\n37. The computer-implemented method of claim 33, further comprising removing a member data point from a cluster when the member data point is not similar to an arbiter aggregation selected from: a majority of arbiters, a minority of arbiters, an average of arbiters, a weighted average of arbiters, and a threshold number of arbiters.\n38. The computer-implemented method of claim 26, wherein data points in the data set each comprise values for a plurality of attributes, and the method further comprising identifying attributes as redundant attributes that do not significantly contribute to similarity analysis for (x1) and (x2) by:\nselecting a subset of attributes;\ncomputing a second similarity metric for (x1) and (x2) by combining the similarity metrics for attributes that are not members of the subset;\ncomparing the similarity metric with the second similarity metric; and\nwhen a difference between the similarity metric and the second similarity metric is below a threshold, identifying attributes in the subset of attributes as redundant attributes.\n39. The computer-implemented method of claim 26, further comprising determining the threshold based, at least in part, on probability that a random pair of data points will be identified as similar by an aggregation of arbiter points.\n40. The computer-implemented method of claim 26, further comprising creating the one or more clusters by:\nselecting a first data point and a second data point for membership in a cluster, wherein the first data point and the second data point are identified as similar;\nadding, as members of the cluster, data points that are similar to any member of the cluster; and\nuntil all data points are members of clusters:\nselecting a remaining data point that is not a member of a cluster to form a new cluster;\nadding data points that are similar to the remaining data point as members to the new cluster.\n41. The computer-implemented method of claim 26, where the arbiter points are not members of the data set.\nUS13/833,757 2013-03-15 2013-03-15 Per-attribute data clustering using tri-point data arbitration Active 2033-12-13 US9514213B2 (en)\n\n## Priority Applications (1)\n\nApplication Number Priority Date Filing Date Title\nUS13/833,757 US9514213B2 (en) 2013-03-15 2013-03-15 Per-attribute data clustering using tri-point data arbitration\n\n## Applications Claiming Priority (1)\n\nApplication Number Priority Date Filing Date Title\nUS13/833,757 US9514213B2 (en) 2013-03-15 2013-03-15 Per-attribute data clustering using tri-point data arbitration\n\n## Publications (2)\n\nPublication Number Publication Date\nUS20140280146A1 US20140280146A1 (en) 2014-09-18\nUS9514213B2 true US9514213B2 (en) 2016-12-06\n\n# Family\n\n## Family Applications (1)\n\nApplication Number Title Priority Date Filing Date\nUS13/833,757 Active 2033-12-13 US9514213B2 (en) 2013-03-15 2013-03-15 Per-attribute data clustering using tri-point data arbitration\n\n## Country Status (1)\n\nCountry Link\nUS (1) US9514213B2 (en)\n\n## Cited By (4)\n\n* Cited by examiner, † Cited by third party\nPublication number Priority date Publication date Assignee Title\nUS20170316079A1 (en) * 2016-04-27 2017-11-02 Oracle International Corporation Scalable tri-point arbitration and clustering\nUS10127695B2 (en) 2016-02-29 2018-11-13 Oracle International Corporation Method for creating period profile for time-series data with recurrent patterns\nUS10163034B2 (en) 2013-06-19 2018-12-25 Oracle International Corporation Tripoint arbitration for entity classification\nUS10331802B2 (en) 2016-02-29 2019-06-25 Oracle International Corporation System for detecting and characterizing seasons\n\n## Families Citing this family (4)\n\n* Cited by examiner, † Cited by third party\nPublication number Priority date Publication date Assignee Title\nUS9262469B1 (en) * 2012-04-23 2016-02-16 Monsanto Technology Llc Intelligent data integration system\nWO2016065043A1 (en) * 2014-10-21 2016-04-28 Yttro Mobile Inc. Apparatus, system, and method for organizing and embedding applications\nUS10165005B2 (en) 2016-09-07 2018-12-25 Oracle International Corporation System and method providing data-driven user authentication misuse detection\nUS10353803B2 (en) * 2017-08-21 2019-07-16 Facebook, Inc. Dynamic device clustering\n\n## Citations (11)\n\n* Cited by examiner, † Cited by third party\nPublication number Priority date Publication date Assignee Title\nUS5040133A (en) * 1990-01-12 1991-08-13 Hughes Aircraft Company Adaptive clusterer\nUS5987399A (en) 1998-01-14 1999-11-16 Arch Development Corporation Ultrasensitive surveillance of sensors and processes\nUS6049797A (en) * 1998-04-07 2000-04-11 Lucent Technologies, Inc. Method, apparatus and programmed medium for clustering databases with categorical attributes\nUS6092072A (en) * 1998-04-07 2000-07-18 Lucent Technologies, Inc. Programmed medium for clustering large databases\nUS20020099675A1 (en) * 2000-04-03 2002-07-25 3-Dimensional Pharmaceuticals, Inc. Method, system, and computer program product for representing object relationships in a multidimensional space\nUS6882998B1 (en) * 2001-06-29 2005-04-19 Business Objects Americas Apparatus and method for selecting cluster points for a clustering analysis\nUS20100067745A1 (en) * 2008-09-16 2010-03-18 Ivan Kovtun System and method for object clustering and identification in video\nUS20110105885A1 (en) * 2002-09-16 2011-05-05 Imatx, Inc. Methods of Predicting Musculoskeletal Disease\nUS20120054184A1 (en) * 2010-08-24 2012-03-01 Board Of Regents, The University Of Texas System Systems and Methods for Detecting a Novel Data Class\nUS20120173547A1 (en) * 2008-04-22 2012-07-05 Uc4 Software Gmbh Method Of Detecting A Reference Sequence Of Events In A Sample Sequence Of Events\nUS20140006403A1 (en) * 2011-01-25 2014-01-02 Gary King Method and apparatus for selecting clusterings to classify a data set\n\n## Patent Citations (11)\n\n* Cited by examiner, † Cited by third party\nPublication number Priority date Publication date Assignee Title\nUS5040133A (en) * 1990-01-12 1991-08-13 Hughes Aircraft Company Adaptive clusterer\nUS5987399A (en) 1998-01-14 1999-11-16 Arch Development Corporation Ultrasensitive surveillance of sensors and processes\nUS6049797A (en) * 1998-04-07 2000-04-11 Lucent Technologies, Inc. Method, apparatus and programmed medium for clustering databases with categorical attributes\nUS6092072A (en) * 1998-04-07 2000-07-18 Lucent Technologies, Inc. Programmed medium for clustering large databases\nUS20020099675A1 (en) * 2000-04-03 2002-07-25 3-Dimensional Pharmaceuticals, Inc. Method, system, and computer program product for representing object relationships in a multidimensional space\nUS6882998B1 (en) * 2001-06-29 2005-04-19 Business Objects Americas Apparatus and method for selecting cluster points for a clustering analysis\nUS20110105885A1 (en) * 2002-09-16 2011-05-05 Imatx, Inc. Methods of Predicting Musculoskeletal Disease\nUS20120173547A1 (en) * 2008-04-22 2012-07-05 Uc4 Software Gmbh Method Of Detecting A Reference Sequence Of Events In A Sample Sequence Of Events\nUS20100067745A1 (en) * 2008-09-16 2010-03-18 Ivan Kovtun System and method for object clustering and identification in video\nUS20120054184A1 (en) * 2010-08-24 2012-03-01 Board Of Regents, The University Of Texas System Systems and Methods for Detecting a Novel Data Class\nUS20140006403A1 (en) * 2011-01-25 2014-01-02 Gary King Method and apparatus for selecting clusterings to classify a data set\n\n## Non-Patent Citations (8)\n\n* Cited by examiner, † Cited by third party\nTitle\nBanfield et al.; Model-Based Gaussian and Non-Gaussian Clustering; Biometrics, vol. 49, No. 3; Sep. 1993; pp. 803-821; International Biometric Society.\nEster et al.; A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise; in Proc. 2nd Int'l. Conf. Knowledge Discovery and Data Mining, 1996, pp. 226-231; AAAI Press, Menlo Park, CA.\nHan et al., Data Mining: Concepts and Techniques; University of Illinois at Urbana-Champaign, 2006, Morgan Kaufmann Publishers, pp. 1-28, San Francisco, CA.\nJ. MacQueen; Some Methods for Classification and Analysis of Multivariate Observations; University of California, Los Angeles, Proceedings of Fifth Berkeley Symposium on Mathematical Statistics and Probability, 1967 pp. 281-297, University of California, Los Angeles, CA.\nMichael W. Trosset; Representing Clusters: K-Means Clustering, Self-Organizing Maps, and Multidimensional Scaling; Apr. 6, 2006; pp. 1-17; Dept. of Mathematics, College of William & Mary, Williamsburg, VA.\nStephen C. Johnson; Hierarchical Clustering Schemes; Psychometrika-vol. 32, No. 3, Sep. 1967, pp. 241-254; Bell Telephone Laboratories, Murray Hill, NJ.\nTeuvo Kohonen; Self-Organized Formation of Topologically Correct Feature Maps; Biological Cybernetics 43, 1982; pp. 59-69; Dept. of Technical Physics, Hensinki University of Technology, Espoo, Finland.\nWikipedia; Iris Flower Data Set; downloaded May 17, 2013 from: http://en.wikipedia.org/wiki/Iris-flower-data-set; pp. 1-11.\n\n## Cited By (5)\n\n* Cited by examiner, † Cited by third party\nPublication number Priority date Publication date Assignee Title\nUS10163034B2 (en) 2013-06-19 2018-12-25 Oracle International Corporation Tripoint arbitration for entity classification\nUS10127695B2 (en) 2016-02-29 2018-11-13 Oracle International Corporation Method for creating period profile for time-series data with recurrent patterns\nUS10331802B2 (en) 2016-02-29 2019-06-25 Oracle International Corporation System for detecting and characterizing seasons\nUS20170316079A1 (en) * 2016-04-27 2017-11-02 Oracle International Corporation Scalable tri-point arbitration and clustering\nUS10073906B2 (en) * 2016-04-27 2018-09-11 Oracle International Corporation Scalable tri-point arbitration and clustering\n\n## Also Published As\n\nPublication number Publication date\nUS20140280146A1 (en) 2014-09-18\n\n## Similar Documents\n\nPublication Publication Date Title\nSong et al. A fast clustering-based feature subset selection algorithm for high-dimensional data\nRaftery et al. Estimating the integrated likelihood via posterior simulation using the harmonic mean identity\nCN1316419C (en) Prediction by collective likelihood from emerging patterns\nYang et al. A similarity-based robust clustering method\nLi et al. A nonparametric statistical approach to clustering via mode identification\nGuyon et al. An introduction to variable and feature selection\nBandyopadhyay et al. A point symmetry-based clustering technique for automatic evolution of clusters\nCuevas et al. Robust estimation and classification for functional data via projection-based depth notions\nJing et al. An entropy weighting k-means algorithm for subspace clustering of high-dimensional sparse data\nLevine et al. Resampling method for unsupervised estimation of cluster validity\nAggarwal et al. Outlier detection for high dimensional data\nJacques et al. Functional data clustering: a survey\nUS20080082356A1 (en) System and method to optimize control cohorts using clustering algorithms\nUS6397166B1 (en) Method and system for model-based clustering and signal-bearing medium for storing program of same\nUS20020095260A1 (en) Methods for efficiently mining broad data sets for biological markers\nUS20090024553A1 (en) Automatic generation of new rules for processing synthetic events using computer-based learning processes\nKhalid et al. A survey of feature selection and feature extraction techniques in machine learning\nMcLachlan Cluster analysis and related techniques in medical research\nDuch et al. Computational intelligence methods for rule-based data understanding\nUS7752233B2 (en) Techniques for clustering a set of objects\nUS8145582B2 (en) Synthetic events for real time patient analysis\nBouguettaya et al. Efficient agglomerative hierarchical clustering\nHunt et al. Theory & Methods: Mixture model clustering using the MULTIMIX program\nUS20080294459A1 (en) Health Care Derivatives as a Result of Real Time Patient Analytics\nSteinley et al. Evaluating mixture modeling for clustering: Recommendations and cautions.\n\n## Legal Events\n\nDate Code Title Description\nAS Assignment\n\nOwner name: ORACLE INTERNATIONAL CORPORATION, CALIFORNIA\n\nFree format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WOOD, ALAN PAUL;URMANOV, ALEKSEY M.;BOUGAEV, ANTON A.;REEL/FRAME:030011/0484\n\nEffective date: 20130314\n\nSTCF Information on status: patent grant\n\nFree format text: PATENTED CASE\n\nCC Certificate of correction" ]
[ null, "https://patentimages.storage.googleapis.com/69/c6/4c/7f8f10628af0dc/US09514213-20161206-D00000.png", null, "https://patentimages.storage.googleapis.com/7b/01/2c/e32174a5f0cfd2/US09514213-20161206-D00001.png", null, "https://patentimages.storage.googleapis.com/aa/a2/f4/58a9e0d4bf7b0e/US09514213-20161206-D00002.png", null, "https://patentimages.storage.googleapis.com/32/09/48/587916301ec2f2/US09514213-20161206-D00003.png", null, "https://patentimages.storage.googleapis.com/93/1a/90/0f22c3970c1341/US09514213-20161206-D00004.png", null, "https://patentimages.storage.googleapis.com/d8/e0/0c/e6826125e48ef5/US09514213-20161206-D00005.png", null, "https://patentimages.storage.googleapis.com/80/a2/b4/f493b5b38c9249/US09514213-20161206-D00006.png", null, "https://patentimages.storage.googleapis.com/63/87/e9/52f58bb9b58a74/US09514213-20161206-D00007.png", null, "https://patentimages.storage.googleapis.com/63/2a/4a/c1c46eef6af34b/US09514213-20161206-D00008.png", null, "https://patentimages.storage.googleapis.com/fc/65/75/e854b6cefebe5e/US09514213-20161206-D00009.png", null, "https://patentimages.storage.googleapis.com/de/4c/ff/220e9aa0760ead/US09514213-20161206-D00010.png", null, "https://patentimages.storage.googleapis.com/d1/a1/4b/2cad2f1827f3f3/US09514213-20161206-D00011.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86217535,"math_prob":0.9637382,"size":72594,"snap":"2019-35-2019-39","text_gpt3_token_len":15899,"char_repetition_ratio":0.20838958,"word_repetition_ratio":0.148985,"special_character_ratio":0.22522523,"punctuation_ratio":0.10227358,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9780425,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-24T18:20:27Z\",\"WARC-Record-ID\":\"<urn:uuid:588ae499-9686-465e-bdbb-16da1fd1a935>\",\"Content-Length\":\"287921\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6f1532a1-422b-44e2-844f-2257e05a9a28>\",\"WARC-Concurrent-To\":\"<urn:uuid:104226c3-e795-40e1-8adf-a9c39ae9013d>\",\"WARC-IP-Address\":\"172.217.7.142\",\"WARC-Target-URI\":\"https://patents.google.com/patent/US9514213B2/en\",\"WARC-Payload-Digest\":\"sha1:67TXALY3RZCZJ3CSPJQPG3HGVGUQDDZB\",\"WARC-Block-Digest\":\"sha1:4GNAZUJCWHMZACL4PC2G74JWS4CVXKOZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027321351.87_warc_CC-MAIN-20190824172818-20190824194818-00232.warc.gz\"}"}
https://www.assignmentpoint.com/science/mathematic/fractions-definition-examples.html
