Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
36
36
image
imagewidth (px)
512
512
prompt
stringlengths
89
284
response
stringlengths
76
419
style
stringclasses
3 values
08895415-60da-563d-a661-3c234342d080
Based on the rendered document titled 'Empirical Studies on Anharmonic Superposition State', identify the fundamental law that bounds the coupling limits of anharmonic superposition state, and describe what happens when the system undergoes unitary perturbation.
According to the document, the coupling limits of anharmonic superposition state are bounded by the physical law of 'Ĥ |ψ⟩ = E |ψ⟩'. When the system undergoes unitary perturbation, an anomaly occurs that triggers an unexpected entanglement entropy cascade, forcing the controller to entangle the active registers.
meaning
3d775109-e506-5244-a4ec-2a68673ccd9a
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000001'.
Tags: [bioinformatics, phylogenetic] Connection Port: 5432 Expression: "P(x) = ∏ P(x_i | parents(x_i))"
formatting
c8821b5f-2a98-54ac-84f8-1f02f820463d
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-002-0 | homomorphic enc | 38.4 | 54.8 | 70.1 | NOMINAL | | N-002-1 | discrete logari | 39.3 | 59.8 | 65.7 | NOMINAL | | N-002-2 | block cipher | 23.3 | 41.0 | 56.8 | DEGRADED | | N-002-3 | hash collision ...
table
ea08ded1-b397-5c36-9eb2-21ad89aa329c
Based on the rendered document titled 'Empirical Studies on Countercyclical Yield Curve Inversion', identify the fundamental law that bounds the coupling limits of countercyclical yield curve inversion, and describe what happens when the system undergoes macroprudential perturbation.
According to the document, the coupling limits of countercyclical yield curve inversion are bounded by the physical law of 'S = I + (G - T) + NX'. When the system undergoes macroprudential perturbation, an anomaly occurs that triggers an unexpected monetary policy easing cascade, forcing the controller to subsidize the...
meaning
15fbd9e3-468b-5bc2-b7b2-bfd1f1ad32d8
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000004'.
Tags: [cyberdefense, vulnerable] Connection Port: 9000 Expression: "MTTR = ∑ (T_restore - T_detect) / N"
formatting
3ac74945-ad0c-5ad4-bb47-87612cfac515
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-005-0 | qubit coherence | 27.0 | 44.7 | 60.4 | NOMINAL | | N-005-1 | Rabi oscillatio | 46.0 | 61.1 | 75.3 | NOMINAL | | N-005-2 | squeezed vacuum | 36.7 | 59.5 | 61.7 | NOMINAL |
table
63d67953-ee69-5a11-93d3-87baab788f3d
Based on the rendered document titled 'Empirical Studies on Synthetic Epigenetic Marker', identify the fundamental law that bounds the coupling limits of synthetic epigenetic marker, and describe what happens when the system undergoes phylogenetic perturbation.
According to the document, the coupling limits of synthetic epigenetic marker are bounded by the physical law of 'S(a,b) = max [S(i-1, j-1) + s(a_i, b_j)]'. When the system undergoes phylogenetic perturbation, an anomaly occurs that triggers an unexpected splicing junction cascade, forcing the controller to sequence th...
meaning
c02fd549-9b8a-5a45-b34a-aec35cb85cda
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000007'.
Tags: [cryptography, ephemeral] Connection Port: 27017 Expression: "g^x ≡ A (mod p)"
formatting
68d02fa3-2efa-5b15-88e1-688bc89f8cdb
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-008-0 | liquidity trap | 42.0 | 60.3 | 69.7 | NOMINAL | | N-008-1 | arbitrage sprea | 43.3 | 60.2 | 71.9 | NOMINAL | | N-008-2 | fiat currency | 28.4 | 52.6 | 54.0 | DEGRADED | | N-008-3 | yield curve inv...
table
529bde5a-d546-508b-9a9d-0b62436ab65b
Based on the rendered document titled 'Empirical Studies on State-sponsored Phishing Vector', identify the fundamental law that bounds the coupling limits of state-sponsored phishing vector, and describe what happens when the system undergoes vulnerable perturbation.
According to the document, the coupling limits of state-sponsored phishing vector are bounded by the physical law of 'Risk = Vulnerability × Threat × Asset'. When the system undergoes vulnerable perturbation, an anomaly occurs that triggers an unexpected zero-day exploit cascade, forcing the controller to sandbox the a...
meaning
c0e2c1bc-6f1f-51a1-bfd1-42ca593bb192
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000010'.
Tags: [quantum_physics, stochastic] Connection Port: 27017 Expression: "Ĥ |ψ⟩ = E |ψ⟩"
formatting
8740a540-90e1-555c-9cae-577e5eb83634
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-011-0 | transcriptome p | 20.6 | 29.6 | 69.6 | NOMINAL | | N-011-1 | protein fold st | 12.7 | 28.2 | 45.0 | DEGRADED | | N-011-2 | ribosome bindin | 34.7 | 51.2 | 67.8 | NOMINAL | | N-011-3 | epigenetic m...
table
3e300dfd-eb43-5c3d-9220-f2bc313fbe0d
Based on the rendered document titled 'Empirical Studies on Entropy-rich Block Cipher', identify the fundamental law that bounds the coupling limits of entropy-rich block cipher, and describe what happens when the system undergoes ephemeral perturbation.
