mv: ‘./input-file.zip’ and ‘./input-file.zip’ are the same file Creating study carrel named subject-terrorism-gutenberg Initializing database Unzipping Archive: input-file.zip creating: ./tmp/input/input-file/ inflating: ./tmp/input/input-file/29185.txt inflating: ./tmp/input/input-file/29186.txt inflating: ./tmp/input/input-file/30142.txt inflating: ./tmp/input/input-file/30632.txt inflating: ./tmp/input/input-file/25686.txt inflating: ./tmp/input/input-file/4780.txt inflating: ./tmp/input/input-file/59160.txt inflating: ./tmp/input/input-file/metadata.csv caution: excluded filename not matched: *MACOSX* === DIRECTORIES: ./tmp/input === DIRECTORY: ./tmp/input/input-file === metadata file: ./tmp/input/input-file/metadata.csv === found metadata file === updating bibliographic database Building study carrel named subject-terrorism-gutenberg FILE: cache/29185.txt OUTPUT: txt/29185.txt FILE: cache/25686.txt OUTPUT: txt/25686.txt FILE: cache/29186.txt OUTPUT: txt/29186.txt FILE: cache/59160.txt OUTPUT: txt/59160.txt FILE: cache/30632.txt OUTPUT: txt/30632.txt FILE: cache/4780.txt OUTPUT: txt/4780.txt FILE: cache/30142.txt OUTPUT: txt/30142.txt === file2bib.sh === id: 25686 author: Iraq Study Group (U.S.) title: The Iraq Study Group Report date: pages: extension: .txt txt: ./txt/25686.txt cache: ./cache/25686.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 1 resourceName b'25686.txt' Traceback (most recent call last): File "/data-disk/reader-compute/reader-classic/bin/file2bib.py", line 107, in text = textacy.preprocessing.normalize.normalize_quotation_marks( text ) File "/data-disk/python/lib/python3.8/site-packages/textacy/preprocessing/normalize.py", line 32, in normalize_quotation_marks return text.translate(QUOTE_TRANSLATION_TABLE) AttributeError: 'NoneType' object has no attribute 'translate' 25686 txt/../wrd/25686.wrd Traceback (most recent call last): File "/data-disk/reader-compute/reader-classic/bin/txt2keywords.py", line 54, in for keyword, score in ( yake( doc, ngrams=NGRAMS, topn=TOPN ) ) : File "/data-disk/python/lib/python3.8/site-packages/textacy/ke/yake.py", line 96, in yake word_scores = _compute_word_scores(doc, word_occ_vals, word_freqs, stop_words) File "/data-disk/python/lib/python3.8/site-packages/textacy/ke/yake.py", line 205, in _compute_word_scores freq_baseline = statistics.mean(freqs_nsw) + statistics.stdev(freqs_nsw) File "/data-disk/python/lib/python3.8/statistics.py", line 315, in mean raise StatisticsError('mean requires at least one data point') statistics.StatisticsError: mean requires at least one data point 25686 txt/../ent/25686.ent 25686 txt/../pos/25686.pos 29186 txt/../pos/29186.pos 29186 txt/../wrd/29186.wrd 59160 txt/../pos/59160.pos 29186 txt/../ent/29186.ent 59160 txt/../wrd/59160.wrd 29185 txt/../wrd/29185.wrd 29185 txt/../pos/29185.pos === file2bib.sh === id: 29186 author: National Security Council (U.S.) title: National Strategy for Combating Terrorism September 2006 date: pages: extension: .txt txt: ./txt/29186.txt cache: ./cache/29186.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 4 resourceName b'29186.txt' 29185 txt/../ent/29185.ent 59160 txt/../ent/59160.ent === file2bib.sh === id: 29185 author: United States. Executive Office of the President title: National Strategy for Combating Terrorism February 2003 date: pages: extension: .txt txt: ./txt/29185.txt cache: ./cache/29185.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 2 resourceName b'29185.txt' === file2bib.sh === id: 59160 author: Holum, Lee B. title: The 3rd Party date: pages: extension: .txt txt: ./txt/59160.txt cache: ./cache/59160.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 2 resourceName b'59160.txt' 4780 txt/../pos/4780.pos 4780 txt/../wrd/4780.wrd 4780 txt/../ent/4780.ent === file2bib.sh === id: 4780 author: Vaknin, Samuel title: Terrorists and Freedom Fighters date: pages: extension: .txt txt: ./txt/4780.txt cache: ./cache/4780.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 4 resourceName b'4780.txt' 30632 txt/../pos/30632.pos 30632 txt/../wrd/30632.wrd 30142 txt/../wrd/30142.wrd 30632 txt/../ent/30632.ent 30142 txt/../pos/30142.pos 30142 txt/../ent/30142.ent === file2bib.sh === id: 30142 author: Doctorow, Cory title: Little Brother date: pages: extension: .txt txt: ./txt/30142.txt cache: ./cache/30142.txt Content-Encoding UTF-8 Content-Type text/plain; charset=UTF-8 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 7 resourceName b'30142.txt' === file2bib.sh === id: 30632 author: United States. Congress. House. Committee on Homeland Security title: Homeland Security Act of 2002 Updated Through October 14, 2008 date: pages: extension: .txt txt: ./txt/30632.txt cache: ./cache/30632.