[ "When an object is divided into a number of equal parts then each part is called a fraction. Fractions are rational numbers that are written with a numerator and a denominator. It is a numerical representation (such as ½, ¼, or 3.234) indicating the quotient of two numbers.\n\nYou can recognize a fraction by the slash that is written between the two numbers. We have a top number, the numerator, and a bottom number, the denominator. For example, 1/2 is a fraction. You can write it with a slanted slash like we have or you can write the 1 on top of the 2 with the slash between the two numbers. The 1 is the numerator, and the 2 is the denominator.", null, "Proper and Improper Fractions\n\nFirst, we have what we call ‘proper’ and ‘improper’ fractions. Proper fractions are those fractions where the numerator is less than the denominator. An improper fraction is a fraction where the numerator is greater than the denominator. For example, the fraction 7/8 is a proper fraction, where 8/7 is an improper fraction.\n\nHere are some other important fraction terms to review:\n\nProper fraction: Numerator is less than the denominator. When the numerator is less than the denominator, we call the expression a proper fraction. These are some examples of proper fractions. Example: 4/3, 2/3 etc.\n\nImproper fraction: Numerator is greater than or equal to denominator. An improper fraction occurs when the numerator is greater than or equal to the denominator. These are some examples of improper fractions: 4/3, 5/6 etc.\n\nMixed number: Whole number and a fraction. When an expression consists of a whole number and a proper fraction, we call it a mixed number. Here are some examples of mixed numbers: (3 x 1/3); (5 x 3/5) etc.\n\nEquivalent fractions: Fractions that represent the same number. There are many ways to write a fraction of a whole. Fractions that represent the same number are called equivalent fractions. Example: ½, 2/4, 4/8 etc.\n\nReciprocal: the multiplicative inverse of a number. For a fraction, it’s obtained by “turning the fraction over.” When the product of two fractions equals 1, the fractions are reciprocals. Every nonzero fraction has a reciprocal.\n\nInformation Sources:\n\nStudy.com\n\nMath.com" ]
[ null, "http://www.assignmentpoint.com/wp-content/uploads/2017/08/Fractions-1.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90341145,"math_prob":0.9956973,"size":2170,"snap":"2019-51-2020-05","text_gpt3_token_len":500,"char_repetition_ratio":0.21606648,"word_repetition_ratio":0.044198897,"special_character_ratio":0.22396313,"punctuation_ratio":0.13863637,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999522,"pos_list":[0,1,2],"im_url_duplicate_count":[null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-29T10:34:52Z\",\"WARC-Record-ID\":\"<urn:uuid:d36521ad-602b-4b97-9ec2-c50a46a30e57>\",\"Content-Length\":\"41048\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ef9c3592-e6df-45a1-85c7-d7982f08f5eb>\",\"WARC-Concurrent-To\":\"<urn:uuid:a00a1a01-5761-4c0f-aa80-53f3b789b652>\",\"WARC-IP-Address\":\"68.168.104.147\",\"WARC-Target-URI\":\"https://www.assignmentpoint.com/science/mathematic/fractions-definition-examples.html\",\"WARC-Payload-Digest\":\"sha1:PAIBZSMUEHWQDUCY3ST6CHQQZ74ZF34S\",\"WARC-Block-Digest\":\"sha1:A7L2AXWZW4BVWHN3PEPLTUSOQDYEOKQR\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251796127.92_warc_CC-MAIN-20200129102701-20200129132701-00121.warc.gz\"}"}
https://puzzling.stackexchange.com/questions/12864/find-the-liar-in-the-library/12905
[ "# Find the liar in the library\n\nI've just taken a CS exam, which had the following question\n\n6 persons entered a library the day a book got stolen. Each of them entered the library once and only once, and stayed there for some time, then left. If two persons were in the library at the same time, at least one of the two saw the other. After the investigation, the testimonies were\n\n• Albert stated he saw Bernard and Édouard\n\n• Bernard said he saw Albert and Isabelle\n\n• Charlotte said she saw Didier and Isabelle\n\n• Didier said he saw Albert and Isabelle\n\n• Édouard said he saw Bernard and Charlotte\n\n• Isabelle said she saw Charlotte and Édouard\n\nOnly the culprit is lying. Who is he/she ?\n\nEDIT: I haven't had the time yet to check everybody's answers and claims.\n\nTo those saying the problem is ill-posed, I've actually translated the exact wording from the exam (Question IV.C https://www.concours-centrale-supelec.fr/CentraleSupelec/2015/MP/sujets/2014-033.pdf). As Meelo suggested, this can be solved swiftly with interval graphs.\n\n• Are these implied to be the complete lists of who everyone saw? – user20 Apr 28 '15 at 17:34\n• @LeGrandDODOM Wouldn't be possible for them all to enter and leave together such that no one is lying (if this is not the complete list)? – Mark N Apr 28 '15 at 17:51\n• @leoll2: The guy that posted the puzzle said it in response to Emrakul's question \"Are these implied to be the complete lists of who everyone saw?\" @Emrakul No, that's just what each person told the police.. – Ian MacDonald Apr 28 '15 at 19:23\n• As of now, I see 5 answers \"proving\" B&D&E as culprits. So something is wrong somewhere. I feel , the question is incomplete or wrongly worded. – Prem Apr 28 '15 at 19:26\n• I think itriedacrab and leoll both came up with a solid answer proving D is the lyar. – Spacemonkey Apr 28 '15 at 19:52\n\nI think I have an answer:\n\nDidier is lying\n\nI started drawing a graph, eventually gaining this timeline of events (overlaps acceptable).\n\n$Edouard \\leftarrow Albert \\leftrightarrow Bernard \\rightarrow Isabelle \\leftrightarrow Charlotte \\rightarrow Didier$\n\nYou can connect the other sightings, to have at least one relationship,\n\nsave for Didier. Didier observes Albert and Isabelle, but there is no relationship between Didier and Bernard, even though they should overlap in some way in order for Didier to observe both Albert and Isabelle. (Didier observed Albert and Isabelle. Bernard is between Albert and Isabelle. Therefore either Bernard should have seen Didier or Didier should have seen Bernard as they would have been at the library at the same time).\n\nAlso\n\nÉdouard or Didier would have observed the other from their overlapping timelines.\n\nYou can verify the answer with this image.", null, "• I think this needs more explanation. Why should there be a relationship between D and B because D saw both A and I? – Rand al'Thor Apr 28 '15 at 19:05\n• @randal'thor you're right, I need a drawing tool. B visited between A and I, so at least one of B or D should have seen the other for D to have seen A and I. – itriedacrab Apr 28 '15 at 19:09\n• This seems right – Spacemonkey Apr 28 '15 at 19:47\n• Nitpick: D never states that he did not see B. So you assume that the persons answers lists all the people they saw, which is a reasonable assumption but not actually in the wording of the problem. – Taemyr Apr 29 '15 at 8:11\n• This appears correct. Ran a brute force for completeness... there are 48 possible permutations that satisfy the conditions of the problem, all have the same liar (the one stated in this solution). In short: (1) A, B, and E enter in any order, (2) A leaves, (3) I enters, (4) B leaves, (5) C enters, (6) E and I leave in either order, (7) D enters, (8) C and D leave in either order. That covers half the cases, the other half do the same in reverse order. – glibdud Apr 29 '15 at 15:34\n\nBecause the problem states that exactly one of them is lying, it must be the case that they were not all in the library at once. If they were all in the library at the same time, each of them would have been able to make their statements truthfully, contradicting the one condition.\n\nLet:\n$A$ Albert\n$B$ Bernard\n$C$ Charlotte\n$D$ Didier\n$E$ Edouard\n$I$ Isabelle\n\nThen:\n$A \\rightarrow B + E$\n$B \\rightarrow A + I$\n$C \\rightarrow D + I$\n$D \\rightarrow A + I$\n$E \\rightarrow B + C$\n$I \\rightarrow C + E$\n\nNow let's expand one step:\n\n$A \\rightarrow B + (A + I) + E + (B + C)$\n$B \\rightarrow A + (B + E) + I + (C + E)$\n$C \\rightarrow D + (A + I) + I + (C + E)$\n$D \\rightarrow A + (B + E) + I + (C + E)$\n$E \\rightarrow B + (B + E) + C + (D + I)$\n$I \\rightarrow C + (D + I) + E + (B + C)$\n\nHere, we notice that $D$ is the only one that doesn't have someone see him after one step. Let's expand again:\n\n$D \\rightarrow A + (B + (A + I) + E + (B + C)) + I + (C + (D + I) + E + (B + C))$\n\nHere is the first chance that $D$ has been mentioned in his graph. Unfortunately for him, the graph also contains all of the other people, which can't be the case (as discussed earlier).\n\nOf course, a scenario could be constructed such that $D$ is invisible (by hiding or being quick or whatever). Because there is only one person that claims to see this invisible person, that person is allowed to be the single liar. Any other person is stated to have been seen by at least two people, so everyone else must have actually been seen by at least one person. Our old friend \"Invisible Didier\", however, cannot be seen by anyone. Hence, Charlotte is a liar and the culprit.\n\n• Not really satisfied with the reason, he could just see whoever then immediatly leave thus no one would see him. – Spacemonkey Apr 28 '15 at 19:12\n• elegant way to do it... There is a self consistent solution where you assume D is the only liar and he is lying about everything. – kaine Apr 28 '15 at 19:12\n• @kaine, I agree but that is also true for some of the others. – Spacemonkey Apr 28 '15 at 19:13\n• @Spacemonkey, that's true. If $D$ enters and leaves immediately without anyone seeing him, then $C$ could certainly be lying. – Ian MacDonald Apr 28 '15 at 19:13\n• @Spacemonkey Maybe...find them....the best way i can find to look at it is in terms of pairs that can't touch: (AC, AI, BC, BD, DE) – kaine Apr 28 '15 at 19:15\n\nTo start: We need to define who was in together at the same time: We'll start off assuming everyone is honest and then look for contradictions.\n\nThe relations are as such:\n\nAB, AD, AE, BE, BI, CD, CE, CI, DI, & EI\n\nIn all of these cases, at least one person claimed the other was there at the same time.\n\nFor the record, the missing relations are:\n\nAC, AI, BC, BD, & DC\n\nSo with this information we can figure out who was supposed to be in at the same time. Since AB, AE, & BE are all present at the same time we can conclude that all three were there at (more or less) the same time for the purpose of creating a timeline. All the \"combined\" relations are:\n\nABE, AD, BEI, CDI, & CEI\n\nVisually that becomes:\n\nA ---|---| | |\nB ---| |---| |\nC | | |---|---\nD |---| |---|\nE ---| |---| |---\nI | |---|---|---\n\n\nWe can now attempt to organize this into a timeline. Since each person only entered once, each line should be intact. This is the best we can get:\n\nA ---|---| | |\nB |---|---| |\nC | | |---|---\nD ---| | | |---\nE |---|---|---|\nI | |---|---|---\n\n\nOk, so the problem is obvious: We have a cyclical timeline. This timeline only makes sense if we turn it into a cylinder, because no matter how we attempt to put it together (on a straight 2D path) one of the lines is going to be at both ends of the graph without connecting all the way through. So now we can try to verify each of the above relations. We'll go in the order of the \"corrected\" graph, and we want to rely on cyclical relationships. In other words - 1 sees 2 who sees 3 who sees 1 because that confirms all three are there. Even if, say, 1 was lying, 2 confirms 3 and 3 confirms 1. Since there can only be one liar; 2 confirms themselves by being witness to 3.\n\nAD: D sees A, but A does not see D. No one else is around to complete the circle. Unconfirmed.\n\nABE: E sees B, B sees A, A sees E (and also B). Confirmed.\n\nBEI: E sees B, B sees I, I sees E. Confirmed.\n\nCEI: C sees I, I sees E, E sees C. Confirmed\n\nCDI: D sees I, I sees C, C sees D (and also I). Confirmed.\n\nInteresting - only one unconfirmed. Also interesting is that we have a double confirmation (where 3 sees both 1 and 2) on either side of the unconfirmed relation.\n\nSo one unconfirmed means that that one (AD) has to be the false sighting - and since AD is D's claim - that makes Didier the dirty lying thief.", null, "• Do not pass Go.\n• Do not collect $200. • Give the book back, jeez. • at least one person claimed the other was there at the same time. Please justify this statement. I see no reason in OP to assume that when A says he sees B and E, that he saw those two at the same time. Ie. it's possible that B and E was never in the library at the same time even if A tells the truth. – Taemyr Apr 29 '15 at 8:16 • @Taemyr I did explain that. E sees B. I never said A seeing both means that they're both there at the same time. A seeing both means A is there at the same time E is there and A is there at the same time B is there. Only because E sees B does it mean that all three are there at the same time. The sentence you quoted refers to the box above it. – Alexander Apr 29 '15 at 13:30 • It's possible that A was in the library at the same time as B without A seeing B. Thus A's statement may be a lie. Thus D seeing A may be true as it is not the only possible lie. – Rick Sep 3 '15 at 19:32 This is perhaps the interval graph solution LeGrandDODOM referred to. Create a graph by adding an edge between each pair where one supposedly saw the other.", null, "We then have If everyone is telling the truth, the resulting graph is an interval graph. Interval graphs clearly cannot have an induced$C_4$, but the resulting graph has at least two:$ADIB$and$ADCE$. Hence not everyone is telling the truth and the lies must correspond to edges or non-edges to make both of these$C_4$s not induced. Thus$A$or$D$is lying as these are the only two on both$C_4$s.$D$may be lying about seeing$A$, or perhaps$A$is lying about not seeing$C$and$I$. As far as I can tell, either case can happen. • Except if$A$were the liar,$ADIB$would still be a valid$C_4$, because both$D$and$B$said they saw$A$. – glibdud Apr 29 '15 at 17:26 • This answer is excellent, except the second to last sentence makes an oversight, thus missing the conclusion. You're right that one of those two is lying because they're the only two on both C4s, but more relevant is that there's only one edge in both C4s. Ergo, that edge is the lie, and we therefore know who the liar is. – Mooing Duck Apr 29 '15 at 19:29 • @glibdud: If you consider it possible that$A$actually saw$C$and$I$and this is considered lying, then I stick with$A$could be the liar. It's true, ADIB is still a$C_4$, but it is no longer an induced$C_4$(that is, there are edges among those$4$vertices not part of the cycle). Therefore,$ADIB\\$ is not a problem. In fact, Zeb below gives a specific example of how this could happen. Since you have issue with Zeb's answer too, I think perhaps we're interpreting the problem differently. – Tyler Seacrest Apr 30 '15 at 6:51\n• @MooingDuck: Thanks. You're right in that the only way to make the graph an interval graph by removing edges claimed by a single person is to remove that AD edge. But if you consider adding edges to make a graph an interval graph, that's where I feel like you can claim A is a possible liar. But again, perhaps we're interpreting the puzzle in different ways. – Tyler Seacrest Apr 30 '15 at 6:53\n• @glibdud I believe the interpretation you made is that the liar's statement must contain no truth, whereas this interpretation is that the liar said something false or omitted information. For both interpretations the truth tellers omitted no information. – Rick Sep 3 '15 at 20:22\n\nThe Problem is ill Posed\n\nIf both person 1 states they see person 2 and person 2 states they see person 1 then they must have been in the library at the same time. This is true because at least one of person one and person 3 must be telling the truth as there is only one liar.\n\nTo move further we need to further define what it means to lie:\n\n# If lying by omission is not lying\n\nIn this case people are allowed to have seen people they do not mention without being considered liars. The only way to be considered a liar is to say you saw someone you in fact did not.\n\nIf this is the case then:\n\nAny of them could be a liar.