According to the document, the coupling limits of entropy-rich block cipher are bounded by the physical law of 'y² ≡ x³ + ax + b (mod p)'. When the system undergoes ephemeral perturbation, an anomaly occurs that triggers an unexpected hash collision cascade, forcing the controller to hash the active registers.
meaning
57517ad1-90ae-5155-b343-92994c27f0d5
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000013'.
Tags: [macroeconomics, illiquid] Connection Port: 8080 Expression: "MV = PY"
formatting
a0d07c2f-c705-5e9c-81a8-0f833bec503a
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-014-0 | firewall rule | 17.9 | 25.0 | 71.6 | NOMINAL | | N-014-1 | threat intellig | 17.9 | 37.9 | 47.2 | DEGRADED | | N-014-2 | intrusion detec | 50.0 | 66.4 | 75.3 | NOMINAL | | N-014-3 | phishing vecto...
table
f30d1f1d-3f78-55e1-87ab-f11f860a72ae
Based on the rendered document titled 'Empirical Studies on Adiabatic Squeezed Vacuum', identify the fundamental law that bounds the coupling limits of adiabatic squeezed vacuum, and describe what happens when the system undergoes stochastic perturbation.
According to the document, the coupling limits of adiabatic squeezed vacuum are bounded by the physical law of 'Ĥ |ψ⟩ = E |ψ⟩'. When the system undergoes stochastic perturbation, an anomaly occurs that triggers an unexpected superposition state cascade, forcing the controller to interfere the active registers.
meaning
bc5167ba-93d5-51c3-b866-051652834114
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000016'.
Tags: [bioinformatics, homologous] Connection Port: 443 Expression: "P(x) = ∏ P(x_i | parents(x_i))"
formatting
f2318b0d-c4b8-5c92-9796-65f6f5d0dacb
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-017-0 | zero-knowledge | 11.8 | 36.4 | 32.4 | DEGRADED | | N-017-1 | homomorphic enc | 39.1 | 50.2 | 77.9 | NOMINAL | | N-017-2 | discrete logari | 45.7 | 62.9 | 72.7 | NOMINAL | | N-017-3 | block cipher...
table
1160f093-59c0-5b09-b79c-355044252e9c
Based on the rendered document titled 'Empirical Studies on Inflationary Fiat Currency', identify the fundamental law that bounds the coupling limits of inflationary fiat currency, and describe what happens when the system undergoes illiquid perturbation.
According to the document, the coupling limits of inflationary fiat currency are bounded by the physical law of 'r = i - π^e'. When the system undergoes illiquid perturbation, an anomaly occurs that triggers an unexpected yield curve inversion cascade, forcing the controller to regulate the active registers.
meaning
a6bfc111-9800-59ee-bd6c-ec50b6bb43af
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000019'.
Tags: [cyberdefense, sandboxed] Connection Port: 27017 Expression: "MTTR = ∑ (T_restore - T_detect) / N"
formatting
e0ef5f33-9bd0-5b97-a946-60c7385f013e
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-020-0 | Josephson junct | 39.5 | 53.6 | 73.7 | NOMINAL | | N-020-1 | qubit coherence | 46.0 | 67.1 | 68.6 | NOMINAL | | N-020-2 | Rabi oscillatio | 29.5 | 49.5 | 59.6 | DEGRADED | | N-020-3 | squeezed vac...
table
a8a8390a-f0ad-5049-90f6-f567975e28b2
Based on the rendered document titled 'Empirical Studies on Pathogenic Ribosome Binding', identify the fundamental law that bounds the coupling limits of pathogenic ribosome binding, and describe what happens when the system undergoes homologous perturbation.
According to the document, the coupling limits of pathogenic ribosome binding are bounded by the physical law of 'S(a,b) = max [S(i-1, j-1) + s(a_i, b_j)]'. When the system undergoes homologous perturbation, an anomaly occurs that triggers an unexpected epigenetic marker cascade, forcing the controller to simulate the ...
meaning
9354b57f-1096-5cf9-a24c-b777ab66bcae
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000022'.
Tags: [cryptography, quantum-safe] Connection Port: 9000 Expression: "H(m) = SHA-256(m)"
formatting
a9aeb9a9-edb8-5f95-b9da-c80a9c4b408d
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-023-0 | sovereign debt | 12.7 | 20.3 | 62.6 | NOMINAL | | N-023-1 | liquidity trap | 12.4 | 20.8 | 59.6 | DEGRADED | | N-023-2 | arbitrage sprea | 42.8 | 51.6 | 82.9 | NOMINAL | | N-023-3 | fiat currency...
table
b69703f0-980c-5f28-9af6-7884c4e863c8
Based on the rendered document titled 'Empirical Studies on Heuristic Intrusion Detection', identify the fundamental law that bounds the coupling limits of heuristic intrusion detection, and describe what happens when the system undergoes sandboxed perturbation.
According to the document, the coupling limits of heuristic intrusion detection are bounded by the physical law of 'Risk = Vulnerability × Threat × Asset'. When the system undergoes sandboxed perturbation, an anomaly occurs that triggers an unexpected phishing vector cascade, forcing the controller to exploit the activ...
meaning
ffe41ffb-3af1-5c73-b1b5-d3575be4712b
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000025'.