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset=ISO-8859-1 X-Parsed-By ['org.apache.tika.parser.DefaultParser', 'org.apache.tika.parser.csv.TextAndCSVParser'] X-TIKA:content_handler ToTextContentHandler X-TIKA:embedded_depth 0 X-TIKA:parse_time_millis 8 resourceName b'30632.txt' Done mapping. Reducing subject-terrorism-gutenberg === reduce.pl bib === id = 29185 author = United States. Executive Office of the President title = National Strategy for Combating Terrorism February 2003 date = pages = extension = .txt mime = text/plain words = 10666 sentences = 568 flesch = 45 summary = United States, the National Strategy for Combating Terrorism focuses on help identify and locate terrorist organizations, and our global reach Thus, the United States will confront the threat of terrorism networks)--that terrorists need to plan, organize, train, and conduct capability to use WMD to attack the United States and our friends and While terrorism is not new, today's terrorist threat is different from The United States and its partners will _defeat_ terrorist terrorists by ensuring other states accept their responsibilities to terrorists to act, and compel supporters of terrorism to cease and efforts to identify and locate terrorist organizations operating at identified and located the terrorists, the United States and its international obligations to deny support and sanctuary to terrorists, standards for all states to meet in the global war against terrorism. combat terrorism with us at the state, regional, and even global level. states to cease support for terrorism. cache = ./cache/29185.txt txt = ./txt/29185.txt === reduce.pl bib === id = 59160 author = Holum, Lee B. title = The 3rd Party date = pages = extension = .txt mime = text/plain words = 10593 sentences = 789 flesch = 82 summary = Roger Lorin and his wife waited near the entrances to the boarding "Come on Linda," Roger said. the sun," Roger said to Linda. "Good," Roger said. "I hope I can help," said Roger. Roger and Darcy entered a lab in which a man sat staring at the face "Good idea," said Roger. might of the North American power had prevented a war at that time. "But why should South America do anything like that?" Roger asked "They don't like it," Roger said. "They don't like it," Roger said. "The trip was all right," Roger replied coldly, "though I don't like "That sounds like Roger Lorin," came the reply. fuel before the rocket carrying those South American officials blasts "Take a look," the police officer handed Roger a pair of binoculars. "This is my wife, Linda," Roger said. "It'll be a while yet," Roger said. "That's our ship," Roger said. cache = ./cache/59160.txt txt = ./txt/59160.txt === reduce.pl bib === === reduce.pl bib === id = 4780 author = Vaknin, Samuel title = Terrorists and Freedom Fighters date = pages = extension = .txt mime = text/plain words = 29859 sentences = 1879 flesch = 60 summary = with the IMRO (VMRO) in Macedonia and Bulgaria, proceed to Serbia (allowing Serb forces the right of hot pursuit within Bulgarian A self-appointed "guardian of all Serbs", the Serbian state the history of the first truly global conflict, the First World War. In 1917, in a surprising turn of events, Alexander, the Commander in 1934), King of the Serbs, Croats and Slovenes (later renamed Serbs, Croats and Slovenes, Alexander I, a freshly self-proclaimed Unable to ignore the common ethnic roots of both Serbs and Croats Serbs maintained an armed presence in Macedonia, Kosovo, the Sandzak ethnically, religiously or nationally based political parties (which nationalist Croats and Serb-haters who had no coherent national forces included Croat as well as Serb intellectuals and wannabe Croatia self-government except in matters of national defence and a 1998 State Department report, in the article "KLA Finances War The enemies are numerous: the Serbs (should Kosovo ever be cache = ./cache/4780.txt txt = ./txt/4780.txt === reduce.pl bib === id = 30632 author = United States. Congress. House. Committee on Homeland Security title = Homeland Security Act of 2002 Updated Through October 14, 2008 date = pages = extension = .txt mime = text/plain words = 95563 sentences = 5866 flesch = 40 summary = AN ACT To establish the Department of Homeland Security, and for other to homeland security, the Secretary shall coordinate through include those required by section 2 of title 14, United States provisions of this Act, every officer of the Department shall State and local government agencies (including law that section, including homeland security information, Department of Homeland Security State, Local, and Regional Department of Homeland Security State, Local, and Regional Department of Homeland Security