\n\nFirst lets tabulate the statements, if the column header stated they saw the row header then I'll mark that intersection. If it was a corroborated sighting it is marked with an X, if it was a one directional sighting it is marked with a ?\n\n a b c d e i\na \\ X ?\nb X \\ ?\nc \\ ? X\nd ? \\\ne ? \\ ?\ni ? X ? \\\n\n\nFrom this we can see each person stated at least one uncorroborated sighting.\n\nThis means that any of them could be the liar: Everyone except the person the liar supposedly saw arrives. Then the liar leaves and the last person arrives. Now everyone would have seen everyone with the exception of the liar and the person they supposedly saw. Since the person they supposedly saw did not claim to see the liar, they did not lie. Thus everyone except the liar only told lies of omission and any of them could have done it.\n\n# If the whole truth and nothing but the truth is required\n\nIn this case we can make some more deductions.\n\nIf neither person 1 states they see person 2 nor person 2 states they see person 1 then either they must not have been in the library at the same time or one of them is the liar. This is true because if they were in the library at the same time at least one of them would have seen the other so then one of them must have omitted seeing the other and is thus lying.\n\nThe liar could have been there the entire time. The liar could just be lying by omission. As long as everyone else's testimonies are consistent this should be valid. This means that any consistent system of testimonies with 5 people could be valid with the 6th person being the liar that was there the whole time. Thus we can just examine each 5 person subsystem. Thus the analysis that follows excludes the liar from the the analysis, and anywhere is says people or person, this means truth telling people/person as the liar is excluded from the analysis.\n\nFirst lets try the full system assuming no liar:\n\nAssuming no lies then here is a table where an X indicates that the row header and column header were in the library at the same time, and a blank indicates they were never in the library at the same time (top half used only for clarity):\n\n a b c d e i\na \\ X X X\nb \\ X X\nc \\ X X X\nd \\ X\ne \\ X\ni \\\n\n\nNow if pair 1&2, pair 2&3, and pair 1&3, each have an X then 1,2, and 3 must have all been in the library at the same time. We know this must be true because none of them can reenter the library. WLOG 1 arrived first. 1 must not leave until both 2 and 3 have arrived. WLOG 2 arrives next. 2 must not leave until 3 has arrived. Thus when 3 arrives they will all be there.\n\nThere are no sets of 4 people where each pair of people has an X. Thus there was not a time when there were 4 people simultaneously in the library. This means that the periods where there were at least 3 people in the library were never interrupted by a forth person coming or going and can be considered one time unit. (Remember the caveat that the liar is excluded, so the liar my be present simultaneously with three truth tellers)\n\nIn the 6 person system there are 4 triplets:", null, "ABE, BEI, CDI, and CEI\n\nIf these three triplets exist on the timeline then all of the X's involved with them will be satisfied. The remaining X's that need to be satisfied are:\n\n a b c d e i\na \\ X\nb \\\nc \\\nd \\\ne \\\ni \\\n\n\nAD. For each of these pairs (just one in this case) there must be a time period during which only the pair is in the library as none of these pairs is part of a triplet.\n\nThus a list of occupancies that must have existed at some point during the day are as follows: ABE, BEI, CDI, CEI, and AD\n\nThis can be visualized in tabular where the rows are people, the columns are time periods and an O indicates occupancy.\n\n 1 2 3 4 5\na O O\nb O O\nc O O\nd O O\ne O O O\ni O O O\n\n\nTo be a solution the time periods would need to rearrange so that each person occupied the library only during consecutive periods. As expected these periods cannot be arranged in such a manner. Proof for those interested otherwise skip to the next section:\n\nFor i's visit to be consecutive periods 2, 3, and 4 must be next to each other. withing that span 2&4 and 3&4 must be consecutive for e and c respectively. That only allows the order 2, 4, 3 or its reverse:\n\n 1 2 4 3 5\na O O\nb O O\nc O O\nd O O\ne O O O\ni O O O\n\n\nFor d to be consecutive 5 must be consecutive with 3, and for e and b to be consecutive 1 must go next to 2, but for a to be consecutive 1 must go next to 5 which is impossible. Thus indeed someone must be lying.\n\n## The Possibilities\n\n### A lied\n\nFollowing the same logic as the previous example we can construct tables without A (s A could have been there the whole time if they're lying, This really boils down to removing A from the final period table:\n\n 2 4 3\nb O\nc O O\nd O\ne O O\ni O O O\n\n\nThis is a legitimate possibility. A could be the culprit. Here's a diagram of the library occupancy including who saw who when. Note that A did not see B despite saying they did, whereas everyone else saw only who they said they saw, and no two people were in the library at the same time without one of them seeing the other.", null, "### B lied\n\n 1 4 3 5\na O O\nc O O\nd O O\ne O O\ni O O\n\n\nAgain not possible\n\n### C lied\n\n 1 2 3 5\na O O\nb O O\nd O O\ne O O\ni O O\n\n\nAgain not possible\n\n### D lied\n\n 1 2 4\na O\nb O O\nc O\ne O O O\ni O O\n\n\nThis scenario is also possible so D could be the culprit:", null, "Note: that here D said they saw A but they instead saw E. This Solution allows for everyone to see exactly 2 people, which is slightly more in line with the problem statement, so if the problem statement was modified to state that each person saw exactly two people then D would have to be the culprit as if A was the liar they would see a minimum of three people.\n\n### E lied\n\n 1 2 3 5\na O O\nb O O\nc O\nd O O\ni O O\n\n\nAgain not possible\n\n### I lied\n\n 1 4 3 5\na O O\nb O\nc O O\nd O O\ne O O\n\n\nAgain not possible\n\n## Conclusion\n\nThis problem has two solutions as stated, but could be easily modified to eliminate A as the culprit by stating that each person saw exactly two other people in the library. In that case D is the culprit. Another modification/interpretation that some people took and would result in the same conclusion: The lair included no truth in their statement while the honest students stated the whole truth and nothing but the truth (but this makes the puzzle much easier, and relies on using two different definitions of lying). Yet another modification would be to state that no one, including the liar, saw anyone that they didn't claim to see.\n\n• You yourself said that there can't be 4 people in the library at once. Thus, your scenario for A being the liar can't work because the graph requires 4 people at once twice (ABEI, ACEI). – ErikE Feb 6 '16 at 1:29\n• @erik that was in the section where I was under the assumption that there was no liar. When there is a liar, the liar can be present during any of the times where there are three other people in the library without invalidating anyone else's testimony. – Rick Feb 7 '16 at 5:30\n• But the OP says there is one liar... I don't understand why you'd entertain any other scenario. – ErikE Feb 7 '16 at 5:47\n• Your final answer is that \"the problem has two solutions as stated\". This is what I'm taking exception to. Do you still maintain this? You say, \"This is a legitimate possibility. A could be the culprit.\" But according to your own logic, A can't. There is nothing in your answer that eventually disclaims A as a valid answer with the rules as given. – ErikE Feb 8 '16 at 17:01\n• @ErikE According to my own logic it certainly can... If you take the paragraph \"There are no sets of 4 ... can be considered one time unit.\" and substitute \"truth telling people/person\" in for \"people/person\" it is now more obvious that my logic still holds. from the statement \"First lets try the full system assuming no liar:\" onward, all of my systems ignore the liar as if they didn't exist. So \"people\" doesn't include the liar. and thus there are three \"people\" in the library while ABEI and ACEI are in the library because for the analysis of whether A could be lying, A is not considered. – Rick Feb 9 '16 at 15:54\n\nThe problem is ill-posed.\n\nThe liar must be one of A or D, but there is a consistent scenario where A lies and everyone else tells the truth, as well as a consistent scenario where D lies and everyone else tells the truth.\n\nFirst scenario:\n\nA enters at 7:00 AM, I enters at 8:00 AM, B enters at 9:00 AM, E enters at 10:00 AM, B leaves at 11:00 AM, C enters at 12:00 PM, E leaves at 1:00 PM, D enters at 2:00 PM, C leaves at 3:00 PM, D leaves at 4:00 PM, I leaves at 5:00 PM, A leaves at 6:00 PM. A is the only liar: the truth is that A saw everybody.\n\nSecond scenario:\n\nD enters at 7:00 AM, E enters at 8:00 AM, C enters at 9:00 AM, I enters at 10:00 AM, C leaves at 11:00 AM, B enters at 12:00 PM, I leaves at 1:00 PM, A enters at 2:00 PM, B leaves at 3:00 PM, A leaves at 4:00 PM, E leaves at 5:00 PM, D leaves at 6:00 PM. D is the only liar: the truth is that D saw everybody.\n\nWhittling down the suspects:\n\nSay that suspects X and Y are \"connected\" if one of X or Y claims to have seen the other. Define a 4-cycle to be a four-tuple of suspects (X,Y,Z,W) such that X is connected to Y, Y is connected to Z, Z is connected to W, W is connected to X, X is not connected to Z, and Y is not connected to W. If (X,Y,Z,W) is a 4-cycle, then it is pretty easy to see that at least one of X,Y,Z,W must be lying. Using the 4-cycle (A,B,I,D) we see that one of A,B,I,D is lying, and using the 4-cycle (A,D,C,E) we see that one of A,D,C,E is lying. Thus the liar is either A or D.\n\nThere is a hidden symmetry in the problem:\n\nThe connection graph described earlier is symmetric under the permutation (AD)(BC)(EI).\n\n• The fact that two people are in the library at the same time doesn't necessarily imply that they both saw each other. Thus the flaw in your first scenario is your assertion that the proposed liar saw everybody. It's possible that he only saw the two people he claimed to have seen, and thus is telling the truth. – glibdud Apr 29 '15 at 15:55\n• Actually, your second scenario has the same flaw, though it's closer to the right order of events. – glibdud Apr 29 '15 at 17:12\n• @glibdud In Senario 1 while it's true that A did not necessarily see everyone they must have seen those that did not see them as :If two persons were in the library at the same time, at least one of the two saw the other and thus A must have seen C,E, and I but did not state seeing C or I and thus lied by omission. – Rick Sep 3 '15 at 14:38\n\n# Note: this answer assumes that a truth-teller says ALL the truth, without omitting information.\n\nThe symbol $$X-$$>$$Y$$ means that $$X$$ saw $$Y$$. We know that:\n$$A-$$>$$E$$\n$$E-$$>$$C$$\n$$C-$$>$$D$$\n$$D-$$>$$A$$\nWhich means that $$A,B,C,D$$ were all in the store at a certain moment. Though, there isn't any edge (graph edge, I mean) between $$A-C$$ and $$E-D$$, which should be mandatory if they're all telling the truth. Therefore, the liar is $$A,C,D$$ or $$E$$.\nB and I are honest.\n\nSuppose $$C$$ liar. We have a triangle between $$A-B-E$$, which means that they were together at some point. We also have the triangle $$I-E-B$$, but we don't have a tie $$A-I$$, meaning that there's a moment when $$B$$ was inside the shop and either $$I$$ or $$A$$ had already left it, while the other (of $$A$$ or $$I$$) hadn't entered yet. If so, how is it possible that $$D$$ saw $$A$$ and $$I$$ without seeing $$B$$? Impossible! Therefore, C is truth-teller.\n\nSuppose $$E$$ liar. We know that $$A$$ and $$I$$ are never together. $$D$$ saw both $$A$$ and $$I$$ , $$B$$ saw both $$A$$ and $$I$$ too, so how is it possible that $$B$$ and $$D$$ weren't together? Impossible! Therefore, E tells the truth.\n\nSuppose $$A$$ liar. $$B$$ and $$C$$ didn't meet. $$E$$ has seen both $$B$$ and $$C$$, meaning that $$E$$ was present when one had left and the other had yet to enter. D was intermediate between $$B$$ and $$C$$, despite not meeting $$B$$, because he has seen $$A$$ (who was seen by $$B$$). So, how is it possible that $$E$$ and $$D$$ never met? Impossible, so $$A$$ tells the truth.\n\nThe liar is $$D$$. This is a scheme of compatible timings. The time is represented on the horizontal axis. People that share points with the same abscissa were together in the library, of course.", null, "• How can you make the statement that \"E tells the truth\" and then declare that the liar is E? Is one of those meant to be D? – Bailey M Apr 28 '15 at 19:22\n• @BaileyM Exactly, I've edited! I hope that it was the only wrong miswritten letter – leoll2 Apr 28 '15 at 19:24\n• I get the feeling you're falling into the same trap I originally fell into. – Spacemonkey Apr 28 '15 at 19:32\n• @Spacemonkey Explain? Does my picture conflict with any of the statements? – leoll2 Apr 28 '15 at 19:33\n• I can try, this thing is making my head dizzy, lol – Spacemonkey Apr 28 '15 at 19:34\n\nI believe the \"correct\" way to do this is to start by determining which groupings are certain. (I'm certain it's correct, but I don't know if it's how they expected it to be done)\n\nWe can quickly identify two pairs of people who definitely saw each other.\n\n• Albert and Bernard both saw each other.\n\n• Charlotte and Isabelle both saw each other.\n\nThis means these two pairs must have happened.\n\nNow, we also have that Albert saw Edouard, who saw Bernard. This indicates that Edouard was present with at least one of the two, as Albert and Edouard can't both be lying.\n\nSimilarly, Isabelle saw Edouard, who saw Charlotte, so Edouard was present with at least one of the two, as Isabelle and Edouard can't both be lying.\n\nWe also have that Isabelle saw Edouard, who saw Bernard, who saw Isabelle. These three must be together, as only one can be lying, which still ties all three into the same group.\n\nFinally, we have Isabelle saw Charlotte, who saw Didier, who saw Isabelle. Again, only one can be lying, so these three were present together.\n\nSo we have (ABE), (BCI), (CEI), and (CDI) as certain to be present in their respective groups.\n\nThis leaves just one claim unaccounted for. Didier claimed to be present with Albert. This is the only claim not corroborated by anybody else, directly or indirectly, and therefore must be the lie.\n\nTo solve this more easily, I drew up the claims as a directed graph, and then looked for loops within the graph. If three people formed a loop, they corroborate each other's claims. The only claim not part of a loop is Didier claiming to have seen Albert.\n\nTo be clear, methods based on working out timelines are problematic, as they require assumptions about sequences, whereas the above is purely about requiring that there be only one liar.\n\n• As the question was from a CS exam, I feel like this solution is an appropriate one. I had a similar puzzle on my algorithms & data structures exams. – Fodder Apr 29 '15 at 4:38\n• \"Finally, we have Isobelle saw Charlotte, who saw Didier, who saw Isobelle. Again, only one can be lying, so these three were present together.