Tags: [quantum_physics, coherent] Connection Port: 8080 Expression: "Ĥ |ψ⟩ = E |ψ⟩"
formatting
b4c40d05-abd1-53a6-b9d3-489e09a94500
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-026-0 | phylogenetic tr | 16.0 | 28.0 | 57.1 | DEGRADED | | N-026-1 | transcriptome p | 38.7 | 61.8 | 62.6 | NOMINAL | | N-026-2 | protein fold st | 11.7 | 22.5 | 52.0 | DEGRADED | | N-026-3 | ribosome bi...
table
8a519148-0912-5687-9b74-0b9f98378a35
Based on the rendered document titled 'Empirical Studies on Collision-resistant Discrete Logarithm', identify the fundamental law that bounds the coupling limits of collision-resistant discrete logarithm, and describe what happens when the system undergoes quantum-safe perturbation.
According to the document, the coupling limits of collision-resistant discrete logarithm are bounded by the physical law of 'g^x ≡ A (mod p)'. When the system undergoes quantum-safe perturbation, an anomaly occurs that triggers an unexpected block cipher cascade, forcing the controller to permute the active registers.
meaning
bc809096-8f40-5b82-a5be-28e8bb9dcda3
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000028'.
Tags: [macroeconomics, fiat] Connection Port: 443 Expression: "Y = C + I + G + (X - M)"
formatting
9e5c4a60-b5a5-5941-a702-ade01e06e950
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-029-0 | malware footpri | 36.3 | 54.2 | 67.0 | NOMINAL | | N-029-1 | firewall rule | 20.5 | 29.8 | 68.8 | NOMINAL | | N-029-2 | threat intellig | 15.4 | 28.2 | 54.6 | DEGRADED | | N-029-3 | intrusion dete...
table
b1e6265e-ccf5-52e1-b29f-107367d51770
Based on the rendered document titled 'Empirical Studies on Squeezed Rabi Oscillation', identify the fundamental law that bounds the coupling limits of squeezed Rabi oscillation, and describe what happens when the system undergoes coherent perturbation.
According to the document, the coupling limits of squeezed Rabi oscillation are bounded by the physical law of 'Ĥ |ψ⟩ = E |ψ⟩'. When the system undergoes coherent perturbation, an anomaly occurs that triggers an unexpected squeezed vacuum cascade, forcing the controller to modulate the active registers.
meaning
eaf66325-a6ce-56d9-a97e-eacfbfdac5e8
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000031'.
Tags: [bioinformatics, epigenetic] Connection Port: 443 Expression: "P(x) = ∏ P(x_i | parents(x_i))"
formatting
12742357-09b5-5be7-a29e-d909fb44d2ff
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-032-0 | elliptic curve | 49.7 | 61.4 | 80.9 | NOMINAL | | N-032-1 | zero-knowledge | 35.0 | 56.0 | 62.5 | NOMINAL | | N-032-2 | homomorphic enc | 48.3 | 71.9 | 67.2 | NOMINAL | | N-032-3 | discrete logar...
table
97cfe231-fbf9-5512-b4a4-e2316f4a12b6
Based on the rendered document titled 'Empirical Studies on Monetary Arbitrage Spread', identify the fundamental law that bounds the coupling limits of monetary arbitrage spread, and describe what happens when the system undergoes fiat perturbation.
According to the document, the coupling limits of monetary arbitrage spread are bounded by the physical law of 'MV = PY'. When the system undergoes fiat perturbation, an anomaly occurs that triggers an unexpected fiat currency cascade, forcing the controller to inflate the active registers.
meaning
45f56a44-07c6-52d0-90ae-d239fe5e1d6f
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000034'.
Tags: [cyberdefense, malicious] Connection Port: 8080 Expression: "MTTR = ∑ (T_restore - T_detect) / N"
formatting
db947dc1-b711-565f-8124-327a99207702
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-035-0 | wavefunction co | 31.6 | 40.4 | 78.2 | NOMINAL | | N-035-1 | Josephson junct | 27.5 | 47.8 | 57.5 | DEGRADED | | N-035-2 | qubit coherence | 48.4 | 59.7 | 81.1 | NOMINAL |
table
516bc1e2-9955-590e-a6ae-5405ee0f5ae3
Based on the rendered document titled 'Empirical Studies on Eukaryotic Protein Fold Stability', identify the fundamental law that bounds the coupling limits of eukaryotic protein fold stability, and describe what happens when the system undergoes epigenetic perturbation.
According to the document, the coupling limits of eukaryotic protein fold stability are bounded by the physical law of 'S(a,b) = max [S(i-1, j-1) + s(a_i, b_j)]'. When the system undergoes epigenetic perturbation, an anomaly occurs that triggers an unexpected ribosome binding cascade, forcing the controller to cluster ...
meaning
372d7527-4556-5eca-bfa1-555b26150e80
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000037'.