State, Local, and Regional Security Advisors of the States, the Secretary shall-State, local, and tribal government agencies (including Federal Government shall take appropriate actions to protect of Homeland Security and the Secretary of Energy shall ensure Act, the Comptroller General of the United States shall submit section 552b(c) of title 5, United States Code, shall Department of Homeland Security under this Act shall continue authorities shall inform State, local, and tribal law cache = ./cache/30632.txt txt = ./txt/30632.txt === reduce.pl bib === id = 30142 author = Doctorow, Cory title = Little Brother date = pages = extension = .txt mime = text/plain words = 124084 sentences = 10356 flesch = 91 summary = What's more, kids were clearly being used as guinea-pigs for a new kind of technological state that all of us were on our way to, a world where taking a picture was either piracy (in a movie theater or museum or even a Starbucks), or terrorism (in a public place), but where we could be photographed, tracked and logged hundreds of times a day by every tin-pot dictator, cop, bureaucrat and shop-keeper. "I can talk about Little Brother in terms of its bravura political speculation or its brilliant uses of technology -each of which make this book a must-read -but, at the end of it all, I'm haunted by the universality of Marcus's rite-of-passage and struggle, an experience any teen today is going to grasp: the moment when you choose what your life will mean and how to achieve it." He looked like he was Chinese or Korean -even Van can't tell the difference sometimes -but with that bearing that said *American* in a way I couldn't put my finger on. cache = ./cache/30142.txt txt = ./txt/30142.txt === reduce.pl bib === id = 29186 author = National Security Council (U.S.) title = National Strategy for Combating Terrorism September 2006 date = pages = extension = .txt mime = text/plain words = 8554 sentences = 411 flesch = 44 summary = Deny WMD to rogue states and terrorist allies who seek to --Deny weapons of mass destruction to rogue states and terrorist allies our terrorist enemies to communicate, recruit, train, rally support, terrorist enemy confronting the United States is a transnational Our terrorist enemies exploit Islam to serve a violent political terrorist enemy we face threatens global peace, international security attacking these terrorists and their capacity to operate effectively at ability, terrorist groups cannot effectively organize operations, +Deny WMD to rogue states and terrorist allies who seek to use them+. +Deny terrorists the support and sanctuary of rogue states+. +Deny terrorists the support and sanctuary of rogue states+. +Deny terrorists the support and sanctuary of rogue states+. States and its allies and partners in the War on Terror make no between rogue states and our terrorist enemies, we will work to disrupt +Deny terrorists control of any nation they would use as a base and cache = ./cache/29186.txt txt = ./txt/29186.txt Building ./etc/reader.txt 30632 30142 59160 30632 29185 29186 number of items: 7 sum of words: 279,319 average size in words: 46,553 average readability score: 60 nouns: section; information; people; security; terrorism; b; time; u.s.c.; a; subsection; law; state; way; terrorists; emergency; government; functions; c; date; term; homeland; intelligence; agency; agencies; year; something; world; response; title; enforcement; activities; funds; personnel; day; program; use; work; paragraph; head; years; man; i; grant; school; systems; sector; days; entity; development; authority verbs: was; be; is; were; had; are; have; ''s; said; do; been; get; ''re; including; did; made; has; ''d; know; got; going; ''m; see; go; ''ve; think; take; make; used; established; ensure; looked; put; want; use; came; being; let; provided; went; provide; say; took; relating; means; establish; knew; described; thought; felt adjectives: other; such; local; appropriate; terrorist; more; little; good; national; private; new; tribal; same; effective; -; public; international; long; many; own; necessary; high; critical; free; fiscal; big; old; federal; regional; natural; available; political; first; relevant; few; last; great; right; best; urban; next; bad; interoperable; full; global; pursuant; foreign; much; military; consistent adverbs: n''t; not; out; up; just; so; then; down; back; now; even; as; really; more; only; later; there; here; away; too; in; off; never; again; all; on; still; also; around; ever; over; maybe; well; very; always; most; together; otherwise; before; right; home; much; directly; pretty; enough; else; first; finally; totally; of pronouns: i; it; you; my; they; we; me; he; she; their; her; them; his; our; its; your; us; him; myself; itself; themselves; ''s; himself; yourself; one; ourselves; mine; herself; hers; theirs; yours; huh; date.