\" You have to consider the timelines. Isabelle enters, Didier enters, Isabelle leaves, Charlotte enters. Only one is lying, but Isobelle and Charlotte was never present at the same time. (This sequence might be contradictory to other statements made; I only try to point out that your inference is invalid) – Taemyr Apr 29 '15 at 8:22\n• @Taemyr - the sequence I did it in was relevant. Charlotte and Isabelle saw each other. Albert and Bernard saw each other. The rest depends on those two. – Glen O Apr 29 '15 at 8:37\n• Fair enough, although not sufficient. Charlotte enters, Isobelle enters, Charlotte leaves, Didier enters. Only one lie, Charlotte and Didier was not present at the same time. – Taemyr Apr 29 '15 at 8:41\n• @Taemyr - I realise it sounds a little vague, but what I meant by \"present together\" was \"there was a continuous period, during which at least one of the three was present at any point in that period and all three were present at some point in that period\". It indicates that any timeline must have those three in a \"group\". – Glen O Apr 29 '15 at 8:54\n\nThis problem is actually underdetermined. Credit goes to Mark N for the idea of everyone entering the room at the same time\n\n## Counter-example: Everyone enters the room at the same time.\n\n### Solution 1: Albert is the liar\n\nAlbert can claim that they didn't see Bernard even if Bernard was in fact there. As long as Bernard claims that they saw Albert, this follows the rule that one of them saw the other.\n\n### Solution 2: Bernard is the liar (similar argument)\n\nBernard can similarly claim that they didn't see Albert even if Albert was in fact there. As long as Albert claims that they saw Bernard, this follows the rule that one of them saw the other.\n\nSince we have arrived at two valid solutions, this is an underdetermined system.\n\n• All this proves is that it is certain that everybody was NOT in the room at the same time. There is no valid solution in this case, because there must be multiple liars. For example, neither D nor E claims to have seen the other. If they were truly in the room at the same time, then one of them DID see the other, according to the question, so one of them must be lying about not seeing the other. Since the same goes for A & I and B & C, there is no case where only one person is lying, so this scenario does not fit the question. – Hylianpuffball Apr 29 '15 at 12:11\n• If everyone arrived at the same time then either D or E would have seen each other but neither stated as much, in this case one of them would be lying by omission. Similarly, with B and C. Thus if omitting people seen is considered lying, then not everyone could be in the library at the same time. – Rick Sep 3 '15 at 18:24\n\nThese are the only absolute statements I've arrived to:\n\nThe following are never inside the library at the same time::\n\nA and C\nA and I\nB and C\nB and D\nD and E\n\nI feel like the answer may be that...\n\nBernard is the culprit.\n\nWhy?\n\nThere exists a little inconsistency between people seen.\nLet's draw these reports out:\nB -> AI\nD -> AI\nC -> DI\nA -> BE\nE -> BC\nI -> CE\n\nThis leaves us with the following.\n\nAlbert, Bernard, Charlotte, and Edouard were all seen twice.\nIsabelle was seen three times.\nDidier was seen once.\n\nGiven this information,\n\nSay Bernard saw Didier instead of Isabelle. We get the following:\nD -> AI\nC -> DI\nA -> BE\nE -> BC\nI -> CE\n\nThis evens everything out, with Didier and Isabelle now being sighted twice each.\n\nTherefore...\n\nIt can be concluded that Bernard lied about seeing Isabelle.\n\n• Equity in sightings would be nice, but there's no reason that prevents someone from being seen by multiple people. – Alexander Apr 28 '15 at 22:48\n\n-> is saw; <- is seen\nA -> B E\nB -> A I\nC -> D I\nD -> A I\nE -> B C\nI -> C E\n\nA <- B D\nB <- A E\nC <- E I\nD <- C\nE <- A I\nI <- B C D\n\nThe thief lied, so that means the thief claims he saw someone when he didn't. That means the thief saw 1 or 0 people. Conversely, only 1 person at most could have seen the thief. Therefore, since D is the only one seen by 1 person or less, D must be the thief.\n\n• Why couldn't the thief see 2,3,4 or 5 people? If they are lying they could leave out people they did see too. – Rick Sep 3 '15 at 18:15\n• Why couldn't more than one person see the thief? – Rick Sep 3 '15 at 18:17\n• Because everyone claims to have seen more than one person and one of them has to be lying (specifically, the problem says that everyone but the liar must be telling the truth)? – Kingrames Sep 3 '15 at 18:36\n• Why couldn't the liar have seen people they didn't claim to have seen? – Rick Sep 4 '15 at 14:27" ]
[ null, "https://i.stack.imgur.com/4yayF.png", null, "https://i.stack.imgur.com/GAVEW.jpg", null, "https://i.stack.imgur.com/g2fe0.jpg", null, "https://i.stack.imgur.com/U9l2Q.png", null, "https://i.stack.imgur.com/gf7aI.png", null, "https://i.stack.imgur.com/AgySn.png", null, "https://i.stack.imgur.com/9FBms.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.97116005,"math_prob":0.91001993,"size":7023,"snap":"2021-04-2021-17","text_gpt3_token_len":1792,"char_repetition_ratio":0.1494515,"word_repetition_ratio":0.12914132,"special_character_ratio":0.24434003,"punctuation_ratio":0.06929434,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96743816,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,9,null,9,null,9,null,9,null,9,null,9,null,9,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-16T15:29:33Z\",\"WARC-Record-ID\":\"<urn:uuid:ea0e3e58-cea4-475b-9324-6eddb8199b04>\",\"Content-Length\":\"318712\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e557828e-2942-4edd-a01b-55aadb0d0bf2>\",\"WARC-Concurrent-To\":\"<urn:uuid:a67ebd86-6e08-438b-87be-456f22407c5b>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://puzzling.stackexchange.com/questions/12864/find-the-liar-in-the-library/12905\",\"WARC-Payload-Digest\":\"sha1:EG3BDJRW7SLT4R7DB7NLAKSU7D2PT3MB\",\"WARC-Block-Digest\":\"sha1:R4U4DM2F3WV476WXH4IAAIBMJSBVYQYJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703506697.14_warc_CC-MAIN-20210116135004-20210116165004-00772.warc.gz\"}"}
http://www.geeks3d.com/20100629/test-opengl-geometry-instancing-geforce-gtx-480-vs-radeon-hd-5870/3/
[ "# (Tested) OpenGL Geometry Instancing: GeForce GTX 480 vs Radeon HD 5870\n\nArticle Index\n\n## 3 – Geometry Instancing Techniques\n\nHere is the description of each geometry instancing technique I used:\n\n• F2 key: simple instancing: there is one source for geometry (a mesh) and this geometry is rendered for each instance. The tranformation matrix of each instance is calculated on the CPU. OpenGL rendering uses the glDrawElements() function. The number of draw calls is equal to the number of instances. The most simple and inefficient geometry instancing technique…\n• F3 key: slow pseudo-instancing: there is one source for geometry (a mesh) and this geometry is rendered for each instance. Now the tranformation matrix is computed on the GPU and per-instance data is passed via uniform variables (a vec4 for teh position and a vec4 for the orientation). OpenGL rendering uses the glDrawElements() function. The number of draw calls is equal to the number of instances. This technique is faster than F2 (simple instancing).\n• F4 key: Pseudo-Instancing: there is one source for geometry (a mesh) and this geometry is rendered for each instance. The tranformation matrix is computed on the GPU and per-instance data is passed via persistent vertex attributes. Persistent vertex attributes are for example the normal, the texture coordinates or the color (respectively set with glNormal(), glMultiTexCoord() and glColor()). This technique has been shown by NVIDIA in the following whitepaper: GLSL Pseudo-Instancing. OpenGL rendering uses the glDrawElements() function. The number of draw calls is equal to the number of instances. pseudo-instancing is extremely efficient on NVIDIA hardware. See results below…\n• F5 key: geometry instancing: it’s the real hardware instancing (HW GI). There is one source for geometry (a mesh) and rendering is done by batchs of 64 instances per draw-call. Actually on NVIDIA hardware, 400 instances can be rendered with one draw call but that does not work on ATI due to the limitation of the number of vertex uniforms. 64 instances per batch work fine on both ATI and NVIDIA. The tranformation matrix is computed on the GPU and per-batch data is passed via uniform arrays: there is an uniforn array of vec4 for positions and another vec4 array for rotations. OpenGL rendering uses the glDrawElementsInstancedARB() function. The GL_ARB_draw_instanced extension is required. The HW GI allows to drastically reduce the number of draw calls: for the 20,000-asteroid belt, we have 20000/64 = 313 draw calls instead of 20,000.\n• F6 key: geometry instancing with uniform buffer: it’s still the real hardware instancing (HW GI). There is one source for geometry (a mesh) and rendering is done by batchs of… 1000 instances per draw-call. A 1000-instance batch works fine on the GTX 480 and the HD 5870. The tranformation matrix is computed on the GPU and per-batch data is passed via a big buffer of uniforms: an uniform buffer object or UBO. This technique requires the support of the GL_ARB_uniform_buffer_object extension. UBO allows a huge reduction of the number of draw calls: for 20,000 instances and 1000 instances per draw call, the complete asteroid belt requires 20 draw calls! Like the previous GI technique, OpenGL rendering uses the glDrawElementsInstancedARB() function.\n\n## 19 thoughts on “(Tested) OpenGL Geometry Instancing: GeForce GTX 480 vs Radeon HD 5870”\n\n1.", null, "Groovounet\n\nIt would be interesting to see how the test behave with different instancing methods: instanced array, texture buffer, etc. Also 1800 triangles isn’t so much for the maximum.\n\n2.", null, "Groovounet\n\nNice work anyway!\n\n3.", null, "JeGX Post Author\n\nThanks Mr Groove!\nI’ll update this demopack with new techniques next time (at least with instanced array). And I’ll increase the number of polygons per instance 😉\n\n4.", null, "nicolas\n\nFWIW, note that with more triangles, you’ll be hitting harder the triangle setup bottleneck of one triangle per clock cycle. Don’t know for the NVidia GTX 480, but this limit applies for the ATI R5xxx ; I don’t think that going beyond 180M triangles will bring you anything good for this generation of boards.\n\nNice summary of instanciation techniques and perfs though. Did you try to have finer grained timings with ARB_timer_query extension ?\n\nCheers\n\n5.", null, "Mars_999\n\nYes keep these demo and tutorials coming. I enjoy reading them as it keeps me up to date on the newest features I can do with OpenGL. Plus it’s nice to see the old vs. new method of doing the same thing so once can make his own decision on what to do.\n\nThanks!!! keep up the good work!\n\n6.", null, "WacKEDmaN\n\n20,000 instances x 18 tri/instance = 360,000 tri\nGeforce GTX 470@ 700 core /1800 mem\n– F2: FPS=18, GPU=20%, CPU=30%\n– F3: FPS=40, GPU=21%, CPU=35%\n– F4: FPS=68, GPU=15%, CPU=35%\n– F5: FPS=96, GPU=19%, CPU=35%\n– F6: FPS=101, GPU=24%, CPU=30%\n\n100,000 instances, 1800 tri/instance = 180,000,000 tri\nGeforce GTX 470@ 700 core /1800 mem\n– F2: FPS=4, GPU=67%, CPU=30%\n– F3: FPS=6, GPU=99%, CPU=24%\n– F4: FPS=6, GPU=99%, CPU=14%\n– F5: FPS=6, GPU=99%, CPU=12%\n– F6: FPS=6, GPU=99%, CPU=10%\n\ninteresting…CPU usage goes down as GPU goes up..i thought the cpu would be less stressed with the lower geometry count…\n\n7.", null, "Matumbo\n\nI tested with a Radeon HD 2400, Catalyst 10.6.\nThe F6 technique half-failed: the asteroids are there, rotating, but all shading on them is turned off (all black). But the middle planet is shaded.\nI suppose this was not intended.\nThe driver exposes all the 3 required extensions.\n\n8.", null, "IVXXX\n\n20,000 instances x 18 tri/instance = 360,000 tri\nATI HD4770 @ 940 core / 4800 mem\n– F2: FPS=44, GPU=50%, CPU=28%\n– F3: FPS=57, GPU=58%, CPU=30%\n– F4: FPS=54, GPU=40%, CPU=30%\n– F5: FPS=140, GPU=42%, CPU=34%\n– F6: FPS=152, GPU=34%, CPU=30% (no shadinng)\n\n100,000 instances, 1800 tri/instance = 180,000,000 tri\nATI HD4770 @ 940 core / 4800 mem\n– F2: FPS=5, GPU=99%, CPU=18%\n– F3: FPS=5, GPU=99%, CPU=16%\n– F4: FPS=5, GPU=99%, CPU=16%\n– F5: FPS=4-8, GPU=99%, CPU=12-28%\n– F6: FPS=1-6, GPU=99%, CPU=6-28% (no shadinng)\n\n9.", null, "ca\\$per\n\nSame thing as Matumbo here. But i have Radeon 4850 on Win7 and Cat. 10.5\nF6 – asteroids are all black with all triangle variations (different EXEs).\n\n10.", null, "TopLess3D\n\nCould you share your source code please (both C++ and GLSL), in order to learn advanced techniques and programming in OpenGL?\n\n11.", null, "ddd\n\nOmg, make a GRAPH, not text :p\n\n12.", null, "krishx007\n\nhay JeGX R u died or what?????\n\nNot publishing any new article from 3 to 4 days???\n\nFight with GirlFriend?????????\n\n13.", null, "krishx007\n\nr u alive????????\n\n14.", null, "codablank\n\nwhere can I find the source of this demo ? or a similar source ? I get very bad performance with glDrawElements() (1000 cube instances max ) and glDrawElementsInstanced gives the same result\n\nYet I get a descent FPS when I run your demo (I’m on ATI 4850, opengl 2.1)\n\n15.", null, "Ryan\n\nYeah, the source for this would be really handy!\n\n16.", null, "DarkUltra\n\n180 million eh? According to 3dmark 01, my gtx 470 does 400 million.\n\nhttp://jooh.no/web/GeForce_8600_GT_vs_GTX_470_polygon_performance.png\n\nInstancing as in the article however, does not use as much cpu power, but is also less useful than “real” cpu aware polygons.\n\nthe 470 fermi have several setup engines running in parallel instead of just one as all the previous gpus (ati and nvidia)\n\n17.", null, "OnlyLinuxLovesUBack" ]
[ null, "http://1.gravatar.com/avatar/40df6f0cd8571262dabedf4bdcf1e093", null, "http://1.gravatar.com/avatar/40df6f0cd8571262dabedf4bdcf1e093", null, "http://2.gravatar.com/avatar/25a82cfaca5030bc879ec339cf9d6ed6", null, "http://1.gravatar.com/avatar/7126dca6cd426e522fed4694a7d9f02c", null, "http://0.gravatar.com/avatar/6a97d3f5f5bfcf0076caa0a5eb349a9f", null, "http://2.gravatar.com/avatar/b9200dd9dd48a689f260b3249c1ddfbb", null, "http://0.gravatar.com/avatar/38616f7b1b21175a21323cdefc61ea58", null, "http://0.gravatar.com/avatar/951a0cae16dcde709e24bd8ad5c768ba", null, "http://0.gravatar.com/avatar/9e5e51fa69d9acff68df491787e52f5e", null, "http://2.gravatar.com/avatar/265b82f89be713f9645206b6b94c8b01", null, "http://1.gravatar.com/avatar/d18df5f68c3c5e801137da4ec51ed38c", null, "http://0.gravatar.com/avatar/951c37e8fa3f25d879b57d1965093c03", null, "http://0.gravatar.com/avatar/951c37e8fa3f25d879b57d1965093c03", null, "http://2.gravatar.com/avatar/eaf2d38defc4b7446dc750ad7d055e27", null, "http://0.gravatar.com/avatar/9f0b104591ca16b9eb886f38eed6809b", null, "http://0.gravatar.com/avatar/0bb7ef834a13e11b60d5bad3138eabb9", null, "http://0.gravatar.com/avatar/98408f04445fd02290de2c4333e86f07", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.830604,"math_prob":0.8821358,"size":7375,"snap":"2019-26-2019-30","text_gpt3_token_len":1941,"char_repetition_ratio":0.14027947,"word_repetition_ratio":0.17272727,"special_character_ratio":0.28528813,"punctuation_ratio":0.14817275,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9508827,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-22T18:09:45Z\",\"WARC-Record-ID\":\"<urn:uuid:6704d770-111c-41d7-ad8e-b7d0aef695c2>\",\"Content-Length\":\"83791\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ec5a6c20-19bc-46b7-8e79-030f8cdf0490>\",\"WARC-Concurrent-To\":\"<urn:uuid:b7bb4bee-11d2-4968-804f-fad57b5ffb6e>\",\"WARC-IP-Address\":\"83.166.134.7\",\"WARC-Target-URI\":\"http://www.geeks3d.com/20100629/test-opengl-geometry-instancing-geforce-gtx-480-vs-radeon-hd-5870/3/\",\"WARC-Payload-Digest\":\"sha1:BCOA6C6KKPJOQU3PNJC6GLZQ7OP5AQUV\",\"WARC-Block-Digest\":\"sha1:YPBJTJLZPLRGMWFAHAFJKMFRKCFYXPCL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195528208.76_warc_CC-MAIN-20190722180254-20190722202254-00003.warc.gz\"}"}