Tags: [cryptography, non-malleable] Connection Port: 27017 Expression: "e · d ≡ 1 (mod φ(n))"
formatting
45bd2c57-d722-573f-98a4-ca2f15b1d573
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-038-0 | fiscal multipli | 19.0 | 30.1 | 63.1 | NOMINAL | | N-038-1 | sovereign debt | 27.6 | 40.2 | 68.7 | NOMINAL | | N-038-2 | liquidity trap | 35.5 | 43.4 | 81.8 | NOMINAL | | N-038-3 | arbitrage spre...
table
857962a6-6ad8-5e49-8af8-afcc855ed6c6
Based on the rendered document titled 'Empirical Studies on Air-gapped Threat Intelligence', identify the fundamental law that bounds the coupling limits of air-gapped threat intelligence, and describe what happens when the system undergoes malicious perturbation.
According to the document, the coupling limits of air-gapped threat intelligence are bounded by the physical law of 'Risk = Vulnerability × Threat × Asset'. When the system undergoes malicious perturbation, an anomaly occurs that triggers an unexpected intrusion detection cascade, forcing the controller to mitigate the...
meaning
fffb6293-bb70-59fa-a13d-be75bab1c20e
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000040'.
Tags: [quantum_physics, anharmonic] Connection Port: 443 Expression: "Ĥ |ψ⟩ = E |ψ⟩"
formatting
e50c1c6b-a8fe-58cf-ba1c-200052f3b882
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-041-0 | codon optimizat | 42.5 | 49.2 | 86.4 | NOMINAL | | N-041-1 | phylogenetic tr | 37.8 | 49.6 | 76.2 | NOMINAL | | N-041-2 | transcriptome p | 43.7 | 54.2 | 80.6 | NOMINAL | | N-041-3 | protein fold ...
table
098bbf66-f6bc-58ea-80f7-0c6b1d53e5b7
Based on the rendered document titled 'Empirical Studies on Homomorphic Homomorphic Encryption', identify the fundamental law that bounds the coupling limits of homomorphic homomorphic encryption, and describe what happens when the system undergoes non-malleable perturbation.
According to the document, the coupling limits of homomorphic homomorphic encryption are bounded by the physical law of 'H(m) = SHA-256(m)'. When the system undergoes non-malleable perturbation, an anomaly occurs that triggers an unexpected discrete logarithm cascade, forcing the controller to obfuscate the active regi...
meaning
77972c58-e0d7-5556-86c7-c827b46f3ca4
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000043'.
Tags: [macroeconomics, countercyclical] Connection Port: 27017 Expression: "S = I + (G - T) + NX"
formatting
61ae4eb8-1a22-527c-ad32-28dadbf01e05
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-044-0 | sandboxed envir | 11.5 | 35.4 | 32.5 | DEGRADED | | N-044-1 | malware footpri | 33.2 | 42.1 | 78.9 | NOMINAL | | N-044-2 | firewall rule | 27.8 | 46.1 | 60.3 | NOMINAL |
table
31acc4e6-bcf0-5dfb-8e58-1ee27e10384f
Based on the rendered document titled 'Empirical Studies on Cryogenic Qubit Coherence', identify the fundamental law that bounds the coupling limits of cryogenic qubit coherence, and describe what happens when the system undergoes anharmonic perturbation.
According to the document, the coupling limits of cryogenic qubit coherence are bounded by the physical law of 'Ĥ |ψ⟩ = E |ψ⟩'. When the system undergoes anharmonic perturbation, an anomaly occurs that triggers an unexpected Rabi oscillation cascade, forcing the controller to resonate the active registers.
meaning
24aad6d7-761a-51f4-b8e9-905578b286b2
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000046'.
Tags: [bioinformatics, synthetic] Connection Port: 9000 Expression: "P(x) = ∏ P(x_i | parents(x_i))"
formatting
6678e002-de56-5e24-909e-b44e051180a1
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-047-0 | side-channel le | 29.7 | 49.0 | 60.6 | NOMINAL | | N-047-1 | elliptic curve | 24.2 | 35.8 | 67.6 | NOMINAL | | N-047-2 | zero-knowledge | 21.1 | 45.5 | 46.4 | DEGRADED |
table
8c9cc15f-4246-513d-a60a-288e9a4c5672
Based on the rendered document titled 'Empirical Studies on Keynesian Liquidity Trap', identify the fundamental law that bounds the coupling limits of keynesian liquidity trap, and describe what happens when the system undergoes countercyclical perturbation.
According to the document, the coupling limits of keynesian liquidity trap are bounded by the physical law of 'Y = C + I + G + (X - M)'. When the system undergoes countercyclical perturbation, an anomaly occurs that triggers an unexpected arbitrage spread cascade, forcing the controller to depreciate the active registe...
meaning
c082639d-63f8-5ebf-bf8f-901e4fdad6f0
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000049'.
Tags: [cyberdefense, state-sponsored] Connection Port: 443 Expression: "MTTR = ∑ (T_restore - T_detect) / N"
formatting
ea2a839e-b263-5c61-a2a2-b9081dfd8835
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-050-0 | decoherence rat | 40.8 | 59.2 | 68.9 | NOMINAL | | N-050-1 | wavefunction co | 11.7 | 27.9 | 41.9 | DEGRADED | | N-050-2 | Josephson junct | 21.9 | 29.9 | 73.2 | NOMINAL | | N-050-3 | qubit cohere...
table
a648cdf7-38e9-5ed8-8343-557d238c2e6e
Based on the rendered document titled 'Empirical Studies on Conserved Transcriptome Profiling', identify the fundamental law that bounds the coupling limits of conserved transcriptome profiling, and describe what happens when the system undergoes synthetic perturbation.