--this; ''em; this; things.â; s; report.--at; ours; oneself; health-; happen; 24/7 proper nouns: secretary; department; sec; act; states; united; security; federal; state; national; office; homeland; _; director; darryl; general; bureau; ange; immigration; government; intelligence; xnet; services; u.s.c.; emergency; congress; van; president; dhs; committee; marcus; jolu; center; management; code; administrator; ii; council; roger; c; under; san; general.--the; kosovo; kla; program; communications; advisory; serbs; citizenship keywords: united; terrorist; states; national; yugoslavia; xnet; xbox; work; wmd; west; war; van; u.s.c.; u.s.; turks; time; terror; street; strategy; state; south; services; serbs; serbia; security; secretary; sec; san; rugova; roger; right; people; ottoman; orthodox; office; north; mom; mission; masha; marcus; macedonia; lorin; look; little; like; license; kosovo; kla; king; jolu one topic; one dimension: shall file(s): ./cache/29185.txt titles(s): National Strategy for Combating Terrorism February 2003 three topics; one dimension: said; shall; kosovo file(s): ./cache/30142.txt, ./cache/30632.txt, ./cache/4780.txt titles(s): Little Brother | Homeland Security Act of 2002 Updated Through October 14, 2008 | Terrorists and Freedom Fighters five topics; three dimensions: said like people; shall secretary section; roger kosovo kla; terrorist terrorists states; agreements scientists rely file(s): ./cache/30142.txt, ./cache/30632.txt, ./cache/4780.txt, ./cache/29185.txt, titles(s): Little Brother | Homeland Security Act of 2002 Updated Through October 14, 2008 | Terrorists and Freedom Fighters | National Strategy for Combating Terrorism February 2003 | The Iraq Study Group Report Type: gutenberg title: subject-terrorism-gutenberg date: 2021-06-10 time: 15:06 username: emorgan patron: Eric Morgan email: emorgan@nd.edu input: facet_subject:"Terrorism" ==== make-pages.sh htm files ==== make-pages.sh complex files ==== make-pages.sh named enities ==== making bibliographics id: 30142 author: Doctorow, Cory title: Little Brother date: words: 124084.0 sentences: 10356.0 pages: flesch: 91.0 cache: ./cache/30142.txt txt: ./txt/30142.txt summary: What''s more, kids were clearly being used as guinea-pigs for a new kind of technological state that all of us were on our way to, a world where taking a picture was either piracy (in a movie theater or museum or even a Starbucks), or terrorism (in a public place), but where we could be photographed, tracked and logged hundreds of times a day by every tin-pot dictator, cop, bureaucrat and shop-keeper. "I can talk about Little Brother in terms of its bravura political speculation or its brilliant uses of technology -each of which make this book a must-read -but, at the end of it all, I''m haunted by the universality of Marcus''s rite-of-passage and struggle, an experience any teen today is going to grasp: the moment when you choose what your life will mean and how to achieve it." He looked like he was Chinese or Korean -even Van can''t tell the difference sometimes -but with that bearing that said *American* in a way I couldn''t put my finger on. id: 59160 author: Holum, Lee B. title: The 3rd Party date: words: 10593.0 sentences: 789.0 pages: flesch: 82.0 cache: ./cache/59160.txt txt: ./txt/59160.txt summary: Roger Lorin and his wife waited near the entrances to the boarding "Come on Linda," Roger said. the sun," Roger said to Linda. "Good," Roger said. "I hope I can help," said Roger. Roger and Darcy entered a lab in which a man sat staring at the face "Good idea," said Roger. might of the North American power had prevented a war at that time. "But why should South America do anything like that?" Roger asked "They don''t like it," Roger said. "They don''t like it," Roger said. "The trip was all right," Roger replied coldly, "though I don''t like "That sounds like Roger Lorin," came the reply. fuel before the rocket carrying those South American officials blasts "Take a look," the police officer handed Roger a pair of binoculars. "This is my wife, Linda," Roger said. "It''ll be a while yet," Roger said. "That''s our ship," Roger said. id: 25686 author: Iraq Study Group (U.S.) title: The Iraq Study Group Report date: words: nan sentences: nan pages: flesch: nan cache: txt: summary: id: 29186 author: National Security Council (U.S.) title: National Strategy for Combating Terrorism September 2006 date: words: 8554.0 sentences: 411.0 pages: flesch: 44.0 cache: ./cache/29186.txt txt: ./txt/29186.txt summary: Deny WMD to rogue states and terrorist allies who