http://gutenberg.us/articles/eng/Non-Euclidean_geometry
[ "", null, "#jsDisabledContent { display:none; } My Account |  Register |  Help", null, "Flag as Inappropriate", null, "This article will be permanently flagged as inappropriate and made unaccessible to everyone. Are you certain this article is inappropriate?          Excessive Violence          Sexual Content          Political / Social Email this Article Email Address:\n\n# Non-Euclidean geometry\n\nArticle Id: WHEBN0000058610\nReproduction Date:\n\n Title: Non-Euclidean geometry", null, "Author: World Heritage Encyclopedia Language: English Subject: Collection: Non-Euclidean Geometry Publisher: World Heritage Encyclopedia Publication Date:\n\n### Non-Euclidean geometry", null, "Behavior of lines with a common perpendicular in each of the three types of geometry\n\nIn mathematics, non-Euclidean geometry consists of two geometries based on axioms closely related to those specifying Euclidean geometry. As Euclidean geometry lies at the intersection of metric geometry and affine geometry, non-Euclidean geometry arises when either the metric requirement is relaxed, or the parallel postulate is replaced with an alternative one. In the latter case one obtains hyperbolic geometry and elliptic geometry, the traditional non-Euclidean geometries. When the metric requirement is relaxed, then there are affine planes associated with the planar algebras which give rise to kinematic geometries that have also been called non-Euclidean geometry.\n\nThe essential difference between the metric geometries is the nature of parallel lines. Euclid's fifth postulate, the parallel postulate, is equivalent to Playfair's postulate, which states that, within a two-dimensional plane, for any given line and a point A, which is not on , there is exactly one line through A that does not intersect . In hyperbolic geometry, by contrast, there are infinitely many lines through A not intersecting , while in elliptic geometry, any line through A intersects .\n\nAnother way to describe the differences between these geometries is to consider two straight lines indefinitely extended in a two-dimensional plane that are both perpendicular to a third line:\n\n• In Euclidean geometry the lines remain at a constant distance from each other even if extended to infinity, and are known as parallels.\n• In hyperbolic geometry they \"curve away\" from each other, increasing in distance as one moves further from the points of intersection with the common perpendicular; these lines are often called ultraparallels.\n• In elliptic geometry the lines \"curve toward\" each other and intersect.\n\n## Contents\n\n• History 1\n• Early history 1.1\n• Creation of non-Euclidean geometry 1.2\n• Terminology 1.3\n• Axiomatic basis of non-Euclidean geometry 2\n• Models of non-Euclidean geometry 3\n• Elliptic geometry 3.1\n• Hyperbolic geometry 3.2\n• Three-dimensional non-Euclidean geometry 3.3\n• Uncommon properties 4\n• Importance 5\n• Planar algebras 6\n• Kinematic geometries 7\n• Fiction 8\n• Notes 10\n• References 11\n\n## History\n\n### Early history\n\nWhile Euclidean geometry, named after the Greek mathematician Euclid, includes some of the oldest known mathematics, non-Euclidean geometries were not widely accepted as legitimate until the 19th century.\n\nThe debate that eventually led to the discovery of the non-Euclidean geometries began almost as soon as Euclid's work Elements was written. In the Elements, Euclid began with a limited number of assumptions (23 definitions, five common notions, and five postulates) and sought to prove all the other results (propositions) in the work. The most notorious of the postulates is often referred to as \"Euclid's Fifth Postulate,\" or simply the \"parallel postulate\", which in Euclid's original formulation is:\n\nIf a straight line falls on two straight lines in such a manner that the interior angles on the same side are together less than two right angles, then the straight lines, if produced indefinitely, meet on that side on which are the angles less than the two right angles.\n\nOther mathematicians have devised simpler forms of this property. Regardless of the form of the postulate, however, it consistently appears to be more complicated than Euclid's other postulates (which include, for example, \"Between any two points a straight line may be drawn\").\n\nFor at least a thousand years, geometers were troubled by the disparate complexity of the fifth postulate, and believed it could be proved as a theorem from the other four. Many attempted to find a proof by contradiction, including Ibn al-Haytham (Alhazen, 11th century), Omar Khayyám (12th century), Nasīr al-Dīn al-Tūsī (13th century), and Giovanni Girolamo Saccheri (18th century).\n\nThe theorems of Ibn al-Haytham, Khayyam and al-Tusi on quadrilaterals, including the Lambert quadrilateral and Saccheri quadrilateral, were \"the first few theorems of the hyperbolic and the elliptic geometries.\" These theorems along with their alternative postulates, such as Playfair's axiom, played an important role in the later development of non-Euclidean geometry. These early attempts at challenging the fifth postulate had a considerable influence on its development among later European geometers, including Witelo, Levi ben Gerson, Alfonso, John Wallis and Saccheri. All of these early attempts made at trying to formulate non-Euclidean geometry however provided flawed proofs of the parallel postulate, containing assumptions that were essentially equivalent to the parallel postulate. These early attempts did, however, provide some early properties of the hyperbolic and elliptic geometries.\n\nKhayyam, for example, tried to derive it from an equivalent postulate he formulated from \"the principles of the Philosopher\" (Aristotle): \"Two convergent straight lines intersect and it is impossible for two convergent straight lines to diverge in the direction in which they converge.\" Khayyam then considered the three cases right, obtuse, and acute that the summit angles of a Saccheri quadrilateral can take and after proving a number of theorems about them, he correctly refuted the obtuse and acute cases based on his postulate and hence derived the classic postulate of Euclid which he didn't realize was equivalent to his own postulate. Another example is al-Tusi's son, Sadr al-Din (sometimes known as \"Pseudo-Tusi\"), who wrote a book on the subject in 1298, based on al-Tusi's later thoughts, which presented another hypothesis equivalent to the parallel postulate. \"He essentially revised both the Euclidean system of axioms and postulates and the proofs of many propositions from the Elements.\" His work was published in Rome in 1594 and was studied by European geometers, including Saccheri who criticised this work as well as that of Wallis.\n\nGiordano Vitale, in his book Euclide restituo (1680, 1686), used the Saccheri quadrilateral to prove that if three points are equidistant on the base AB and the summit CD, then AB and CD are everywhere equidistant.\n\nIn a work titled Euclides ab Omni Naevo Vindicatus (Euclid Freed from All Flaws), published in 1733, Saccheri quickly discarded elliptic geometry as a possibility (some others of Euclid's axioms must be modified for elliptic geometry to work) and set to work proving a great number of results in hyperbolic geometry.\n\nHe finally reached a point where he believed that his results demonstrated the impossibility of hyperbolic geometry. His claim seems to have been based on Euclidean presuppositions, because no logical contradiction was present. In this attempt to prove Euclidean geometry he instead unintentionally discovered a new viable geometry, but did not realize it.\n\nIn 1766 Johann Lambert wrote, but did not publish, Theorie der Parallellinien in which he attempted, as Saccheri did, to prove the fifth postulate. He worked with a figure that today we call a Lambert quadrilateral, a quadrilateral with three right angles (can be considered half of a Saccheri quadrilateral). He quickly eliminated the possibility that the fourth angle is obtuse, as had Saccheri and Khayyam, and then proceeded to prove many theorems under the assumption of an acute angle. Unlike Saccheri, he never felt that he had reached a contradiction with this assumption. He had proved the non-Euclidean result that the sum of the angles in a triangle increases as the area of the triangle decreases, and this led him to speculate on the possibility of a model of the acute case on a sphere of imaginary radius. He did not carry this idea any further.\n\nAt this time it was widely believed that the universe worked according to the principles of Euclidean geometry.\n\n### Creation of non-Euclidean geometry\n\nThe beginning of the 19th century would finally witness decisive steps in the creation of non-Euclidean geometry. Circa 1813, Carl Friedrich Gauss and independently around 1818, the German professor of law Ferdinand Karl Schweikart had the germinal ideas of non-Euclidean geometry worked out, but neither published any results. Then, around 1830, the Hungarian mathematician János Bolyai and the Russian mathematician Nikolai Ivanovich Lobachevsky separately published treatises on hyperbolic geometry. Consequently, hyperbolic geometry is called Bolyai-Lobachevskian geometry, as both mathematicians, independent of each other, are the basic authors of non-Euclidean geometry. Gauss mentioned to Bolyai's father, when shown the younger Bolyai's work, that he had developed such a geometry several years before, though he did not publish. While Lobachevsky created a non-Euclidean geometry by negating the parallel postulate, Bolyai worked out a geometry where both the Euclidean and the hyperbolic geometry are possible depending on a parameter k. Bolyai ends his work by mentioning that it is not possible to decide through mathematical reasoning alone if the geometry of the physical universe is Euclidean or non-Euclidean; this is a task for the physical sciences.\n\nBernhard Riemann, in a famous lecture in 1854, founded the field of Riemannian geometry, discussing in particular the ideas now called manifolds, Riemannian metric, and curvature. He constructed an infinite family of geometries which are not Euclidean by giving a formula for a family of Riemannian metrics on the unit ball in Euclidean space. The simplest of these is called elliptic geometry and it is considered to be a non-Euclidean geometry due to its lack of parallel lines.\n\nBy formulating the geometry in terms of a curvature tensor, Riemann allowed non-Euclidean geometry to be applied to higher dimensions.\n\n### Terminology\n\nIt was Gauss who coined the term \"non-Euclidean geometry\". He was referring to his own work which today we call hyperbolic geometry. Several modern authors still consider \"non-Euclidean geometry\" and \"hyperbolic geometry\" to be synonyms.\n\nArthur Cayley noted that distance between points inside a conic could be defined in terms of logarithm and the projective cross-ratio function. The method has become called the Cayley-Klein metric because Felix Klein exploited it to describe the non-euclidean geometries in articles in 1871 and 73 and later in book form. The Cayley-Klein metrics provided working models of hyperbolic and elliptic metric geometries, as well as Euclidean geometry.\n\nKlein is responsible for the terms \"hyperbolic\" and \"elliptic\" (in his system he called Euclidean geometry \"parabolic\", a term which generally fell out of use). His influence has led to the current usage of the term \"non-Euclidean geometry\" to mean either \"hyperbolic\" or \"elliptic\" geometry.\n\nThere are some mathematicians who would extend the list of geometries that should be called \"non-Euclidean\" in various ways.\n\n## Axiomatic basis of non-Euclidean geometry\n\nEuclidean geometry can be axiomatically described in several ways. Unfortunately, Euclid's original system of five postulates (axioms) is not one of these as his proofs relied on several unstated assumptions which should also have been taken as axioms. Hilbert's system consisting of 20 axioms most closely follows the approach of Euclid and provides the justification for all of Euclid's proofs. Other systems, using different sets of undefined terms obtain the same geometry by different paths. In all approaches, however, there is an axiom which is logically equivalent to Euclid's fifth postulate, the parallel postulate. Hilbert uses the Playfair axiom form, while Birkhoff, for instance, uses the axiom which says that \"there exists a pair of similar but not congruent triangles.\" In any of these systems, removal of the one axiom which is equivalent to the parallel postulate, in whatever form it takes, and leaving all the other axioms intact, produces absolute geometry. As the first 28 propositions of Euclid (in The Elements) do not require the use of the parallel postulate or anything equivalent to it, they are all true statements in absolute geometry.\n\nTo obtain a non-Euclidean geometry, the parallel postulate (or its equivalent) must be replaced by its negation. Negating the Playfair's axiom form, since it is a compound statement (... there exists one and only one ...), can be done in two ways. Either there will exist more than one line through the point parallel to the given line or there will exist no lines through the point parallel to the given line. In the first case, replacing the parallel postulate (or its equivalent) with the statement \"In a plane, given a point P and a line not passing through P, there exist two lines through P which do not meet \" and keeping all the other axioms, yields hyperbolic geometry. The second case is not dealt with as easily. Simply replacing the parallel postulate with the statement, \"In a plane, given a point P and a line not passing through P, all the lines through P meet \", does not give a consistent set of axioms. This follows since parallel lines exist in absolute geometry, but this statement says that there are no parallel lines. This problem was known (in a different guise) to Khayyam, Saccheri and Lambert and was the basis for their rejecting what was known as the \"obtuse angle case\". In order to obtain a consistent set of axioms which includes this axiom about having no parallel lines, some of the other axioms must be tweaked. The adjustments to be made depend upon the axiom system being used. Among others these tweaks will have the effect of modifying Euclid's second postulate from the statement that line segments can be extended indefinitely to the statement that lines are unbounded. Riemann's elliptic geometry emerges as the most natural geometry satisfying this axiom.\n\n## Models of non-Euclidean geometry", null, "On a sphere, the sum of the angles of a triangle is not equal to 180°. The surface of a sphere is not a Euclidean space, but locally the laws of the Euclidean geometry are good approximations. In a small triangle on the face of the earth, the sum of the angles is very nearly 180°.\n\nTwo dimensional Euclidean geometry is modelled by our notion of a \"flat plane.\"\n\n### Elliptic geometry\n\nThe simplest model for elliptic geometry is a sphere, where lines are \"great circles\" (such as the equator or the meridians on a globe), and points opposite each other (called antipodal points) are identified (considered to be the same). This is also one of the standard models of the real projective plane. The difference is that as a model of elliptic geometry a metric is introduced permitting the measurement of lengths and angles, while as a model of the projective plane there is no such metric.