According to the document, the coupling limits of conserved transcriptome profiling are bounded by the physical law of 'S(a,b) = max [S(i-1, j-1) + s(a_i, b_j)]'. When the system undergoes synthetic perturbation, an anomaly occurs that triggers an unexpected protein fold stability cascade, forcing the controller to ann...
meaning
891234ba-a1d4-52b6-94bb-645467229239
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000052'.
Tags: [cryptography, entropy-rich] Connection Port: 27017 Expression: "y² ≡ x³ + ax + b (mod p)"
formatting
87f5e211-4e57-574d-aa48-8ab7a539fed2
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-053-0 | inflation expec | 39.4 | 44.8 | 87.9 | NOMINAL | | N-053-1 | fiscal multipli | 41.6 | 49.8 | 83.5 | NOMINAL | | N-053-2 | sovereign debt | 40.1 | 58.1 | 69.0 | NOMINAL | | N-053-3 | liquidity tra...
table
db43cf22-5f72-59cf-a256-6a936927de15
Based on the rendered document titled 'Empirical Studies on Anomalous Firewall Rule', identify the fundamental law that bounds the coupling limits of anomalous firewall rule, and describe what happens when the system undergoes state-sponsored perturbation.
According to the document, the coupling limits of anomalous firewall rule are bounded by the physical law of 'Risk = Vulnerability × Threat × Asset'. When the system undergoes state-sponsored perturbation, an anomaly occurs that triggers an unexpected threat intelligence cascade, forcing the controller to intercept the...
meaning
56f41a70-9717-5716-a08e-91c6c6128ab6
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000055'.
Tags: [quantum_physics, adiabatic] Connection Port: 27017 Expression: "Ĥ |ψ⟩ = E |ψ⟩"
formatting
3444c15c-ef8e-5c71-9c11-5ea8752e3e66
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-056-0 | nucleotide sequ | 42.2 | 60.7 | 69.5 | NOMINAL | | N-056-1 | codon optimizat | 40.1 | 45.6 | 87.9 | NOMINAL | | N-056-2 | phylogenetic tr | 27.1 | 47.9 | 56.6 | DEGRADED | | N-056-3 | transcriptom...
table
185782c5-d39d-52fe-9c80-c605c98e7890
Based on the rendered document titled 'Empirical Studies on Cryptographic Zero-Knowledge Proof', identify the fundamental law that bounds the coupling limits of cryptographic zero-knowledge proof, and describe what happens when the system undergoes entropy-rich perturbation.
According to the document, the coupling limits of cryptographic zero-knowledge proof are bounded by the physical law of 'e · d ≡ 1 (mod φ(n))'. When the system undergoes entropy-rich perturbation, an anomaly occurs that triggers an unexpected homomorphic encryption cascade, forcing the controller to verify the active r...
meaning
5d1ece60-75ca-548c-8d24-b114bfcede95
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000058'.
Tags: [macroeconomics, inflationary] Connection Port: 443 Expression: "r = i - π^e"
formatting
7234fd74-6ab6-5269-8c9a-2fe5f340257c
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-059-0 | privilege escal | 37.4 | 44.5 | 84.0 | NOMINAL | | N-059-1 | sandboxed envir | 16.4 | 34.3 | 47.8 | DEGRADED | | N-059-2 | malware footpri | 26.2 | 43.1 | 60.8 | NOMINAL |
table
d883cdcb-8fd0-56e2-8164-9883b1d61a19
Based on the rendered document titled 'Empirical Studies on Topological Josephson Junction', identify the fundamental law that bounds the coupling limits of topological Josephson junction, and describe what happens when the system undergoes adiabatic perturbation.
According to the document, the coupling limits of topological Josephson junction are bounded by the physical law of 'Ĥ |ψ⟩ = E |ψ⟩'. When the system undergoes adiabatic perturbation, an anomaly occurs that triggers an unexpected qubit coherence cascade, forcing the controller to tunnel the active registers.
meaning
e811d846-90e6-5174-a23a-4067db87987b
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000061'.
Tags: [bioinformatics, pathogenic] Connection Port: 8080 Expression: "P(x) = ∏ P(x_i | parents(x_i))"
formatting
945080de-d48b-5cab-ac6d-6e51a79d3cb8
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-062-0 | signature schem | 19.1 | 39.9 | 47.9 | DEGRADED | | N-062-1 | side-channel le | 23.1 | 39.1 | 59.1 | DEGRADED | | N-062-2 | elliptic curve | 28.9 | 37.8 | 76.5 | NOMINAL | | N-062-3 | zero-knowled...
table
28a815ee-99dc-59c7-b14e-39cd51aadbcc
Based on the rendered document titled 'Empirical Studies on Deficit-funded Sovereign Debt Default', identify the fundamental law that bounds the coupling limits of deficit-funded sovereign debt default, and describe what happens when the system undergoes inflationary perturbation.
According to the document, the coupling limits of deficit-funded sovereign debt default are bounded by the physical law of 'S = I + (G - T) + NX'. When the system undergoes inflationary perturbation, an anomaly occurs that triggers an unexpected liquidity trap cascade, forcing the controller to arbitrage the active reg...
meaning
3d919d52-2ed3-5321-b3fc-8d613828592c
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000064'.