seek to --Deny weapons of mass destruction to rogue states and terrorist allies our terrorist enemies to communicate, recruit, train, rally support, terrorist enemy confronting the United States is a transnational Our terrorist enemies exploit Islam to serve a violent political terrorist enemy we face threatens global peace, international security attacking these terrorists and their capacity to operate effectively at ability, terrorist groups cannot effectively organize operations, +Deny WMD to rogue states and terrorist allies who seek to use them+. +Deny terrorists the support and sanctuary of rogue states+. +Deny terrorists the support and sanctuary of rogue states+. +Deny terrorists the support and sanctuary of rogue states+. States and its allies and partners in the War on Terror make no between rogue states and our terrorist enemies, we will work to disrupt +Deny terrorists control of any nation they would use as a base and id: 30632 author: United States. Congress. House. Committee on Homeland Security title: Homeland Security Act of 2002 Updated Through October 14, 2008 date: words: 95563.0 sentences: 5866.0 pages: flesch: 40.0 cache: ./cache/30632.txt txt: ./txt/30632.txt summary: AN ACT To establish the Department of Homeland Security, and for other to homeland security, the Secretary shall coordinate through include those required by section 2 of title 14, United States provisions of this Act, every officer of the Department shall State and local government agencies (including law that section, including homeland security information, Department of Homeland Security State, Local, and Regional Department of Homeland Security State, Local, and Regional Department of Homeland Security State, Local, and Regional Security Advisors of the States, the Secretary shall-State, local, and tribal government agencies (including Federal Government shall take appropriate actions to protect of Homeland Security and the Secretary of Energy shall ensure Act, the Comptroller General of the United States shall submit section 552b(c) of title 5, United States Code, shall Department of Homeland Security under this Act shall continue authorities shall inform State, local, and tribal law id: 29185 author: United States. Executive Office of the President title: National Strategy for Combating Terrorism February 2003 date: words: 10666.0 sentences: 568.0 pages: flesch: 45.0 cache: ./cache/29185.txt txt: ./txt/29185.txt summary: United States, the National Strategy for Combating Terrorism focuses on help identify and locate terrorist organizations, and our global reach Thus, the United States will confront the threat of terrorism networks)--that terrorists need to plan, organize, train, and conduct capability to use WMD to attack the United States and our friends and While terrorism is not new, today''s terrorist threat is different from The United States and its partners will _defeat_ terrorist terrorists by ensuring other states accept their responsibilities to terrorists to act, and compel supporters of terrorism to cease and efforts to identify and locate terrorist organizations operating at identified and located the terrorists, the United States and its international obligations to deny support and sanctuary to terrorists, standards for all states to meet in the global war against terrorism. combat terrorism with us at the state, regional, and even global level. states to cease support for terrorism. id: 4780 author: Vaknin, Samuel title: Terrorists and Freedom Fighters date: words: 29859.0 sentences: 1879.0 pages: flesch: 60.0 cache: ./cache/4780.txt txt: ./txt/4780.txt summary: with the IMRO (VMRO) in Macedonia and Bulgaria, proceed to Serbia (allowing Serb forces the right of hot pursuit within Bulgarian A self-appointed "guardian of all Serbs", the Serbian state the history of the first truly global conflict, the First World War. In 1917, in a surprising turn of events, Alexander, the Commander in 1934), King of the Serbs, Croats and Slovenes (later renamed Serbs, Croats and Slovenes, Alexander I, a freshly self-proclaimed Unable to ignore the common ethnic roots of both Serbs and Croats Serbs maintained an armed presence in Macedonia, Kosovo, the Sandzak ethnically, religiously or nationally based political parties (which nationalist Croats and Serb-haters who had no coherent national forces included Croat as well as Serb intellectuals and wannabe Croatia self-government except in matters of national defence and a 1998 State Department report, in the article "KLA Finances War The enemies are numerous: the Serbs (should Kosovo ever be ==== make-pages.sh questions ==== make-pages.sh search ==== make-pages.sh topic modeling corpus Zipping study carrel