\n\nIn the elliptic model, for any given line and a point A, which is not on , all lines through A will intersect .\n\n### Hyperbolic geometry\n\nEven after the work of Lobachevsky, Gauss, and Bolyai, the question remained: \"Does such a model exist for hyperbolic geometry?\". The model for hyperbolic geometry was answered by Eugenio Beltrami, in 1868, who first showed that a surface called the pseudosphere has the appropriate curvature to model a portion of hyperbolic space and in a second paper in the same year, defined the Klein model which models the entirety of hyperbolic space, and used this to show that Euclidean geometry and hyperbolic geometry were equiconsistent so that hyperbolic geometry was logically consistent if and only if Euclidean geometry was. (The reverse implication follows from the horosphere model of Euclidean geometry.)\n\nIn the hyperbolic model, within a two-dimensional plane, for any given line and a point A, which is not on , there are infinitely many lines through A that do not intersect .\n\nIn these models the concepts of non-Euclidean geometries are being represented by Euclidean objects in a Euclidean setting. This introduces a perceptual distortion wherein the straight lines of the non-Euclidean geometry are being represented by Euclidean curves which visually bend. This \"bending\" is not a property of the non-Euclidean lines, only an artifice of the way they are being represented.\n\n### Three-dimensional non-Euclidean geometry\n\nIn three dimensions, there are eight models of geometries. There are Euclidean, elliptic, and hyperbolic geometries, as in the two-dimensional case; mixed geometries that are partially Euclidean and partially hyperbolic or spherical; twisted versions of the mixed geometries; and one unusual geometry that is completely anisotropic (i.e. every direction behaves differently).\n\n## Uncommon properties\n\nEuclidean and non-Euclidean geometries naturally have many similar properties, namely those which do not depend upon the nature of parallelism. This commonality is the subject of absolute geometry (also called neutral geometry). However, the properties which distinguish one geometry from the others are the ones which have historically received the most attention.\n\nBesides the behavior of lines with respect to a common perpendicular, mentioned in the introduction, we also have the following:\n\n• A Lambert quadrilateral is a quadrilateral which has three right angles. The fourth angle of a Lambert quadrilateral is acute if the geometry is hyperbolic, a right angle if the geometry is Euclidean or obtuse if the geometry is elliptic. Consequently, rectangles exist (a statement equivalent to the parallel postulate) only in Euclidean geometry.\n• A Saccheri quadrilateral is a quadrilateral which has two sides of equal length, both perpendicular to a side called the base. The other two angles of a Saccheri quadrilateral are called the summit angles and they have equal measure. The summit angles of a Saccheri quadrilateral are acute if the geometry is hyperbolic, right angles if the geometry is Euclidean and obtuse angles if the geometry is elliptic.\n• The sum of the measures of the angles of any triangle is less than 180° if the geometry is hyperbolic, equal to 180° if the geometry is Euclidean, and greater than 180° if the geometry is elliptic. The defect of a triangle is the numerical value (180° - sum of the measures of the angles of the triangle). This result may also be stated as: the defect of triangles in hyperbolic geometry is positive, the defect of triangles in Euclidean geometry is zero, and the defect of triangles in elliptic geometry is negative.\n\n## Importance\n\nNon-Euclidean geometry is an example of a paradigm shift in the history of science. Before the models of a non-Euclidean plane were presented by Beltrami, Klein, and Poincaré, Euclidean geometry stood unchallenged as the mathematical model of space. Furthermore, since the substance of the subject in synthetic geometry was a chief exhibit of rationality, the Euclidean point of view represented absolute authority.\n\nThe discovery of the non-Euclidean geometries had a ripple effect which went far beyond the boundaries of mathematics and science. The philosopher Immanuel Kant's treatment of human knowledge had a special role for geometry. It was his prime example of synthetic a priori knowledge; not derived from the senses nor deduced through logic — our knowledge of space was a truth that we were born with. Unfortunately for Kant, his concept of this unalterably true geometry was Euclidean. Theology was also affected by the change from absolute truth to relative truth in mathematics that was a result of this paradigm shift.\n\nThe existence of non-Euclidean geometries impacted the intellectual life of Victorian England in many ways and in particular was one of the leading factors that caused a re-examination of the teaching of geometry based on Euclid's Elements. This curriculum issue was hotly debated at the time and was even the subject of a play, Euclid and his Modern Rivals, written by Lewis Carroll, the author of Alice in Wonderland.\n\n## Planar algebras\n\nIn analytic geometry a plane is described with Cartesian coordinates : C = {(x,y) : x, y in R}. The points are sometimes identified with complex numbers z = x + y ε where the square of ε is in {−1, 0, +1}. The Euclidean plane corresponds to the case ε2 = −1 since the modulus of z is given by\n\nz z^\\ast = (x + y \\epsilon) (x - y \\epsilon) = x^2 + y^2\n\nand this quantity is the square of the Euclidean distance between z and the origin. For instance, {z : z z* = 1} is the unit circle.\n\nFor planar algebra, non-Euclidean geometry arises in the other cases. When \\epsilon ^2 = +1, then z is a split-complex number and conventionally j replaces epsilon. Then\n\nz z^\\ast = (x + yj) (x - yj) = x^2 - y^2 \\!\n\nand {z : z z* = 1} is the unit hyperbola.\n\nWhen \\epsilon ^2 = 0, then z is a dual number.\n\nThis approach to non-Euclidean geometry explains the non-Euclidean angles: the parameters of slope in the dual number plane and hyperbolic angle in the split-complex plane correspond to angle in Euclidean geometry. Indeed, they each arise in polar decomposition of a complex number z.\n\n## Kinematic geometries\n\nHyperbolic geometry found an application in kinematics with the cosmology introduced by Hermann Minkowski in 1908. Minkowski introduced terms like worldline and proper time into mathematical physics. He realized that the submanifold, of events one moment of proper time into the future, could be considered a hyperbolic space of three dimensions. Already in the 1890s Alexander Macfarlane was charting this submanifold through his Algebra of Physics and hyperbolic quaternions, though Macfarlane did not use cosmological language as Minkowski did in 1908. The relevant structure is now called the hyperboloid model of hyperbolic geometry.\n\nThe non-Euclidean planar algebras support kinematic geometries in the plane. For instance, the split-complex number z = eaj can represent a spacetime event one moment into the future of a frame of reference of rapidity a. Furthermore, multiplication by z amounts to a Lorentz boost mapping the frame with rapidity zero to that with rapidity a.\n\nKinematic study makes use of the dual numbers z = x + y \\epsilon, \\quad \\epsilon^2 = 0, to represent the classical description of motion in absolute time and space: The equations x^\\prime = x + vt,\\quad t^\\prime = t are equivalent to a shear mapping in linear algebra:\n\n\\begin{pmatrix}x' \\\\ t' \\end{pmatrix} = \\begin{pmatrix}1 & v \\\\ 0 & 1 \\end{pmatrix}\\begin{pmatrix}x \\\\ t \\end{pmatrix}.\n\nWith dual numbers the mapping is t^\\prime + x^\\prime \\epsilon = (1 + v \\epsilon)(t + x \\epsilon) = t + (x + vt)\\epsilon.\n\nAnother view of special relativity as a non-Euclidean geometry was advanced by E. B. Wilson and Gilbert Lewis in Proceedings of the American Academy of Arts and Sciences in 1912. They revamped the analytic geometry implicit in the split-complex number algebra into synthetic geometry of premises and deductions.\n\n## Fiction\n\nNon-Euclidean geometry often makes appearances in works of science fiction and fantasy.\n\nProfessor James Moriarty, a character in stories written by Sir Arthur Conan Doyle, is a criminal mastermind with a PhD in non-Euclidean geometries.\n\nIn 1895 H. G. Wells published the short story \"The Remarkable Case of Davidson’s Eyes\". To appreciate this story one should know how antipodal points on a sphere are identified in a model of the elliptic plane. In the story, in the midst of a thunderstorm, Sidney Davidson sees \"Waves and a remarkably neat schooner\" while working in an electrical laboratory at Harlow Technical College. At the story’s close Davidson proves to have witnessed H.M.S. Fulmar off Antipodes Island.\n\nNon-Euclidean geometry is sometimes connected with the influence of the 20th century horror fiction writer H. P. Lovecraft. In his works, many unnatural things follow their own unique laws of geometry: In Lovecraft's Cthulhu Mythos, the sunken city of R'lyeh is characterized by its non-Euclidean geometry. It is heavily implied this is achieved as a side effect of not following the natural laws of this universe rather than simply using an alternate geometric model, as the sheer innate wrongness of it is said to be capable of driving those who look upon it insane.\n\nThe main character in Robert Pirsig's Zen and the Art of Motorcycle Maintenance mentioned Riemannian Geometry on multiple occasions.\n\nIn The Brothers Karamazov, Dostoevsky discusses non-Euclidean geometry through his main character Ivan.\n\nChristopher Priest's novel Inverted World describes the struggle of living on a planet with the form of a rotating pseudosphere.\n\nRobert Heinlein's The Number of the Beast utilizes non-Euclidean geometry to explain instantaneous transport through space and time and between parallel and fictional universes.\n\nAlexander Bruce's Antichamber uses non-Euclidean geometry to create a brilliant, minimal, Escher-like world, where geometry and space follow unfamiliar rules.\n\nIn the Renegade Legion science fiction setting for FASA's wargame, role-playing-game and fiction, faster-than-light travel and communications is possible through the use of Hsieh Ho's Polydimensional Non-Euclidean Geometry, published sometime in the middle of the twenty-second century." ]
[ null, "http://read.images.worldlibrary.org/App_Themes/pg/images/logo.jpg", null, "http://read.images.worldlibrary.org/images/SmallBook.gif", null, "http://gutenberg.us/images/delete.jpg", null, "http://gutenberg.us/App_Themes/default/images/icon_new_window.gif", null, "http://images.worldlibrary.net/articles/eng/File:Noneuclid.svg", null, "http://images.worldlibrary.net/articles/eng/File:Triangles_(spherical_geometry).jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.91442996,"math_prob":0.9062189,"size":37161,"snap":"2020-34-2020-40","text_gpt3_token_len":8805,"char_repetition_ratio":0.16955082,"word_repetition_ratio":0.05126877,"special_character_ratio":0.22214149,"punctuation_ratio":0.12455304,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9887419,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,6,null,10,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-28T13:43:07Z\",\"WARC-Record-ID\":\"<urn:uuid:39f25386-17ab-498f-9e1a-ccbabfc82eb1>\",\"Content-Length\":\"204755\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a17db0b7-8233-4aa1-bcff-bd958c532e00>\",\"WARC-Concurrent-To\":\"<urn:uuid:a9a90d75-e14a-4d90-9915-258cb66a3909>\",\"WARC-IP-Address\":\"66.27.42.21\",\"WARC-Target-URI\":\"http://gutenberg.us/articles/eng/Non-Euclidean_geometry\",\"WARC-Payload-Digest\":\"sha1:PCUM5W3MXCQBTKYO7YNN62RJL77JHS22\",\"WARC-Block-Digest\":\"sha1:YKKYHZAMVBHSKJCVTFRGHIP2A5GILJWP\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600401600771.78_warc_CC-MAIN-20200928104328-20200928134328-00125.warc.gz\"}"}
http://www.ulisp.com/show?2L0C
[ "The Lisp Badge is a self-contained computer with its own display and keyboard, based on an ATmega1284, that you can program in uLisp:", null, "You can use it to run programs that interface to components such as LEDs and push-buttons via the I/O pins, read the analogue inputs, and operate external devices via the I2C and SPI interfaces. It has a greyscale OLED display that gives 8 lines of 42 characters, and an integrated 45-key keyboard optimised for Lisp.\n\nFor details of how to build one see Lisp Badge on Technoblogy.\n\nGet the latest firmware from Lisp Badge on GitHub.\n\n10th July 2020: The Lisp Badge firmware has now been updated to Version 3, which adds the following improvements: uLisp is now updated to uLisp AVR Version 3.3a; three additional plotting extensions have been added, fill-screen, plot-pixel, and glyph-pixel; the keyboard now supports entering three additional characters needed by Lisp; and the piezo speaker can now be used with the note function to play tunes. These improvements are described in greater detail below.\n\n23rd January 2022: The Lisp Badge firmware has now been updated to Version 4.1a. This adds a register function that allows you to read the values of 8-bit peripheral registers, or write values to the registers. It allows you to control the peripherals in the processor from a Lisp program, or interactively experiment with the peripherals by giving commands at the uLisp prompt; see the examples below.\n\n22nd September 2022: The Lisp Badge firmware is now at Version 4.3, which adds support for arrays, and built-in documentation.\n\n### Specification\n\nSize: 107mm x 61mm (4.2\" x 2.4\").\n\nDisplay: 42 characters x 8 lines.\n\nKeyboard: Integrated 45-key keyboard providing upper and lower-case characters, digits, and the symbols required by uLisp. Three additional characters can be entered using SHIFT: '~' (SHIFT-ESC), '%' (SHIFT-DEL), and ':' (SHIFT-Enter).\n\nMemory available: 2816 Lisp cells (11264 bytes).\n\nEEPROM: 1024 Lisp cells (4096 bytes), allows you to save the Lisp workspace using save-image.\n\nProcessor: ATmega1284P\n\nClock speed: 16 MHz.\n\nCurrent consumption: Approx. 20 mA.\n\n#### Language\n\nuLisp, a subset of Common Lisp, with 155 Lisp functions and special forms. For a full definition see uLisp Language Reference.\n\nThe language includes four graphics extensions: fill-screen for clearing the screen, plot-pixel for plotting pixels, and plot and plot3d, for plotting graphs and 3d functions. For more information see Plotting extensions below.\n\nTypes supported: list, symbol, integer, character, string, and stream.\n\nAn integer is a sequence of digits, optionally prefixed with \"+\" or \"-\". Integers can be between -32768 and 32767. You can enter numbers in hexadecimal, octal, or binary with the notations #x2A, #o52, or #b101010, all of which represent 42.\n\nUser-defined symbol names can have arbitrary names. Any sequence that isn't an integer can be used as a symbol; so, for example, 12a is a valid symbol.\n\nThere is one namespace for functions and variables; in other words, you cannot use the same name for a function and a variable.\n\nIncludes a mark and sweep garbage collector. Garbage collection takes 5 msec.\n\n#### Interfaces\n\nThese interfaces are brought to headers at the edge of the Lisp Badge board. The numbers in brackets refer to Arduino pin numbers:\n\n• Four analogue input pins using analogread: A0 to A3 (24 to 27) plus VCC and GND.\n• Two analogue outputs using analogwrite: MISO (6), and SCK (7).