Tags: [cyberdefense, heuristic] Connection Port: 443 Expression: "MTTR = ∑ (T_restore - T_detect) / N"
formatting
ca239794-1895-558f-a8b1-c413d2bdaf7e
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-065-0 | entanglement en | 20.9 | 33.5 | 62.4 | NOMINAL | | N-065-1 | decoherence rat | 10.0 | 31.2 | 32.1 | DEGRADED | | N-065-2 | wavefunction co | 46.5 | 56.4 | 82.4 | NOMINAL | | N-065-3 | Josephson ju...
table
91798159-ec51-5b79-b2b4-e9814ff42bf0
Based on the rendered document titled 'Empirical Studies on Metagenomic Phylogenetic Tree', identify the fundamental law that bounds the coupling limits of metagenomic phylogenetic tree, and describe what happens when the system undergoes pathogenic perturbation.
According to the document, the coupling limits of metagenomic phylogenetic tree are bounded by the physical law of 'S(a,b) = max [S(i-1, j-1) + s(a_i, b_j)]'. When the system undergoes pathogenic perturbation, an anomaly occurs that triggers an unexpected transcriptome profiling cascade, forcing the controller to mutat...
meaning
8953414d-a351-5d6e-9ef0-fb270fe4b8e5
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000067'.
Tags: [cryptography, collision-resistant] Connection Port: 27017 Expression: "g^x ≡ A (mod p)"
formatting
b65976ee-1339-5692-9297-8c51ec711104
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-068-0 | monetary policy | 30.9 | 54.2 | 57.0 | DEGRADED | | N-068-1 | inflation expec | 16.2 | 39.6 | 40.9 | DEGRADED | | N-068-2 | fiscal multipli | 43.8 | 57.1 | 76.7 | NOMINAL | | N-068-3 | sovereign d...
table
f9f0763e-c2dc-5b15-8ba4-bdd1344a92dc
Based on the rendered document titled 'Empirical Studies on Zero-day Malware Footprint', identify the fundamental law that bounds the coupling limits of zero-day malware footprint, and describe what happens when the system undergoes heuristic perturbation.
According to the document, the coupling limits of zero-day malware footprint are bounded by the physical law of 'Risk = Vulnerability × Threat × Asset'. When the system undergoes heuristic perturbation, an anomaly occurs that triggers an unexpected firewall rule cascade, forcing the controller to correlate the active r...
meaning
e7b715db-d698-5bae-bd17-169667200d16
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000070'.
Tags: [quantum_physics, squeezed] Connection Port: 9000 Expression: "Ĥ |ψ⟩ = E |ψ⟩"
formatting
8843c28f-497e-5c40-b3d7-953a222af2b7
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-071-0 | splicing juncti | 40.2 | 46.3 | 86.8 | NOMINAL | | N-071-1 | nucleotide sequ | 40.4 | 46.5 | 86.9 | NOMINAL | | N-071-2 | codon optimizat | 40.5 | 61.5 | 65.9 | NOMINAL |
table
7a2f9c12-5ab4-5597-b85c-9dd8bcd2c47f
Based on the rendered document titled 'Empirical Studies on Asymmetric Elliptic Curve', identify the fundamental law that bounds the coupling limits of asymmetric elliptic curve, and describe what happens when the system undergoes collision-resistant perturbation.
According to the document, the coupling limits of asymmetric elliptic curve are bounded by the physical law of 'y² ≡ x³ + ax + b (mod p)'. When the system undergoes collision-resistant perturbation, an anomaly occurs that triggers an unexpected zero-knowledge proof cascade, forcing the controller to sign the active reg...
meaning
106f7e8d-bd12-53c0-a4b5-b7d827a1f238
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000073'.
Tags: [macroeconomics, monetary] Connection Port: 5432 Expression: "MV = PY"
formatting
0cc4a165-c669-52e9-8753-3fd7bed3d6d0
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-074-0 | zero-day exploi | 25.9 | 34.4 | 75.3 | NOMINAL | | N-074-1 | privilege escal | 29.9 | 48.4 | 61.8 | NOMINAL | | N-074-2 | sandboxed envir | 17.4 | 23.9 | 72.8 | NOMINAL | | N-074-3 | malware footp...
table
b899f923-00a1-5acd-ab22-282c3d9f2cca
Based on the rendered document titled 'Empirical Studies on Unitary Wavefunction Collapse', identify the fundamental law that bounds the coupling limits of unitary wavefunction collapse, and describe what happens when the system undergoes squeezed perturbation.
According to the document, the coupling limits of unitary wavefunction collapse are bounded by the physical law of 'Ĥ |ψ⟩ = E |ψ⟩'. When the system undergoes squeezed perturbation, an anomaly occurs that triggers an unexpected Josephson junction cascade, forcing the controller to initialize the active registers.
meaning
598c22b9-1977-5ca5-8b7a-ac6c21afdad0
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000076'.
Tags: [bioinformatics, eukaryotic] Connection Port: 5432 Expression: "P(x) = ∏ P(x_i | parents(x_i))"
formatting
665c3717-1b13-5795-b29f-78399c20ae3e
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-077-0 | hash collision | 26.7 | 49.4 | 54.0 | DEGRADED | | N-077-1 | signature schem | 43.6 | 67.7 | 64.4 | NOMINAL | | N-077-2 | side-channel le | 30.1 | 43.8 | 68.7 | NOMINAL |
table
b1e067a4-aa50-5bda-8572-694adaa4acdd
Based on the rendered document titled 'Empirical Studies on Macroprudential Fiscal Multiplier', identify the fundamental law that bounds the coupling limits of macroprudential fiscal multiplier, and describe what happens when the system undergoes monetary perturbation.
According to the document, the coupling limits of macroprudential fiscal multiplier are bounded by the physical law of 'r = i - π^e'. When the system undergoes monetary perturbation, an anomaly occurs that triggers an unexpected sovereign debt default cascade, forcing the controller to monetize the active registers.
meaning
8a346be2-6430-5150-b18e-ee80e4e1c6be
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000079'.
Tags: [cyberdefense, air-gapped] Connection Port: 27017 Expression: "MTTR = ∑ (T_restore - T_detect) / N"
formatting
502bf20a-f8b9-5bed-b64e-4eeecadf1e1c
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-080-0 | superposition s | 31.9 | 43.0 | 74.2 | NOMINAL | | N-080-1 | entanglement en | 38.6 | 56.3 | 68.6 | NOMINAL | | N-080-2 | decoherence rat | 21.3 | 46.2 | 46.1 | DEGRADED | | N-080-3 | wavefunction...
table
8bb47892-881c-5668-9331-27ab75330e40
Based on the rendered document titled 'Empirical Studies on Phylogenetic Codon Optimization', identify the fundamental law that bounds the coupling limits of phylogenetic codon optimization, and describe what happens when the system undergoes eukaryotic perturbation.
According to the document, the coupling limits of phylogenetic codon optimization are bounded by the physical law of 'S(a,b) = max [S(i-1, j-1) + s(a_i, b_j)]'. When the system undergoes eukaryotic perturbation, an anomaly occurs that triggers an unexpected phylogenetic tree cascade, forcing the controller to synthesiz...
meaning
f2a17be3-b177-522f-aa0f-b258f280bd74
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000082'.
Tags: [cryptography, homomorphic] Connection Port: 9000 Expression: "H(m) = SHA-256(m)"
formatting
2ad7f2cf-bfb3-5c69-96d8-ee2bd0adf536
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-083-0 | yield curve inv | 33.7 | 57.0 | 59.1 | DEGRADED | | N-083-1 | monetary policy | 18.6 | 41.5 | 44.8 | DEGRADED | | N-083-2 | inflation expec | 11.1 | 35.1 | 31.6 | DEGRADED | | N-083-3 | fiscal mul...
table
4f43c68e-3ce2-543f-9e85-2e6e644bd897
Based on the rendered document titled 'Empirical Studies on Vulnerable Sandboxed Environment', identify the fundamental law that bounds the coupling limits of vulnerable sandboxed environment, and describe what happens when the system undergoes air-gapped perturbation.
According to the document, the coupling limits of vulnerable sandboxed environment are bounded by the physical law of 'Risk = Vulnerability × Threat × Asset'. When the system undergoes air-gapped perturbation, an anomaly occurs that triggers an unexpected malware footprint cascade, forcing the controller to obfuscate t...
meaning
411fa37b-a008-541e-b001-33dc677384b1
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000085'.
Tags: [quantum_physics, cryogenic] Connection Port: 8080 Expression: "Ĥ |ψ⟩ = E |ψ⟩"
formatting
fa306188-2663-5439-8f08-7af53c666dad
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-086-0 | epigenetic mark | 11.6 | 28.9 | 40.1 | DEGRADED | | N-086-1 | splicing juncti | 27.4 | 41.5 | 66.0 | NOMINAL | | N-086-2 | nucleotide sequ | 49.7 | 66.6 | 74.6 | NOMINAL | | N-086-3 | codon optimi...
table
1570e372-8bdc-5864-a0bb-e9374ff85896
Based on the rendered document titled 'Empirical Studies on Ephemeral Side-Channel Leakage', identify the fundamental law that bounds the coupling limits of ephemeral side-channel leakage, and describe what happens when the system undergoes homomorphic perturbation.
According to the document, the coupling limits of ephemeral side-channel leakage are bounded by the physical law of 'g^x ≡ A (mod p)'. When the system undergoes homomorphic perturbation, an anomaly occurs that triggers an unexpected elliptic curve cascade, forcing the controller to decrypt the active registers.
meaning
a0d83fc8-81de-5068-9482-d1bbc749dd16
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000088'.
Tags: [macroeconomics, keynesian] Connection Port: 5432 Expression: "Y = C + I + G + (X - M)"
formatting
198cbf72-5479-5704-baae-ab70e0c497fc
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-089-0 | phishing vector | 44.3 | 56.6 | 78.3 | NOMINAL | | N-089-1 | zero-day exploi | 24.9 | 32.8 | 75.9 | NOMINAL | | N-089-2 | privilege escal | 14.3 | 35.3 | 40.5 | DEGRADED | | N-089-3 | sandboxed en...
table
942bca9e-f229-5b4b-aab3-e84c928b60db
Based on the rendered document titled 'Empirical Studies on Stochastic Decoherence Rate', identify the fundamental law that bounds the coupling limits of stochastic decoherence rate, and describe what happens when the system undergoes cryogenic perturbation.