\n• Digital input and output using pinmode, digitalread, and digitalwrite: MOSI (5), MISO (6), SCK (7), RX0 (8), TX0 (9), SCL (16), SDA (17), and A0 to A3 (24 to 27)\n• I2C interface using with-i2c and restart-i2c: SCL (16) and SDA (17).\n• SPI interface using with-spi: MOSI (5), MISO (6), and SCK (7).\n• Serial interface (FTDI) using with-serial: RX0 (8) and TX0 (9).\n\nThe shift key can be used as a digital input: SHIFT (23).\n\nSCK (7) is connected to an LED on the front panel. This is an analogue output pin, so you can vary the brightness of the LED.\n\nA piezo speaker is connected to pin 4. It is used for the #\\Bell character, and can be used to play tunes with the uLisp note function.\n\n### Playing tunes\n\nThe uLisp note functions can now be used to play tunes on the Lisp Badge piezo speaker, which is on pin 4. For example, the following function scale plays the scale of C:\n\n```(defun scale ()\n(mapc\n(lambda (n) (note 4 n 4) (delay 500))\n'(0 2 4 5 7 9 11 12))\n(note))```\n\nThanks to Thomas Fitzsimmons for developing the modifications to the Lisp Badge that enable note to work correctly.\n\n### Plotting extensions\n\nThe Lisp Badge contains the following five plotting extensions, designed to allow plotting to the greyscale graphics display.\n\nAfter generating a plot, plot and plot3d wait for the ESC key to be pressed before displaying the uLisp prompt.\n\n### fill-screen function\n\nSyntax: `(fill-screen [pixel])`\n\nClears the screen to black, or fills it with a specified pixel value.\n\nFor example, the following command fills the screen with 50% grey:\n\n`(fill-screen #x77)`\n\n### plot-pixel function\n\nSyntax: `(plot-pixel x y [pixel])`\n\nPlots a pixel to the specified x,y coordinates, where x should be 0 to 127 and y should be 0 to 63.\n\nBecause of the way that the display memory is mapped to the display, plot-pixel plots two adjacent pixels with an x resolution of 128. The third parameter pixel specified the colours of the two pixels; if omitted it defaults to #xFF which gives two adjacent white pixels.\n\nFor example, to plot a 2x1 white pixel to the top right-hand corner of the screen give the command:\n\n`(plot-pixel 127 63)`\n\nTo plot a 1x1 grey pixel to the top right-hand corner of the screen give the command:\n\n`(plot-pixel 127 63 #x07)`\n\n### glyph-pixel function\n\nSyntax: `(glyph-pixel char x y)`\n\nReturns the pixel value from the 6x8 bitmap for character char, where x can be from 0 to 5 and y can be from 0 to 7.\n\nFor example, the following function prints a character pixel by pixel:\n\n```(defun test (ch)\n(dotimes (y 8)\n(dotimes (x 6)\n(princ (if (= (glyph-pixel ch x (- 7 y)) 15) #\\* #\\space)))\n(terpri)))```\n\nTrying it out:\n\n```> (test #\\R)\n****\n* *\n* *\n****\n* *\n* *\n* * ```\n\nThe glyph-pixel function lets you plot giant characters on the display. For example, the following demo uses glyph-pixel and plot3d to display a banner in characters four times the normal size:\n\n```(defun message (x y)\n(let* ((text \"Hello from Lisp Badge \")\n(c (+ (truncate x 24) (* 11 (truncate (- 63 y) 32))))\n(ch (char text c))\n(px (mod (truncate x 4) 6))\n(py (mod (truncate (- 63 y) 4) 8)))\n(glyph-pixel ch px (- 7 py))))```\n\nEntering:\n\n`(plot3d message)`\n\nwill plot:", null, "### plot function\n\nSyntax: `(plot [x-intercept y-intercept] [function]...)`\n\nPlots up to four functions on the same graph, optionally with axes.\n\nEach function should be a function of one parameter, the x coordinate, and it will be called with each value of x from 0 to 255. The function should return the y value, from 0 to 63.\n\nIf x-intercept and y-intercept are specified, plot3d draws axes through those intercepts.\n\nFor example, defining:\n\n```(defun sine ()\n(let ((x 0) (y 2045))\n(lambda (n)\nn\n(incf x (/ (* y 16) 163))\n(decf y (/ (* x 16) 163))\n(+ 32 (ash x -6)))))```\n\nthe following command:\n\n`(plot 0 32 (sine))`\n\nwill plot:", null, "#### Plotting multiple functions\n\nThe following example plots the voltages on the analogue inputs 0 to 3 once a second on a single plot. First define:\n\n`(defun adc (n) (lambda (x) (delay 250) (/ (analogread n) 8)))`\n\nThen give the command:\n\n`(plot 0 0 (adc 0) (adc 1) (adc 2) (adc 3))`\n\n### plot3d function\n\nSyntax: `(plot3d [x-intercept y-intercept] [function])`\n\nThe function should be a function of two parameters, the x and y coordinates, and it will be called with each value of x from 0 to 255 and y from 0 to 63. The function should return the greyscale value to be plotted, from 0 to 15.\n\nIf x-intercept and y-intercept are specified, plot3d draws axes through those intercepts.\n\nFor example, defining:\n\n```(defun p (x y)\n(let ((a (/ (- x 128) 2))\n(b (- y 32)))\n(min (abs (- (logand (/ (+ (* a a) (* b b) (* a b)) 16) 31) 15)) 15)))```\n\nthe following command:\n\n`(plot3d 128 32 p)`\n\nwill plot:", null, "### Programming peripheral registers\n\nThe Version 4.1a of uLisp includes a register function that allows you to read the values of 8-bit peripheral registers, or write values to the registers. It allows you to control the peripherals in the processor from a Lisp program, or interactively experiment with the peripherals by giving commands at the uLisp prompt.\n\nHere are some examples of its use on the Lisp badge.\n\nFor the first example we will blink the built-in LED on the Arduino Uno board by directly accessing the port it's connected to, without using the usual pinmode and digitalwrite functions.\n\nThe LED on the Lisp Badge is connected to bit 7 in port B, so the code is as follows:\n\n```(defun blink ()\n(let ((led (ash 1 7)))\n(register :ddrb (logior (register :ddrb) led))\n(loop\n(register :portb (logior (register :portb) led))\n(delay 1000)\n(register :portb (logand (register :portb) (lognot led)))\n(delay 1000))))```\n\nRun it by typing:\n\n`(blink)`\n\nExit from the program by entering ~.\n\n#### Controlling a timer\n\nThe next example programs a timer to flash an LED once a second. We will use the ATmega1284P Timer/Counter3, which fortuitously can generate waveforms on the I/O pin connected to the Lisp Badge LED. The example is essentially the same as the one described here in Programming AVR registers, except using Timer/Counter3 rather than Timer/Counter1.\n\nHere's the code for the Lisp Badge:\n\n```(defvar *tccr3a* #x90)\n(defvar *tccr3b* #x91)\n(defvar *ocr3al* #x98)\n(defvar *ocr3ah* #x99)\n(defvar *divisor* 15624)\n\n(defun timer ()\n(register :ddrb (logior (register :ddrb) #b10000000))\n(register *tccr3a* #b00010000)\n(register *tccr3b* #b00001101)\n(register *ocr3ah* (ash *divisor* -8))\n(register *ocr3al* (logand *divisor* #xff)))```\n\nProgram the timer by typing:\n\n`(timer)`\n\nUnlike in the previous blink example, the LED will continue flashing independently of what your Lisp program is doing until you reset the processor.\n\nThe register function allows you to interactively experiment with the peripherals by giving commands at the uLisp prompt. For example, try the effect of changing the Timer/Counter1 prescaler to 256 with:\n\n`(register *tccr3b* #b00001100)`\n\nTo turn off the LED evaluate:\n\n`(register *tccr3a* 0)`" ]
[ null, "http://www.ulisp.com/pictures/3j/lispbadgehand.jpg", null, "http://www.ulisp.com/pictures/3j/lisphello.jpg", null, "http://www.ulisp.com/pictures/3j/lispsine.jpg", null, "http://www.ulisp.com/pictures/3j/lispellipses.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7753398,"math_prob":0.85619134,"size":10198,"snap":"2023-40-2023-50","text_gpt3_token_len":2721,"char_repetition_ratio":0.12173828,"word_repetition_ratio":0.11361015,"special_character_ratio":0.28162384,"punctuation_ratio":0.11649016,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9709762,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,4,null,2,null,7,null,7,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-23T22:13:38Z\",\"WARC-Record-ID\":\"<urn:uuid:96a51c17-750b-49fe-aeff-92b232ab3439>\",\"Content-Length\":\"27509\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:61a60842-d897-4790-b658-63e311a4171d>\",\"WARC-Concurrent-To\":\"<urn:uuid:3453ea23-0703-467d-97d9-ecf3267bd5ec>\",\"WARC-IP-Address\":\"80.248.178.40\",\"WARC-Target-URI\":\"http://www.ulisp.com/show?2L0C\",\"WARC-Payload-Digest\":\"sha1:4YQ2UQM5NQ6WGO66WITS7X6TME5YGPJ3\",\"WARC-Block-Digest\":\"sha1:FR5PBH2ATXFOC2AR5NU62ZEYJMGZRZQQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506528.3_warc_CC-MAIN-20230923194908-20230923224908-00006.warc.gz\"}"}
http://blog.itpub.net/638844/viewspace-1062170/
[ "# Oracle取随机数函数\n\nThe basic function gets a random number, greater than or equal to 0 and less than 1, with 38 digits to the right of the decimal (38-digit precision).\nAlternatively, you can get a random Oracle number x, where x is greater than or equal to low and less than high.\n\nSELECT DBMS_RANDOM.VALUE,DBMS_RANDOM.VALUE(1,100) FROM DUAL;", null, "• 博文量\n102\n• 访问量\n900146" ]
[ null, "http://img.blog.itpub.net/blog/attachment/201312/4/638844_13861399962l2e.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.60506034,"math_prob":0.9986342,"size":412,"snap":"2019-35-2019-39","text_gpt3_token_len":132,"char_repetition_ratio":0.09803922,"word_repetition_ratio":0.036363635,"special_character_ratio":0.2815534,"punctuation_ratio":0.16091955,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9518352,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-17T17:05:34Z\",\"WARC-Record-ID\":\"<urn:uuid:a928a488-8cea-40dd-9785-f43a24e4c861>\",\"Content-Length\":\"22490\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6fc2ad36-9312-42d1-9854-e768e0446b38>\",\"WARC-Concurrent-To\":\"<urn:uuid:7d41d92e-1b01-4f5f-ad47-1873b97078c5>\",\"WARC-IP-Address\":\"122.226.187.15\",\"WARC-Target-URI\":\"http://blog.itpub.net/638844/viewspace-1062170/\",\"WARC-Payload-Digest\":\"sha1:N6OB5VTBFU7A7A62JC2QBPVD5TAM6VMO\",\"WARC-Block-Digest\":\"sha1:O44QM3DQPB2GWW7SPB2QSX5UETHPTL6D\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514573098.0_warc_CC-MAIN-20190917161045-20190917183045-00277.warc.gz\"}"}
https://ccm.net/faq/2762-concatenate-vectors-or-matrices-under-matlab
[ "", null, "0\nThanks\n\nA few words of thanks would be greatly appreciated.\n\nConcatenate vectors or matrices under Matlab\n\nThe operation to concatenate vectors or matrices under MATLAB is defined as a combination of the variables in a single vector or matrix. There are two types of concatenation operation - horizontal and vertical concatenation. For horizontal concatenation,two variables should have the same number of rows. In case of vertical concatenation,two variables should have the same number of columns. Every available variable cannot be concatenated. Concatenation operations with multiple variables in MATLAB software are possible as well, as one vector can be concatenated with the transpose of the same vector. It is possible to concatenate vectors or matrices under MATLAB in a logical way.", null, "Concatenation of variables in Matlab is defined as the combination of these variables in a single vector or matrix.\n\nExample:\n\n| 2 3 4 |\nX = | 1 2 5 |\n| 0 2 7 |\n\nWith:\n| 9 6 8 |\nY = | 5 6 2 |\n| 3 2 1 |\n\nConcatenation of rows:\n| 9 6 8 2 3 4 |\nResult = | 1 2 5 5 6 2 |\n| 0 2 7 3 2 1 |\n\nConcatenation of columns:\n\n| 2 3 4 |\n| 1 2 5 |\n| 0 2 7 |\nResult = | 9 6 8 |\n| 5 6 2 |\n| 3 2 1 |\n\nHorizontal concatenation\n\nHorizontal concatenation can be done using vectors, matrices or simple variables. The two variables (X and Y) must have the same number of rows. The code is as follows:\n\nResult = [X Y]\n\nVertical concatenation\n\nVertical concatenation can be done using vectors, matrices or simple variables. The two variables (X and Y) must have the same number of columns. The code is as follows:\n\nResult = [X, Y]\n\nFurther calculations\n\n• Option 1\n\nYou can concatenate a row with a column, transposing a row as a column or vice versa. For example:\n\nX = | 1 2 |\n\n| 2 |\nY = | 3 |\n| 5 |\n\nUsing the command:\n\nResult = [X Y]\n\nResult = | 1 2 2 3 5 |\n\nUsing the command:\n\nResult = [X ', Y]\n\n| 1 |\n| 2 |\nResult = | 2 |\n| 3 |\n| 5 |\n• Option 2\n\nYou can extend this principle to cover multiple variables. For example. Using the following set of variable:\nA = 1\nB = 2\nC = | 3 4 |\n| 5 6 |\nD = 7\nE = | 8 9 |\n\nThe command:\nResult = [[A;B] C;D E]\n\n| 1 3 4 |\nResult = | 2 5 6 |\n| 7 8 9 |\n0\nThanks\n\nA few words of thanks would be greatly appreciated.", null, "CCM is a leading international tech website. Our content is written in collaboration with IT experts, under the direction of Jeff Pillou, founder of CCM.net. CCM reaches more than 50 million unique visitors per month and is available in 11 languages." ]
[ null, "https://akm-static.ccmbg.com/a/aHR0cDovL2NjbS5uZXQvZmFxLzI3NjItY29uY2F0ZW5hdGUtdmVjdG9ycy1vci1tYXRyaWNlcy11bmRlci1tYXRsYWI=/alpha.png", null, "https://img-16.ccm2.net/7My5gEjl8m2rNJWdeotDRazbDx8=/5244c32bbf0e46f1863cbc58a98f8ecd/ccm-faq/2762-matlab-logo-s-.png", null, "https://astatic.ccmbg.com/www.commentcamarche.net//_skin/assets/img/author/jeff.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87275815,"math_prob":0.9826118,"size":1008,"snap":"2019-43-2019-47","text_gpt3_token_len":186,"char_repetition_ratio":0.17430279,"word_repetition_ratio":0.09589041,"special_character_ratio":0.17460318,"punctuation_ratio":0.11046512,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98242766,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,2,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-21T13:19:21Z\",\"WARC-Record-ID\":\"<urn:uuid:3583739e-0a56-4788-94f6-623e49080b5d>\",\"Content-Length\":\"69288\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:eea22e43-f867-4725-bab2-b9cd3ec61b2f>\",\"WARC-Concurrent-To\":\"<urn:uuid:3f8fef8f-ce3e-49d2-895a-fa73b114a263>\",\"WARC-IP-Address\":\"104.106.247.29\",\"WARC-Target-URI\":\"https://ccm.net/faq/2762-concatenate-vectors-or-matrices-under-matlab\",\"WARC-Payload-Digest\":\"sha1:WII5ZUFKDLZVWLUDGN7W5WLW4PFA2COA\",\"WARC-Block-Digest\":\"sha1:QK3SVDQHOHHZFLCCEWWJFUFLHSD7Z54X\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570987773711.75_warc_CC-MAIN-20191021120639-20191021144139-00144.warc.gz\"}"}
https://www.numwords.com/words-to-number/en/1035
[ "NumWords.com\n\n# How to write One thousand thirty-five in numbers in English?", null, "We can write One thousand thirty-five equal to 1035 in numbers in English\n\n< One thousand thirty-four :||: One thousand thirty-six >\n\nTwo thousand seventy = 2070 = 1035 × 2\nThree thousand one hundred five = 3105 = 1035 × 3\nFour thousand one hundred forty = 4140 = 1035 × 4\nFive thousand one hundred seventy-five = 5175 = 1035 × 5\nSix thousand two hundred ten = 6210 = 1035 × 6\nSeven thousand two hundred forty-five = 7245 = 1035 × 7\nEight thousand two hundred eighty = 8280 = 1035 × 8\nNine thousand three hundred fifteen = 9315 = 1035 × 9\nTen thousand three hundred fifty = 10350 = 1035 × 10\nEleven thousand three hundred eighty-five = 11385 = 1035 × 11\nTwelve thousand four hundred twenty = 12420 = 1035 × 12\nThirteen thousand four hundred fifty-five = 13455 = 1035 × 13\nFourteen thousand four hundred ninety = 14490 = 1035 × 14\nFifteen thousand five hundred twenty-five = 15525 = 1035 × 15\nSixteen thousand five hundred sixty = 16560 = 1035 × 16\nSeventeen thousand five hundred ninety-five = 17595 = 1035 × 17\nEighteen thousand six hundred thirty = 18630 = 1035 × 18\nNineteen thousand six hundred sixty-five = 19665 = 1035 × 19\nTwenty thousand seven hundred = 20700 = 1035 × 20\n\nSitemap" ]