According to the document, the coupling limits of stochastic decoherence rate are bounded by the physical law of 'Ĥ |ψ⟩ = E |ψ⟩'. When the system undergoes cryogenic perturbation, an anomaly occurs that triggers an unexpected wavefunction collapse cascade, forcing the controller to measure the active registers.
meaning
b8aa940e-9b15-59f7-8526-f882de58da97
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000091'.
Tags: [bioinformatics, conserved] Connection Port: 27017 Expression: "P(x) = ∏ P(x_i | parents(x_i))"
formatting
1c03b1d6-ec8b-59b4-96fe-3139d5967d94
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-092-0 | block cipher | 12.8 | 30.2 | 42.4 | DEGRADED | | N-092-1 | hash collision | 16.5 | 33.5 | 49.3 | DEGRADED | | N-092-2 | signature schem | 28.9 | 50.0 | 57.8 | DEGRADED | | N-092-3 | side-channel l...
table
fe1c39a7-9f95-57b0-b144-ee8a85a9ee6d
Based on the rendered document titled 'Empirical Studies on Illiquid Inflation Expectations', identify the fundamental law that bounds the coupling limits of illiquid inflation expectations, and describe what happens when the system undergoes keynesian perturbation.
According to the document, the coupling limits of illiquid inflation expectations are bounded by the physical law of 'MV = PY'. When the system undergoes keynesian perturbation, an anomaly occurs that triggers an unexpected fiscal multiplier cascade, forcing the controller to stagnate the active registers.
meaning
84abf62a-df67-5bf1-9bad-29382fb006c5
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000094'.
Tags: [cyberdefense, anomalous] Connection Port: 9000 Expression: "MTTR = ∑ (T_restore - T_detect) / N"
formatting
a89ec56d-0188-5f6e-898d-d765d6ac629f
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-095-0 | squeezed vacuum | 20.3 | 39.9 | 50.9 | DEGRADED | | N-095-1 | superposition s | 40.5 | 63.0 | 64.3 | NOMINAL | | N-095-2 | entanglement en | 15.8 | 34.8 | 45.4 | DEGRADED | | N-095-3 | decoherence...
table
eaeb7a81-a600-5d48-8bba-ea9a72471e8d
Based on the rendered document titled 'Empirical Studies on Homologous Nucleotide Sequence', identify the fundamental law that bounds the coupling limits of homologous nucleotide sequence, and describe what happens when the system undergoes conserved perturbation.
According to the document, the coupling limits of homologous nucleotide sequence are bounded by the physical law of 'S(a,b) = max [S(i-1, j-1) + s(a_i, b_j)]'. When the system undergoes conserved perturbation, an anomaly occurs that triggers an unexpected codon optimization cascade, forcing the controller to transcribe...
meaning
9ae0af65-de43-5eb2-960a-acba1e3ea5fb
Parse the YAML structure in the image. List the tags, connection port, and expression string associated with the resource 'sys-node-000097'.
Tags: [cryptography, cryptographic] Connection Port: 8080 Expression: "e · d ≡ 1 (mod φ(n))"
formatting
f4e99ec6-0279-54ff-a238-bf1e6a0c4291
Reconstruct the visual telemetry table rendered in the image into a clean markdown table.
| Node ID | Metric Name | Base Val | Peak Val | Efficiency (%) | Status | | --- | --- | --- | --- | --- | --- | | N-098-0 | fiat currency | 41.5 | 49.0 | 84.7 | NOMINAL | | N-098-1 | yield curve inv | 18.0 | 24.3 | 74.1 | NOMINAL | | N-098-2 | monetary policy | 30.6 | 48.0 | 63.8 | NOMINAL |
table
eeaf4e0c-725e-5a54-9074-e49233953137
Based on the rendered document titled 'Empirical Studies on Sandboxed Privilege Escalation', identify the fundamental law that bounds the coupling limits of sandboxed privilege escalation, and describe what happens when the system undergoes anomalous perturbation.
According to the document, the coupling limits of sandboxed privilege escalation are bounded by the physical law of 'Risk = Vulnerability × Threat × Asset'. When the system undergoes anomalous perturbation, an anomaly occurs that triggers an unexpected sandboxed environment cascade, forcing the controller to audit the ...
meaning

ITT-Purpose

Author: convence

ITT-Purpose is a premium, hard, and clean benchmark dataset of 100 unique samples for training and evaluating image-to-text-to-text (Vision-Language) models.

Dataset Structure

Each sample contains:

  • id: A unique UUID string identifying the sample.
  • image: The rendered visual document containing styled text, code configs, or structured tables.
  • prompt: A high-difficulty instruction requesting visual layout parsing, math calculating, or semantic reasoning.
  • response: The clean, correct ground truth text.
  • style: One of three styles (meaning, formatting, table).

Styles Covered

  1. Meaning: Renders complex technical document segments with multi-hop semantic reasoning questions.
  2. Text Formatting: Renders nested JSON, YAML configs, and Python functions, demanding code structure and detail extraction.
  3. Table: Renders dense telemetry data tables with borders, demanding cell lookups, calculated aggregates, or full markdown table generation.

Usage

from datasets import load_dataset

ds = load_dataset("convence/ITT-Purpose", split="train")
print(ds[0])

License

Apache 2.0

Downloads last month
-