[ null, "https://www.numwords.com/images/1035-words-to-number-en.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7744373,"math_prob":0.99888116,"size":1279,"snap":"2020-45-2020-50","text_gpt3_token_len":396,"char_repetition_ratio":0.32,"word_repetition_ratio":0.0,"special_character_ratio":0.4073495,"punctuation_ratio":0.025,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9989479,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-01T05:15:07Z\",\"WARC-Record-ID\":\"<urn:uuid:51ce9b7d-4e13-497d-9c66-1d72f978bd2b>\",\"Content-Length\":\"5619\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1e98383b-c34f-4e60-a457-ee12d942bd53>\",\"WARC-Concurrent-To\":\"<urn:uuid:06f3c860-64b2-479a-8b00-d21e4aa2e683>\",\"WARC-IP-Address\":\"68.66.224.32\",\"WARC-Target-URI\":\"https://www.numwords.com/words-to-number/en/1035\",\"WARC-Payload-Digest\":\"sha1:PAY2ZVTAD5ZOZJDH54KVKTKJJUZ5FLJK\",\"WARC-Block-Digest\":\"sha1:VJOZH4GUUCZEJZKHH5QIK5CCQX6JPKRM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141652107.52_warc_CC-MAIN-20201201043603-20201201073603-00557.warc.gz\"}"}
https://developer.download.nvidia.com/cg/sqrt.html
[ "", null, "Cg 3.1 Toolkit Documentation Cg / Standard Library / sqrt\n\n## Name\n\nsqrt - returns square root of scalars and vectors.\n\n## Synopsis\n\n```float sqrt(float a);\nfloat1 sqrt(float1 a);\nfloat2 sqrt(float2 a);\nfloat3 sqrt(float3 a);\nfloat4 sqrt(float4 a);\n\nhalf sqrt(half a);\nhalf1 sqrt(half1 a);\nhalf2 sqrt(half2 a);\nhalf3 sqrt(half3 a);\nhalf4 sqrt(half4 a);\n\nfixed sqrt(fixed a);\nfixed1 sqrt(fixed1 a);\nfixed2 sqrt(fixed2 a);\nfixed3 sqrt(fixed3 a);\nfixed4 sqrt(fixed4 a);\n```\n\n## Parameters\n\na\nVector or scalar of which to determine the square root.\n\n## Description\n\nReturns the square root of a.\n\nFor vectors, the returned vector contains the square root of each element of the input vector.\n\nThe square root of zero is zero.\n\nIdeally, the square root of negative values returns NaN (Not a Number).\n\nsqrt often implemented as the reciprocal of a reciporcal squrare root approximation in older profiles.\n\n## Reference Implementation\n\nsqrt is best implemented as a native square root instruction, however sqrt may be implemented via a rsqrt function:\n\n```float3 sqrt(float3 a)\n{\nreturn 1.0 / rsqrt(a);\n}\n```\n\n## Profile Support\n\nsqrt is fully supported in all profiles unless otherwise specified. sqrt is unsupported in the fp20 profile.", null, "| Cg Toolkit | Download | Release Archive | Profiles | Reference | Books | Discussions |" ]
[ null, "https://developer.download.nvidia.com/cg/CgFX_24.png", null, "https://developer.download.nvidia.com/cg/CgFX_24.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5402852,"math_prob":0.9700231,"size":1159,"snap":"2019-51-2020-05","text_gpt3_token_len":294,"char_repetition_ratio":0.19307359,"word_repetition_ratio":0.0,"special_character_ratio":0.24676445,"punctuation_ratio":0.14222223,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9895062,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-27T08:21:40Z\",\"WARC-Record-ID\":\"<urn:uuid:374a201d-9e1c-47ce-a3a3-c5483e6220d9>\",\"Content-Length\":\"15413\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d03f61c9-ba50-45c4-aeee-2404916abb91>\",\"WARC-Concurrent-To\":\"<urn:uuid:8683f4d6-d388-4fb6-ac53-786b424a639a>\",\"WARC-IP-Address\":\"192.229.211.70\",\"WARC-Target-URI\":\"https://developer.download.nvidia.com/cg/sqrt.html\",\"WARC-Payload-Digest\":\"sha1:Q2PZCHTAQRZF7WULHL36NO7R5WJBWE4R\",\"WARC-Block-Digest\":\"sha1:U6KZANRRLLZK2L2KDY325PMUXGOHFZ6I\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251696046.73_warc_CC-MAIN-20200127081933-20200127111933-00477.warc.gz\"}"}
https://www.kidpid.com/ask/topic/what-is-gravitational-constant/
[ "community around the world.\n\nYour Learning Partner Discussion Science & Technology What is gravitational constant ?\n\n• # What is gravitational constant ?\n\n2Members · 2 Posts\n• ### Edutuber mallu\n\nMember\nMay 10, 2021 at 11:34 am\n\nWhat is gravitational constant ? What is its importance ?\n\n• ### Parul\n\nMember\nJune 28, 2021 at 4:18 pm\n0\n\nWhat is the Gravitational Constant?\n\nThe gravitational constant is the compatible constant used in Newton’s Law of Universal Gravitation, and is habitually indicated by G. The force of appeal between any two-part masses divided by a unit distance is called universal gravitational constant indicated by G determined in Nm2/kg2. It is a factual physical constant exercise in gravitational physics. It is also called Newton’s Constant.\n\nThe worth of the gravitational constant is the identical all over the universe. The value of G is distinct from g, which indicates the acceleration due to gravity. This is different from g, which indicates the acceleration because of gravity. We see it expressed as:\n\nG = 6.673×10-11 N m2 kg-2\n\nIt is constantly used in the equation:\n\nF = (G x m1 x m2) / r2 , wherein\n\nF = force of gravity\n\nG = gravitational constant\n\nm1 = mass of the first object\n\nm2 = mass of the second object\n\nr = the detachment between the two masses\n\nAs with all constants in Physics, the gravitational constant is an actual value. It is confirmed through a sequence of experiments and following observations.\n\nAlthough the gravitational constant was initial inaugurated by Isaac Newton as part of his favoured publication in 1687, the Philosophiae Naturalis Principia Mathematica. It’s mainly like this in physics. The mathematical mostly lead up to the experimental evidence.\n\nImportance of Gravitational Constant\n\nThe constant, G, controls the strength of Newton’s reverse square law in a specific system of physical units and is, not amazingly, known as Newton’s constant of gravitation. It is contemplated to be a foundational constant of nature. The present-day value for G in the 2010 CODATA advocated values of the basic physical constants is the best approximate given the exploratory solution accessible at that time and is G=6.67384(80) ×10−11 kg−1 m3 s−2.\n\nViewing 1 - 2 of 2 replies" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9187918,"math_prob":0.90275717,"size":2205,"snap":"2021-43-2021-49","text_gpt3_token_len":497,"char_repetition_ratio":0.18991368,"word_repetition_ratio":0.02770083,"special_character_ratio":0.22811791,"punctuation_ratio":0.0990099,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98924744,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-17T13:33:05Z\",\"WARC-Record-ID\":\"<urn:uuid:4d09557f-93a8-4f36-b7f6-b9c856a53d54>\",\"Content-Length\":\"187386\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3e1019a2-ece8-4c47-abd9-3277caf0203d>\",\"WARC-Concurrent-To\":\"<urn:uuid:4f3bb301-c5c7-4447-8fb5-7561ce5622df>\",\"WARC-IP-Address\":\"157.245.99.35\",\"WARC-Target-URI\":\"https://www.kidpid.com/ask/topic/what-is-gravitational-constant/\",\"WARC-Payload-Digest\":\"sha1:HDKCOHPAOCHOOQBD6NDUWE6JZXL7YKUW\",\"WARC-Block-Digest\":\"sha1:FN25D3IBO5M3O3WSJYOIFGTJGUWXJIMJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585177.11_warc_CC-MAIN-20211017113503-20211017143503-00419.warc.gz\"}"}
https://dennishodgson.blogspot.com/2018/09/
[ "## Wednesday, 12 September 2018\n\n### the right angle\n\nIt is often said that there are no right angles in nature, but this is not strictly true. Of course, there are no animals or plants with square corners, but the human visual field is determined by two lines that intersect at 90 degrees: the horizontal, as defined by the horizon (if you live on the coast or are aboard a ship at sea); and the vertical, as defined by gravity. The need to define these lines started when humans began to build structures in brick and stone.\n\nDefining the vertical is easy—a plumb line does that job—but in order to define what is horizontal, it is necessary, somehow, to produce a right angle. The first civilization to do this was probably Sumer in the third millennium BC, but both the Babylonians and the Egyptians were able to construct right-angle triangles around 4,000 years ago. While the Egyptians used only the 3:4:5 triangle, they may have been aware of other number combinations, but the Babylonians certainly knew other ratios, which they calculated using a sexagesimal (base 60) system of arithmetic. This strikes me as being a seriously unwieldy way to perform calculations, but it’s why there are sixty seconds in a minute and sixty minutes in an hour, so it must have had some benefits.\n\nMost people will be familiar with the theorem of Pythagoras—possibly the most famous theorem in the whole of mathematics—which states that in a right-angle triangle, the square on the hypotenuse is equal to the sum of the squares on the other two sides, as in this diagram, which illustrates the simplest of the ratios (3:4:5) that produce right-angle triangles:\n\nHowever, I wondered whether I could work out any other ‘Pythagorean triples’. I already knew that the ratio 5:12:13 produced a right-angle triangle, but were there any more? That question turned out to be surprisingly easy to answer. First, it is not possible for the smallest value to be 2 or 4, and if the smallest value is 6, then the only combination that works is 6:8:10, in which the three numbers are not coprime (they have a common factor, 2). In other words, 6:8:10 is simply a multiple of 3:4:5 and therefore doesn’t count as a separate Pythagorean triple.\n\nOn the other hand, if I set the value of the smallest term at 7, then it’s straightforward to find two consecutive numbers, the squares of which have a difference of 49. At this point, I noticed that while the increases in the value of the smallest term were linear (3, 5, 7), the other terms increased more rapidly. Thus, 4, 12, 24. Could the middle term in the next triple be 40? It is. The left-hand column in the following table illustrates how far I went in identifying further triples, first calculating the appropriate values using the method I’ve just outlined, then confirming that the calculated values fitted the formula using the time-honoured method of long multiplication on the back of an envelope.\n\nIt seems to me that this is a series that will continue to infinity, and I could say the same about the right-hand column in the table, in which the difference between the two larger numbers is 2. This one works only when the smallest number is divisible by 4, because where the smallest number is divisible only by 2, the result is a multiple of one of the ratios in the left-hand column.\n\nThis is where things get more difficult. When I tried to find a ratio where the difference between the two largest numbers is 3, all I could come up with was multiples of other ratios that I’d previously discovered. At this point, I remembered that Jacob Bronowski had quoted, incredulously, the ratio 3367:3456:4825 in his landmark BBC TV series on the history of science, The Ascent of Man, as an indicator of the arithmetical prowess of the Babylonians 4,000 years ago. My first reaction was that this must be a multiple of a primitive Pythagorean triple, but I was amazed to find that the three terms are coprime (one of the prime factors of 4825 is 193).\n\nThis must have taken some calculating! It is clearly a primitive Pythagorean triple, but it immediately occurs to me that it may be part of a series like the simpler ratios described above. It was time to see what the internet had to say on the subject. The first page of my search included the statement that there are 16 Pythagorean triples in which the value representing the hypotenuse is less than 100. I’d already identified nine of these in the table above; here are the other seven:\n\nI spotted immediately that the difference between the two larger numbers in the second and fourth ratios is 8, so I wondered whether they were part of the same sequence. They are, and this is another sequence that I’m assuming continues to infinity.\n\nNotice that the difference between the two larger numbers in the first of these two tables is also 8, but the difference between the two smaller numbers is just 1, meaning that it is not part of the same sequence. However, it is difficult to identify a sequence from just one triple, especially when that triple is as large as the Babylonian example cited above.\n\nI’ve concentrated so far on triangles where the values representing all three sides are integers, but there is what I assume to be an even larger category of Pythagorean triples involving irrational numbers. For example, if the lengths of the two sides enclosing the right angle are 2 and 3, respectively, then the length of the hypotenuse is the square root of 13, which is irrational (meaning that it cannot be represented by a fraction).\n\nThe general conclusion that I draw from my investigations is that there are an infinite number of ratios that meet the Pythagorean criteria, but I’m unable to explain why this particular juxtaposition of squares produces a right angle, or even what is special about 90 degrees that makes it the right angle.\n\n## Sunday, 2 September 2018\n\n### carved in stone\n\nWhen we say that something is ‘carved in stone’, we are suggesting that it’s unchanging, that it’s the accepted way of doing things. However, I’d like to suggest that in the real world, with real stone, things that get carved into stone are eventually forgotten, and to emphasize the point, I’ve compiled a short quiz involving examples of stone carving in my home town, where the ubiquitous building material until the end of the nineteenth century was a red desert sandstone (Penrith sandstone).\n\nIf you are a casual visitor to the town, you may think that trying to find all of these examples would be an interesting way to spend an afternoon, but I should warn you that I suspect that not many Penrithians would know where they are all located, and not all are in the town centre. Most of the images are small, which should tell you that you will need to look up to see most of these carvings.\n\nWhere is the British School, built in 1847?\n\nWhere is the Primitive Methodist Chapel, built in 1837?\n\nWhere is the Infant School, built in 1833?\n\nAnd where is Wigan Terrace?\n\nAnother apparent street name is Inglewood Terrace, although you won’t find either on any street map or directory. This name has been carved directly into the building:\n\nThe next image is a coat of arms:\n\n…while the next carving is also vaguely heraldic:\n\nAnd now for some dates:\n\nYou may guess that the building identifying itself as a bank in the next photo no longer functions in that capacity:\n\nHere are two more conventionally sculptural carvings:\n\nFinally, where is this elaborate decorative carving above a doorway?\n\nThere are no prizes for locating these eighteen examples, although if you think you know them, do leave a comment." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.96320707,"math_prob":0.9228036,"size":8943,"snap":"2020-45-2020-50","text_gpt3_token_len":1971,"char_repetition_ratio":0.12081888,"word_repetition_ratio":0.2996805,"special_character_ratio":0.21648216,"punctuation_ratio":0.10427066,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9630905,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-20T20:38:20Z\",\"WARC-Record-ID\":\"<urn:uuid:64f77e86-345b-4fc9-86e1-4589d421dd1d>\",\"Content-Length\":\"105537\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:99176a84-92a4-4922-af8b-0551eb88a4cd>\",\"WARC-Concurrent-To\":\"<urn:uuid:9633b37c-dbdc-40db-8b85-cdc7cd7a4a67>\",\"WARC-IP-Address\":\"172.217.7.193\",\"WARC-Target-URI\":\"https://dennishodgson.blogspot.com/2018/09/\",\"WARC-Payload-Digest\":\"sha1:CUF7VBFFPQOH33XU7JFVUUYBCUZ722WC\",\"WARC-Block-Digest\":\"sha1:VSPBOYNLBBE6JGGEIXKPNOHBTOHS4AUW\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107874135.2_warc_CC-MAIN-20201020192039-20201020222039-00323.warc.gz\"}"}